fa39d3f1a486aaee3a64e8f958df4af08b475790505c3dea42d28de5cebc7f049261fd1ce1808b7990d0222d50d0f336e0b4609bab73ad3eb37501a265ddb0bf414e7d1fe3ae5f4062228c8856757de01ab8cd3e3b12843f71d06727f11614769c430b362888997d4aebed893c72bbf07453b73a860092d18501e4ddb1ee776a0d27ca943e94d25a2f05e3faa5c747983b913b6b478745a11e2da35538b50c763629b4f09d0a73b48d9d2e3e8b6b22a3eba162d5e969eb22d316d2da230bb56d5aaca17ae5a942b1ed21347481bdc949e41f6b957d0b7bcdca560a8576b3a713b5ec0fb7cbafbc8d39fe902aa4a0116431c74e2a4e87b1bda3f8fc93370de26a1098436567363710ecf3a972be791d4c410c805ba86ceba4152da2053ac230ff39133f4382967dc1e5dc9a636ff911907c030a98608a72c33f7c5f60f333205be81c94d3114869f6716ab386b914346bfe2116fe8a8534826d8b7e6c6678b849b46690aa62660da37751cb6d34c6764e37167d9e6614e101588c5ea6767de5e4abfef6290e364d9ef05047d40af56b02640a77508331f5d83f13ed2aae8dcb29daceecd2a6d4bdcc446022512323c7b9805dc5f9e3d28694a551d9a2c84973313c40886b42fde78c8ceea8763b187b89af3eeb4c7976f764aec96d2c02aef8c1aebdd3d6900fd65861d1eae8419661f946b8f5791e5c38faa98b9798fea3ed010a0b99067f6acac618b453c21fe48c34ffe33c255974bcf4288b55c73a1717cc3b0dafb3c825e41ac5d9efabdb04cefd69684c8c2d5cd7537451a72c7a0a08fad99c24233a2ab20d0297085c465c2aafd25c65755627fedd95068e88f273372ea5d112ba8535736ee75684d74cb06843900cf7e107a0504f7605369a2ab3ca09b035335f1ff28e71d27ab9af7769b3c6980c99a19dbc750013f2f3adb2bab4ac50e12a5afee37157fbcc9b43a02b6de5e2a80d28e52b142f9dab881367379964fc8b94ee827d50d18092da1615833ae784f37a0f6cd4ce6d8e70cb5a65b38389b07ad22ae14cd1276992c412f349473453e9291a5dd5b1f5860426239e4e0c9823faa992849111c597d7c923032146d8a26ce182706a8d9dddea8f77cdd452e6e0a15e22cf9b25aa155c00d7840361fbeca6a32dbe43f2ae70cf5f655e831884e9791f173ceaea1152057b4bcc8b6f39c127c772abebe75505ff2b3f6929c73b4716c1cdab8d38ead03e794d0210bf793b252cbb2770d9889c8a5cbf9a7db0a257d04f79778462362b1069a6933c43470cbacd93e991b6ceed31dbade297c49ce22ce0abea06b3e76bc778adc2e725b2ce67e0b4df3365dfe37a3902bb5874224b72536f8ff2cf8c806818bcdade85d17a7a2afb02637ea85dde395193fb67e5e67b1d8946b973bfbdd645d64fd0b5e79328ca555bd625113a56bc729fbe73210240bcd0ef1ba2f555a856494666078cf5e9f48c640a26b617717a916c775282192bd8238057f7198b8560cb90495e0124ccedd899c600d474828903857dc50fb9bf7d333d949c53805bb8a1fbc07d5f3ddef23d7474e4939cea9d7aefba8c7a455b2e46dd75b1ff0a59c14a24f55dc61f843c1a41688160752606b3641adcfb86ebd8f4e00b8b9f628b3638c3687b1a0aa35d7dd54fd7d687d23de3b19c361de431de07bd9b9eb965f58d21090d4697f948a236d3e8e348edfa506b20f916ca83e12265ea53a14d35675186b3249c052e43545a10df424591b7034270a4e73606aed949ed91d45023178eb0ba47c2fff2801dba46bbba86b2b184f891037d06c9bd82c838cc2e20ded69a5c9e0da456ca0f69a1fb034a40a0ddbcbe81e0ca04188ad77709b4dca649f2879015a65ed676943a44f84fc4868a57dfc67e13d20e7bf6f6ce246bee696638957c4dccb118f9e3dadb09ee892258a67e56ef0859a05ae67176cf85397c6b660da19b35922fe626dd9fb16a138fe99ad18f1f76db3e677da70bb6671297bd76fd8bb6c616c9a22a189638d3bafc6fc2f195bbdcec659329ba9967bf602adc021e0a6f21d6f744aba38af3a4f1a4b89035f74bd1488eaeba164dc30bd2b4876747537ce07351f0af9c49d6c4dc3ed89126eb0363c7f3d57ebcccde72156d56fa5e967eb4ecf4f0d342c3daa45fc282fec470477fe4a52cd22b07c1f9a2254e2b5e46e0b7b54b6daa7262fb9eac119a17d856b5132ff0c91d7ff893ca8fcba9b999969c07b1457e4285dada875d398582431b8c7c8c4451931e80fe6b0f825cd02e2f9634fb6636464c52a5497c28c022aa353bc1eeb458b5b3c9f7ace3dfcbaff0c4bcf6944e894e72d581f53c51eee6f87918edb8ac5bbf4a5ef6a8849f144a6561d97d77000a555540d2b63b8619467983087bd6cf891f5e552bd4263a572763ec56393b294486672e0d4c53fc147a7c0dc4fc9b1c5273f28000a4a4fbfd7adb59eca8986713ead557b5456b48da8d1aab6d58dbfa3cc8a47d5562633eca0ec9ea547e7ed19633fb921bb6499d4094de1033b4d1d026cfdbff5e795dc4b80f20cd7e8e16ddeece08feefa542901f9f967f40f682392d8f0f5cb59dece279ec9d8b7a51195e331d778fd7d5102182acfc0a3b843db7f3588b736bafd880501332fe634e7c7ec46e4d643cb8f2c134e0c9c033143ac523b90e851fd3695bff5a7f4942df17b8c4c157aecc41ec84bc886d71a487faadd961c57c8a5d9c854375760d2077c32e40950442aeba2e0ef7f410e375ab8cf3f6012379acc120a2beafc2c650b993cfb263fb6844b4f77fe1d57d53f5afd99610b5fd36b447c9bf62211c1843572c82433012a4eb13348d95cf09facfc8e700e4baf68cbfc7dc29bed818d07283227d24555fdc500f5ed201bba385c741e311fb50cc62527be025a05e9e4d3109ac167cc959cea4501e1655ee066c9fc71cc498041ccc09c159c9f767f21260b34772e8cad8e62191dcc474a0d7a1ef4144efdcefe95601ed43661be1427bbe28792e8b351b6617ca725a7f14847a7d48f3a850ef750f5ddede41ec9327a977e960a86f961b0a23cbe40472d7b0345c72d0e0d643b9ea795c0d953e561f0a7956cc79ef5e3ba004e897220887910289acbb15c15e1602aebd3d8bde2624a6177111c3394253c8c228e9e0c569e4fe873f6deb85662df2142794c22ed19a3a498afe63e5828b7f2cf098b7a55b9b3505fb0387418d8f094c6fb348d7fa30e37847c8f1553afac943fa4ef56f375b204b4853ab9d83ab8ab1774ab5f964a8f9be036b2798627fd9afa578f49f1c6c634acd25ff896f4a5973484b1c903047f314372f30af6e5cd1117509345611135f6b3bad843b8c472d4884d0a6d33e8a2c206d13da22d882050c4b8a83fbfaf175308ff89ffe66357ae0758e2a6aa0e203099425e17759ee64b4a06ffee08312679ffa228d377ff3d1a810ad5df010632b8576d003fd4dd391c0897d90413a615a8eb70dc0d17bd1a750dc68e8363a85f451052b80840fc352bba07e716ca7e657bb5236357d48c7729c2c84e83b44b327de9ef731addc15fa3401ac504b9c433fc24437d7c5aaff15dcc975dc2c1b68bcacc929441d45d03dc47b7eaa3de7dea68e053abef379b3a68a639c0da432fdacdadf18060e98ebef3fa8f72b8a77b79da898997bdc959933207864db16bb35afba765068309c13366da7d6e1eb9a2b17bbfc3714eaa6fa1b99ed9ec70c6ee285e38db9d1da9b69983da657d16177c3526d037f0f2bee3ad481ec702ae29a47227fdda574695734dacafe8be318700c82ca2658bee69325f8260e696765d296731ae76d0b571065146384d521fec8b1526dca65adf3e7a3d57f04f0997184b61f8208e598f6ede1e971c236e8fcbbb5023c45ae7b70f91e213199e16b0493515e401bfaa6cb9852eb3e8131f6c0eb791099ae7ecd7566c78e564196eaa76aa6bd958ebd2635014b03fd74eb7d63be1ef26968dfeba333487efa01075cd1618ef618a0c87301464276cf74436176893085eb48ca9d6c3c8aff16d36b26fc25b20127a6fc7efe6814c523b92f0936b2f03aaabefd91f6bfa560a620f0aedc1c7da35f83ee8d4ee56f3d16e8e20efe688f2dcd3639565485261a10875b503609718255d82b1772abc7ea79fae010474ffd91f0a4dc2fe3b4b1a823161a1c14606421b9f956082c4265366e2f42c079783201aec76ca8989f3eae99342ba85f88f4d1bf80a5878575ecaf200a87eb9362fae6ae7ba7e3ff2c67c25f00eda189dfbebe96622725d45e5ed2c1a198c1ee17faf15863a83225bf6afbfcebdf21072317fe866ab27c1b48f88817d4d1d82408c43574a24f8fa107a89bdf665c22b8e9b270f894e863fa6686031e79727304b7b949484fd545bcc9b9dea3535d7ea62ab00e23e37a787a8136be00c224b6c2406474455e7ec129fd7df18f99965c259f6e9d04d4021ad7c6fc69db24cb2e"}, {0x1010, 0x11f, 0x100000000, "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"}, {0xc0, 0x103, 0x4, "82992f33ec88e71634f4e2b1ec6c732a5ff1723a77e727e8eaa406af5c6e79d7cdc53c0f39dfed0cb47a35759924776096af3c7faaf9d2af5def6815648c5fb9769afd68c61771937a7cdbe1f0ac345f5f5a23373c2060dd98e1af0a0a290d3814bd9715a189a62772ebf292ed38d6f389383ec7834685d233fd5c0f5c872558bbd580b47d2a348c643cd503c5a018aca48f83e54a72edc36bb1d161e88e77d20d2473535141499561d304a4b93795"}, {0xf8, 0x0, 0x5, "4e93507d5f235507af1f4ae71b4abd24ef9414d4239d2fc2441274aea403948f29708a4d4db20eab426b8efe2899b37957a5198698c2d532c489b91b35f868ce20f31bccc8e1edfde9b1a3e97056fa34dbfb865b0d874328c9c8d3987fcbeb7004201c9c5dee46cc062a49067d9f3cf981f438d39fcfcc1145023cee0e19821b191a0454f8e4dda053d8c6812bd0c4065d80c9e9dfe1eb5a4f5a4e4a6f7b43dadec00e29c90db0030f3551c2ab21c120345ddeab7854fdf0e6e944be04d531b807b93f030828ee8645834a57228a2432d78f404d1c7de0db12c0a3dbc5416e54d3"}], 0x21d8}, 0x4080) 04:17:04 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x4, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'irlan0\x00'}) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) close(r4) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d0ba9feb010018000000000100000000000000000000b5ffffff006df47f8d3ad3569177cfc171fa963d370ff5826fc8aad209acc43a0d3a19f12ccbb622f97d9ef1e2e5323c2fd8287f8985358103f4"], &(0x7f0000001280)=""/4096, 0x8a, 0x1000, 0x1}, 0x20) 04:17:04 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x5, 0x7fffffff, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:17:04 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000380)) close(r3) write$cgroup_subtree(r3, 0x0, 0x0) close(r3) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfffffffffffffdfb}], 0x1}, 0x3f00) close(r2) socket$kcm(0x2b, 0x0, 0x0) [ 3006.119553][T26422] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xff\xff\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3006.689964][T26470] device nr0 entered promiscuous mode 04:17:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xdb910100}, 0x0) 04:17:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x2000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3006.913576][T26497] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:05 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001300)={0x1, 0x0, [0x0]}) recvmsg(r1, &(0x7f0000001340)={&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/250, 0xfa}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x2, &(0x7f0000001300)}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:17:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0xd2bd, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x1, 0xf, 0x3, 0x7}, &(0x7f0000000140)=0x658, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x7}}, 0x10) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) [ 3007.430014][T26517] nr0: refused to change device tx_queue_len 04:17:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x04\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:06 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x7, &(0x7f0000000080)=r0, 0x3) 04:17:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x4000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:06 executing program 0: gettid() perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x100000001, 0x5, 0x4, 0x7, 0x0, 0x5, 0x800, 0x5, 0x101, 0xfffffffffffffff8, 0x8, 0x0, 0x0, 0x3, 0x8, 0x0, 0x7, 0x0, 0x0, 0x80000000, 0x8000, 0xfffffffffffff801, 0x1000, 0x1f, 0x12000000, 0x40, 0x6, 0x40, 0x9, 0x7, 0x4, 0x1000000000000000, 0x9, 0x18f, 0x0, 0x21, 0x0, 0x87, 0x0, @perf_config_ext={0x7, 0x1}, 0x8000, 0x80000001, 0x0, 0xf, 0x9}, 0x0, 0x9, 0xffffffffffffff9c, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='ppp0mime_type(:]selinux*mime_type-bdev\x00') bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x100}) sendmsg$kcm(r2, 0x0, 0x40010) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x18, &(0x7f0000000000)='md5sum[selfself,cgroup\xe5\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r5, 0x4) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x81, 0x6}]}) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8943, &(0x7f0000000080)='nr0\x01\x00\x06\xc3\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f00000002c0)) [ 3007.752090][T26497] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:06 executing program 2: socketpair(0x3, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() r2 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x4, 0x7, 0x5b, 0x8, 0x0, 0x1, 0x4000, 0x2, 0x101, 0x800, 0x3a2c, 0x7f, 0xffff, 0x6, 0x1ff, 0x8, 0x7fff8000000, 0x7, 0x47, 0x7, 0x1ff, 0x8, 0x9, 0x100000000, 0x249, 0x6, 0x2, 0x4, 0x8, 0x81, 0x10001, 0x8, 0x6, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000400), 0x4}, 0x8000, 0xfffffffffffffff9, 0xc3c, 0x0, 0xc3, 0x1000}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x8, 0x100000000, 0x7fffffff, 0x401, 0x0, 0x101, 0x49, 0xc, 0xfffffffffffff000, 0x7fff, 0x5, 0x5ad, 0x9d, 0x8, 0x80000001, 0x4, 0x34, 0x0, 0x7, 0xfffffffffffffff9, 0x4, 0x8, 0xad12, 0x3, 0x10000, 0x79a95481, 0x8674, 0x2, 0x8000, 0x4, 0xff, 0x1800000000, 0xffff, 0x10001, 0x8, 0x7, 0x0, 0x8000, 0x2, @perf_config_ext={0x4, 0x866}, 0x80, 0x5, 0x100000000, 0xf, 0xa7b, 0x0, 0x7}, r1, 0x4, r2, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8921, &(0x7f0000000080)='ip6tnl0\x00') socket$kcm(0x29, 0x5, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x401, 0x6, 0x20, 0x0, 0x6, 0x8000, 0xa, 0x0, 0x5, 0x7, 0x200, 0x81, 0x3, 0xffffffff00000000, 0x1, 0x1, 0x9, 0xad, 0x3, 0x7fffffff, 0xfffffffffffffff7, 0x8000, 0x1, 0x5, 0xfffffffffffffffc, 0x8001, 0x9, 0x10001, 0x0, 0x20, 0x9, 0xa6, 0x0, 0x1, 0xb14, 0x0, 0x1, 0x2, @perf_config_ext={0xfa2, 0x7fff}, 0x14208, 0xfffffffffffffff8, 0x9, 0x7, 0x1, 0x8, 0x1}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r4, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1, 0x9e03, 0x7}, &(0x7f0000000200)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x8}}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) 04:17:06 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={r0, r1, 0x4, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)=',eth1em1selinuxnodev\'vboxnet1*GPLtrusted\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r3) r5 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r4, 0x0, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x2) unlink(&(0x7f0000000640)='./file0\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1d, 0xffffffffffff8001, 0x9, 0x5, 0x8, r5, 0x101, [], 0x0, r3, 0x1, 0x2}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xd7a9) sendmsg$sock(r5, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x6, 0x3, "33874bcfa9e007530beda96b5ac2d58e9b4e944df87a5e1a38cdaefef32856042e4bb777d14652fe6f9fddb07df58e0d8445f15222a70801b9e520f9321eaf", 0xc}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="b4a9f584753d52d110f85efa451460f42bd11ce4b7da5a682813cdf8cf8143371855f03e2cf5e287212ca71bc549fb5181400afee585401306ca7ddd", 0x3c}], 0x1, &(0x7f0000000480)=[@txtime={{0x18, 0x1, 0x3d, 0x81}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x60}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r6, &(0x7f0000000400)="70a001eee776b3d0b94829da39d110c1bb04d0d28b2f986ac99201a5786e20538f4f52d089f01e6349574d839909f4b393e44a7b06e18b3ba4269d91c5ddde52b4475933db123130ef73c9cbd3243a26af743cddc304135def49185140f85a1b11c8757272f14e0a8723a0943767abdb95569d703679d11afa", &(0x7f0000000300)=""/167}, 0xffffffffffffff4c) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000005c0)) 04:17:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() close(r0) openat$cgroup_type(r1, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) gettid() write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 04:17:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xdc910100}, 0x0) 04:17:07 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x6, 0x401, 0x6, 0x0, 0x7fff, 0x8008, 0x4, 0x1000, 0x1, 0x2c, 0x100000000000000, 0x1, 0x8, 0x7, 0x200, 0x1, 0x2, 0x1, 0x4, 0x100000001, 0x6, 0x2, 0x4, 0xfffffffffffffffa, 0xfff, 0x8e0d, 0xfffffffffffffffe, 0x8, 0x6, 0x100, 0xd5, 0x400, 0x3f, 0xffffffffffffffe0, 0x1c, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x20000, 0x8, 0x5, 0x7, 0x0, 0x80, 0x7}, 0x0, 0xd, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x87, 0xe2, &(0x7f0000000100)="9a23cdb12594d5e493f6b7a3c5f1159d5d4578ef443a7e6b4eea512b9da25a9af0eb0d7a14abf8a1943d3fd284f9a1e17ff3071849c4cce4988770ba56b687d2fb6da975686f971cc27ac24837dee337ef80e58140a484dbb96dd9dd91c765df39a8c74e3e1fab1608da04291c6fc336ed9fb0ff90d89554ceecbbf64695953a534e40b5886dc8", &(0x7f00000001c0)=""/226, 0x9}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r1, 0x0, 0x1}, 0x14) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={r2, r1, 0xd, 0x2}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffff9c, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/21, 0x15, 0xffffffffffffffff}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r3, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='!em1\x00', r1}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x6101, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000580)=r1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000005c0)={'ip6erspan0\x00', 0x100}) r6 = perf_event_open$cgroup(&(0x7f0000000600)={0x7, 0x70, 0x1, 0x7, 0x0, 0x2, 0x0, 0x3, 0x4, 0x6, 0xfffffffffffffffa, 0xfffffffffffffe00, 0x6, 0x6b, 0x80, 0x1, 0x0, 0xe742, 0x3, 0xfff, 0x0, 0x3f, 0xdd4, 0xd6, 0xec6d, 0x3f, 0x2, 0x2, 0x4, 0x3ff, 0x101, 0x4eba, 0x2, 0x6, 0x3, 0xffffffffffffffd7, 0x400, 0x5, 0x0, 0x2, 0x6, @perf_config_ext={0xfffffffffffff651, 0x80}, 0x10020, 0x400, 0x401, 0x8, 0x8, 0x3}, r2, 0x3, r0, 0x8) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0x0, 0x5, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)={0x1f, 0x948c, 0x94, 0x61d0, 0xdd77b4201dd5ec0, r7, 0x5465d01b, [], 0x0, r4, 0x5}, 0x3c) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000700)={'sit0\x00', 0x200}) r8 = openat$cgroup_ro(r2, &(0x7f0000000740)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_int(r8, &(0x7f0000000780)=0x7985, 0x12) mkdir(&(0x7f00000007c0)='./file0\x00', 0x8) r9 = openat$cgroup_subtree(r2, &(0x7f0000000800)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001940)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x3}}, @enum={0xf, 0x5, 0x0, 0x6, 0x4, [{0xd, 0x2}, {0xb, 0x22}, {0x9, 0x9}, {0xa, 0x100000000}, {0x6, 0x4}]}, @struct={0x0, 0x2, 0x0, 0x4, 0x2e93, 0x2, [{0xe, 0x1, 0xa5a9}, {0xb, 0x0, 0x200}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0xff}}, @typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @fwd={0x1}, @ptr={0x7, 0x0, 0x0, 0x2, 0x3}, @const={0x3, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x0, 0x7f, 0x3e, 0x0, 0x30, 0x6f, 0x5f, 0x7f]}}, &(0x7f0000000940)=""/4096, 0xda, 0x1000}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000001980)='/dev/net/tun\x00', 0x40000, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/net/tun\x00', 0x90000, 0x0) ioctl$TUNSETSTEERINGEBPF(r10, 0x800454e0, &(0x7f0000001a00)=r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000001a80)={0x3, 0x70, 0x1, 0x0, 0x7, 0x3, 0x0, 0x3ff, 0x400, 0x0, 0x9897, 0xfd8, 0x2, 0x2, 0x0, 0x1f, 0x8, 0x7fff, 0x8, 0xaa9, 0x80000001, 0x8, 0x1d, 0xffffffffffffff80, 0x7fff, 0x200, 0x7, 0x3, 0x1, 0xffffffffffffffff, 0x8001, 0x8000, 0x7, 0x6e4, 0x5004aa53, 0xffff, 0x5, 0x2, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001a40), 0x2}, 0x1001, 0x3, 0x5, 0x3, 0x3, 0x6, 0x5}) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000001b00)=r1, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001c40)={0x0, r6, 0x0, 0x1, &(0x7f0000001c00)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000001b80)={0x0, 0x70, 0x6, 0x7, 0xfffe, 0x100, 0x0, 0x6, 0x2020, 0x4, 0x0, 0x5, 0x6c07, 0x7c, 0x6, 0x1, 0x0, 0x1, 0xe73, 0x2, 0x8000, 0x2, 0x101, 0x9, 0x8, 0x6, 0x5, 0x7b9f, 0x7, 0x9, 0x28a0, 0x2, 0x9, 0xfffffffffffffffc, 0x4, 0x5, 0x9, 0x1000, 0x0, 0x9, 0x3, @perf_bp={&(0x7f0000001b40), 0xe}, 0x1800, 0x5, 0x20, 0x3, 0x3, 0x770, 0x100}, r11, 0x6, r8, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000001c80)={r9}) ioctl$sock_kcm_SIOCKCMUNATTACH(r12, 0x89e1, &(0x7f0000001cc0)={r8}) 04:17:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xa000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\b\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3008.697799][T26580] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:07 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:17:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x1f, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x5, 0x1, 0x0, 0x0, 0x7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x101, 0x3b, 0x0, 0x2, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x7c00000000, 0x0, @perf_bp={0x0, 0x5}, 0x200, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/49, 0x31}], 0x1, &(0x7f0000000300)=""/107, 0x6b}, 0x40000000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6e727920542c48d237f6c220fd119fbacbcdb3458f16261b8c49946bf0d89d781f2ac0e8b3d58b002ab07cd3be7f1f2bf9cf9c6eebaa1dd601fee238bf523b6155ae0fa5fa4c1cc8a401622f80b3c2ccca7d24e11a22f3ab12035db7b8e23fe86a3ee0910aa11bc46c38bba94c29a050db421e505f50bc912d5a155cdf67386dcf27b70301b5a9462c3289260bbd0adae59045e1971341c6fc8c8e7dac6536f1c2f35b7af2aa89e3710671030e293538586cf37a7219849b440c43266c75dbca27c9f17e887620fc372fa84453a0747c2911235c133dda4b02c7b0b67489166e1c549076ac15f2decfcce60ea489395d0cdfb9ff74b7f73e7126e0a957079292e83115c5d3599f82ff0341219324a3b5dd3e405a4637c92e9181b1f8728ff6"], 0x123) socket$kcm(0x11, 0x3, 0x300) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x20) 04:17:07 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'ip_vti0\x00', 0x10}) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000000)='./file0\x00', r4}, 0x10) 04:17:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001b00)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg(r3, &(0x7f0000001ac0)={&(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0xbc1a}}, 0x80, &(0x7f0000000740)=[{0x0}], 0x1, &(0x7f0000000800)=[{0x1010, 0x18f, 0x1, "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"}], 0x1010}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r2, r0}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 04:17:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xe000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3009.531470][T26580] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3009.599583][ T26] audit: type=1804 audit(1559362628.040:253): pid=26615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir648390941/syzkaller.CLsw1g/230/memory.events" dev="sda1" ino=17000 res=1 [ 3009.662181][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3009.668473][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3009.676066][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:17:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xd8d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:08 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:17:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xdd910100}, 0x0) 04:17:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x1, &(0x7f00000001c0)=@raw=[@jmp={0x5, 0x0, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000000)='syzkaller\x00', 0x7, 0xcf, &(0x7f0000000480)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x2, 0x0) 04:17:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xf000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3010.437716][T26650] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04Z{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7C\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\x87H\x9c\xf4\x9c\b)\xc3\x0f\"\xc9\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00\x00', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)="0bdac3d01951f030f5a5", 0xa}], 0x1}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x33b, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x1, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb600}, 0x800000000000000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r4 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8981, &(0x7f0000000400)=0x241) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x69, 0x0, 0x0, 0x40010}, 0x80000000001) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r3}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000005c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r2, r0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x3c) recvmsg(r4, &(0x7f0000018dc0)={&(0x7f00000169c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000018cc0)=[{&(0x7f0000016a40)=""/101, 0x65}, {&(0x7f0000016ac0)=""/4096, 0x1000}, {&(0x7f0000017ac0)=""/168, 0xa8}, {&(0x7f0000017b80)=""/76, 0x4c}, {&(0x7f0000017c00)=""/4096, 0x1000}, {&(0x7f0000018c00)=""/136, 0x88}], 0x6, &(0x7f0000018d40)=""/127, 0x7f}, 0x40) sendmsg(r8, &(0x7f00000190c0)={&(0x7f0000000200)=@caif=@util={0x25, "e9e3517a86d1204abf3cb898a78163e0"}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0x40f, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 04:17:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0x3aee485c, 0x12) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) [ 3010.568931][ T26] audit: type=1804 audit(1559362629.010:254): pid=26622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir648390941/syzkaller.CLsw1g/230/memory.events" dev="sda1" ino=17000 res=1 04:17:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xd9d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3010.716275][ T26] audit: type=1800 audit(1559362629.010:255): pid=26622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17000 res=0 04:17:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xff, 0x6, 0x58f6, 0x0, 0x4, 0x4000, 0x8, 0x0, 0x1, 0x3ff, 0xfffffffffffffff9, 0x2, 0x80000001, 0x7fff, 0xff, 0x9d, 0xfff, 0x1, 0x0, 0x8, 0x4, 0x30, 0x3, 0x2, 0x0, 0x1, 0x0, 0x3, 0x6, 0x2, 0x18, 0xffff, 0x800, 0x2, 0x9, 0x0, 0x0, 0x2, @perf_config_ext={0x60, 0x7}, 0x4000, 0x1ff, 0xcb0, 0x6, 0x4, 0x7fff, 0x3}, r0, 0xe, r1, 0xa) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffffd2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 04:17:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x4, 0xfffffffffffffffe, 0x3, 0x5, 0x0, 0x4, 0x2200, 0x1, 0x401, 0xfffffffffffffff7, 0x2, 0x9, 0x2, 0x100000001, 0x2, 0x8001, 0xf8, 0xffffffffffffffe1, 0x5, 0x100000001, 0x0, 0x6, 0xfffffffffffffffe, 0x7a81, 0x9, 0xb, 0x2, 0x5, 0x8000000000000000, 0x2, 0x9, 0x0, 0x1000, 0x800, 0x7, 0x7, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000100)}, 0x4, 0x4, 0xffffffffffffff1e, 0x7, 0x101, 0xffff, 0x9}, r3, 0xf, r0, 0x8) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xffffffb6, &(0x7f0000000080)=[{}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f00000000c0)=0x5) close(r0) socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 3011.371404][T26679] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f00000000c0)) close(r0) r3 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:17:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xdad\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04Z{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7C\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\x87H\x9c\xf4\x9c\b)\xc3\x0f\"\xc9\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00\x00', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)="0bdac3d01951f030f5a5", 0xa}], 0x1}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x33b, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x1, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb600}, 0x800000000000000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r4 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8981, &(0x7f0000000400)=0x241) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x69, 0x0, 0x0, 0x40010}, 0x80000000001) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r3}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000005c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r2, r0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x3c) recvmsg(r4, &(0x7f0000018dc0)={&(0x7f00000169c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000018cc0)=[{&(0x7f0000016a40)=""/101, 0x65}, {&(0x7f0000016ac0)=""/4096, 0x1000}, {&(0x7f0000017ac0)=""/168, 0xa8}, {&(0x7f0000017b80)=""/76, 0x4c}, {&(0x7f0000017c00)=""/4096, 0x1000}, {&(0x7f0000018c00)=""/136, 0x88}], 0x6, &(0x7f0000018d40)=""/127, 0x7f}, 0x40) sendmsg(r8, &(0x7f00000190c0)={&(0x7f0000000200)=@caif=@util={0x25, "e9e3517a86d1204abf3cb898a78163e0"}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0x40f, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 04:17:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xff, 0x6, 0x58f6, 0x0, 0x4, 0x4000, 0x8, 0x0, 0x1, 0x3ff, 0xfffffffffffffff9, 0x2, 0x80000001, 0x7fff, 0xff, 0x9d, 0xfff, 0x1, 0x0, 0x8, 0x4, 0x30, 0x3, 0x2, 0x0, 0x1, 0x0, 0x3, 0x6, 0x2, 0x18, 0xffff, 0x800, 0x2, 0x9, 0x0, 0x0, 0x2, @perf_config_ext={0x60, 0x7}, 0x4000, 0x1ff, 0xcb0, 0x6, 0x4, 0x7fff, 0x3}, r0, 0xe, r1, 0xa) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffffd2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 04:17:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xde910100}, 0x0) 04:17:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04Z{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7C\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\x87H\x9c\xf4\x9c\b)\xc3\x0f\"\xc9\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00\x00', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)="0bdac3d01951f030f5a5", 0xa}], 0x1}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x33b, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x1, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb600}, 0x800000000000000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r4 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8981, &(0x7f0000000400)=0x241) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x69, 0x0, 0x0, 0x40010}, 0x80000000001) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r3}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000005c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r2, r0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x3c) recvmsg(r4, &(0x7f0000018dc0)={&(0x7f00000169c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000018cc0)=[{&(0x7f0000016a40)=""/101, 0x65}, {&(0x7f0000016ac0)=""/4096, 0x1000}, {&(0x7f0000017ac0)=""/168, 0xa8}, {&(0x7f0000017b80)=""/76, 0x4c}, {&(0x7f0000017c00)=""/4096, 0x1000}, {&(0x7f0000018c00)=""/136, 0x88}], 0x6, &(0x7f0000018d40)=""/127, 0x7f}, 0x40) sendmsg(r8, &(0x7f00000190c0)={&(0x7f0000000200)=@caif=@util={0x25, "e9e3517a86d1204abf3cb898a78163e0"}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="8dba9c191cda19a5ec8c98ed80e4080e3b93e81436be7ca154b9caba5b3dff0fdfc76aa80017a8b22e5154501e6fcc9d45f3e9b84427a0137952e72d88d3d174462089c7af61bc57e1d435ae0a493555692def8063000009ef09ff0f95666b07000000267180a748975bebf434b681d1661b016e96b2a860b3520af28d3c11daea88b79dceb18e14264fb0af4dc01b800115a0582d0000000000000000000000004c5eed12d39cdfb7d091da5bb29085c446f04734866c3755d9a805856aa868687fde9a0ab8df0df56e86181cca0c44fc227a990b2eed0253b2ed0ad9fe020400000000000000235d130f7fd754e8ea98a0eb38cf74f9cd72fd4f7c00d93426f8b074cf2538ed5d4bb20a04c708bbc1a0dd838d2f76cc4c43408449c71a05ac239a13f7ad1afcaa09dddf4022bda143d5dfdf9dcb4eecbebdd914bb604b73632d11b579dd07f72803aec028b927ace185b9a6870d4400008eed7699d03951df9e8a5003a9d2244af8d024a615b6f24dcd7bcccbd9e57ef10343e4011dde50d03e552c0a1e80169ad1fd454060e8bf850faf4e3773e33727932dc4dc9ad83ade839ca487c9da1ecf4c1bd799dcc2fc20842a1a370cbcf96dacab34374d38ed0d9e6065fe0348999afcf11b6d50a2de3749a895f6d56052239256b06c1f9b583d55ad23ce95a367e18bc081d5e266b21d5ca69539ab84b055e9f6235c93f5935aa571fb7843a24d37a83f0f6dc75c52b8b8dfed59ac31c3996cc2798d94666b26d04d954bc39c46b40e02b5299fe078cf1a04ce8242a11264c3e38f3d345bb81cfe438b3252df92c000ea40bc299e1bf7fd8f9f2d3c31248c81aaa93c799fbb6f69b83c4bac9ab3d16b55cc0d4b35cfd0970cafddcd6032430eb8fc0c1d2f980fb93073d2cd4c8c7b5b87c72408c707dca20fe8d502f8e0d05bbefebb0908c69f90a018165bf2fabe2cb9bdbeb41d8b026d052d2b5e8f365e7f7bc176791b5290dbce518810f29091e871aedb5ca7d04df7f5bb2fcfd81f8ff1cca974b9d43f5a2a9ad4b34865dd3c96e705c709e11267fdfcaa1e414f2e027333f190210bca3fb204d75eff14f06a8637a0d872a4d97c4bf9698755d6acea5dd6e94c1bb6f663b90fe0bfc10927291ea153285624d1e5ecbcf81e06f6fd5f88f39f557d34b8a784770fa981070973323d5c09c7bb2a1ce773c2d8d8786b03053431e059e9746d3df30f40dc1764af2174cfe801eeb363ad256c56ee4ed7293608ac67559b7b27ed1083d72d0c43f5167fc11d085efca4dd6cacb6e0cd99a98bbc1632630d71c54bcaea1c7eabb8f094eb616bc625a253594ba1a808665b7835de2ce5d5663d9b87472f6e0b3d8b07c1aabc772b27d33ca2996d3382964e8b5ecfb0ef132a2b7e9a94cab6524a94dbe30d8cde9e4cd9d44baf67d204f71e076871e4e9fa3ef477c325edfb304a616c11ea106b9b5861"], 0x40f, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 04:17:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x3f000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xdbd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:10 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000100)) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000009ac0)={&(0x7f0000008340)=@hci, 0xfffffffffffffd45, 0x0, 0xfffffcaa}, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x00', 0x1400}) socket$kcm(0x29, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000071f000025000000000008fd009ead532be2615d"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x100000001, 0x12) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) [ 3012.302080][T26716] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:11 executing program 0: socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socket$kcm(0x10, 0xfffffffffffffffe, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000080)="ee4e57f1d69b88743b51d34f1d727a888e628850eee932a70f359ff9546fd384aca612e0061bbda8373ab687ea6c9c23424b67029177672638b781318c49ed6ccc6260931e5f346592ff7162360e6ca5d8ddffb3dc1b174f76bc31546f0806180d7f8914155f0825f2b797b3621a635025ed92915a250f2516caea92f7f49d7e12e46b57e056f3f066811cb17ac785abbe8b46bdf7e4fd2665463a73acd0a2c4a6a193cb346b46e69a3742d50bbcf96d977b0cd24a7521e29a4f35be2969428218e14d7a656a97a01a2d691fcf49963e18de5afdc3f219bfd622c12681b69e", 0xdf}, {&(0x7f0000000240)="fc7b4c2b1700f82537e16d", 0xb}, {&(0x7f0000000300)="56beff8892b1ebeb990f57588b0b789a2acb4612ebab079aa252311def", 0x1d}, {&(0x7f0000000400)="e3417d673de4d5e292cab397147c29b6bc2b1c641e891f9f68e21104201cbe85cfadfb3203bca6ac5a8a70c36d4bf6426da016c153e2752fe0ca81e732752981b73824ebc3c700e1701e9f972499c125e46553e84f2b96549b365dee2c10713129c9d3e6be3784708d5f37f530cdc29bbb38c8d49761412c691f928f1fcff76c7fe4d5533d1c88d91a", 0x89}, {&(0x7f00000004c0)="8a65e41970f95bfa7b0ef23483ff27b6e85ae3455f81d75368d31153981bc585b8da6302414fd644255ccd62c4f32950397ca3219d0fa8ce3cee6064b2a5785451da25cff8ffce40605a3e4b", 0x4c}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="034b694f792f647430feef603f1e2cc895fc1d1c01571e76b23a3ae2900dc7a96ea50d530261d64affbd0c329fe03ea7888f9d6948a0006674194e797d437e83936f73b4ac2ec1c60435aee88f84d1b7bc3692240fa22ab05d63c38a757b06829f33c362641f1a4e6e171b65215ac8033aaec81f07619fae84c38babd402fe450875344dd1eae0afee8b1f02881acf25fa795eba3ff7707c7da3cdcb07c915da5b4ea0b6d876ddb3cc3bf4568ab390", 0xaf}], 0x7, &(0x7f0000001680)=[{0x20, 0x117, 0x388, "6caf327507c712a96c0a2fd835"}, {0xa0, 0x11d, 0x9, "5e90582c99abd12419dbdaebabd3101c761cf972d295a424ac02471cff6fe5d385a694e88a59049db1a0879baf81311151b7059ba218695c5db461407ad5739123eb43a0cef02029d10f62c0aa607529700dfb3aa05b0104414c3ce3d5501a05aadb6f3fece5f14a92ed46d17d78eb64eaadfbd72569a00317c25ede8e70d6be9de0c8822c50045d7995a21af6155f"}, {0x88, 0x11b, 0xfffffffffffffffc, "e8c3217c82ddb87dfe0d21ed6c1e0db44b956fbaaf17d236144f0e594ff4681ff6ea45d1d4736bcb35609a5af3e0cf162deb9af313f88a9b178892cfe47d3de1c9198ebcb43cb7b2ff223c0c92252706cd22aa23535f044c13cb7863ccf69841e4efe69192cade1a198e16e14afe75b955b2589211fffd"}, {0x60, 0x10f, 0xff, "ca20b8e8901d36853ce3f3d71fcae6e6708ec6f54aadd10941d0d6dcfdad7da1d637b9739eb19b2c5a500457ba9766548c35bfbe075f6202a0daa236487d4bb4298af7c8edfab94439f9e64a"}, {0x108, 0x129, 0x1f, "983b3c604b4530258729b5095291f1c253bf6ec61fdcfff54ac14c22797aedc191a94f9958804b94e3ee9e177d22f1479077a6cf541c631c60058dab8b350d1f742965e4e838f29655ca84c2c2067eb52f232c982e61584523886bf3bf6a960b7f7490af25698eff0c3b4a4bf43304978b50e135f4dd0e04baecadea5b13f4c5d68b91ad56f8555d4a548900c635b7d647306f0fe81aad9a031493ecd121426ff236f87f2499db14d75db1765ff0ffd8a6c89e552bfc65dc2aedc6ebb345897e750864b0721e8cef7dfa7628bfb4981beb3de10bd6e287fecb3d54a0a03a4db5e09d93b64af092ed3807e4d8e3394eae74ebbfad64"}], 0x2b0}, 0x20000000) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="006d656d65acf52e"], 0xfdef) 04:17:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r1) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:17:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04Z{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7C\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\x87H\x9c\xf4\x9c\b)\xc3\x0f\"\xc9\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00\x00', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)="0bdac3d01951f030f5a5", 0xa}], 0x1}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x33b, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x1, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb600}, 0x800000000000000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r4 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8981, &(0x7f0000000400)=0x241) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x69, 0x0, 0x0, 0x40010}, 0x80000000001) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r3}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000005c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r2, r0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x3c) recvmsg(r4, &(0x7f0000018dc0)={&(0x7f00000169c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000018cc0)=[{&(0x7f0000016a40)=""/101, 0x65}, {&(0x7f0000016ac0)=""/4096, 0x1000}, {&(0x7f0000017ac0)=""/168, 0xa8}, {&(0x7f0000017b80)=""/76, 0x4c}, {&(0x7f0000017c00)=""/4096, 0x1000}, {&(0x7f0000018c00)=""/136, 0x88}], 0x6, &(0x7f0000018d40)=""/127, 0x7f}, 0x40) sendmsg(r8, &(0x7f00000190c0)={&(0x7f0000000200)=@caif=@util={0x25, "e9e3517a86d1204abf3cb898a78163e0"}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0x40f, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 04:17:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r1) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:17:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xdcd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3012.941287][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3012.947125][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3013.098036][T26716] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x40000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:11 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) recvmsg(r1, &(0x7f0000009100)={&(0x7f0000007d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000009040)=[{&(0x7f0000007d80)=""/189, 0xbd}, {&(0x7f0000007e40)=""/225, 0xe1}, {&(0x7f0000007f40)=""/28, 0x1c}, {&(0x7f0000007f80)=""/101, 0x65}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000009000)}], 0x6, &(0x7f00000090c0)=""/13, 0xd}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000091c0)={0x3, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd059, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1e}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3e}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x64, &(0x7f0000000240)=""/100, 0x41f00, 0x3, [], r2, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000009140)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000009180)={0xbe, 0x7, 0x620a, 0x400040000}, 0x10}, 0x70) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) 04:17:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xdf910100}, 0x0) 04:17:12 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000000)) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:17:12 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) recvmsg(r1, &(0x7f0000009100)={&(0x7f0000007d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000009040)=[{&(0x7f0000007d80)=""/189, 0xbd}, {&(0x7f0000007e40)=""/225, 0xe1}, {&(0x7f0000007f40)=""/28, 0x1c}, {&(0x7f0000007f80)=""/101, 0x65}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000009000)}], 0x6, &(0x7f00000090c0)=""/13, 0xd}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000091c0)={0x3, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd059, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1e}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3e}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x64, &(0x7f0000000240)=""/100, 0x41f00, 0x3, [], r2, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000009140)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000009180)={0xbe, 0x7, 0x620a, 0x400040000}, 0x10}, 0x70) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) 04:17:12 executing program 2: socket$kcm(0xa, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f00000000c0)={'team_slave_0\x00', @empty=[0x48]}) 04:17:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xddd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000002a80)={0x0, 0xfffffffffffffeb2, &(0x7f00000005c0)=[{&(0x7f0000000a80)="1b8147ae2831a1f0956abdaeb8eb1aaace7216c33b03859c25ffd3a75f7b4048cacfb99b1a5f4c65eaaa301146176579db17ad1ab1034c4d68754c4978e560f2439ffb210e34687b073db84e605f38adfa93c887b84a1e296b79aac7a547958c841e62432b624a736d62b25117b231b92970de6e89aa3af7a51ae846887a29f7a12cee49c15c883d131d8ef86ca97e098431423745527a19df9310c5da6250abd3bef2f0b7cdd2172565587b5344a02c8627fab327e51c61a35b49b8e982e8fe50bf0e63f1c9113ccf8708aeb93a3c477e0bc682d4ef73ae390d3d382a0606596ffa14dba514321369502b36c94cf631a94cf088a4299b03e73768f015db0248554b1c706441581b8bf4e21aabf5083878244b141df76ac93b8a815484f428fee25f773bd527a04d86e8e14f0453c5ac6412d48c6460ecb6246c64f2798ba6c44e912d32ffaf4656e6915e094c964f6ce00e9cffbf49fcf79998bb018acacaa07e7ab3a996cdb29a696658b820164ea9290f00306c70b96cf74ef0bfc43ffe971b9e34bbf720b08a810efdc528bc908a31a050aabbe945f924cee17821e5fc5a002d1f70805edd93c39f4b2735d3ef27e1158b024b34983cb77dc15e1e2996d35d3833fb59a0b9de1e063c24037e9be28b98deddbd35126943565179d78921e859983e32498d9b2ceb7eec4edfbda19cc8520c41550a389a0bbd6ad69020dd140f31d03e8b77caee9e9238ae82cf4484327166c871e6e77d9e38baf8848512da454cd3763e3c07bc3c51d16a80709ff20cf5e48864d3fef90580f353dd2df00ca18e17d7dc0a2deb6ee1c0f6d12603636f7b9579665f10ab724d47d8e8d10f6aee27bcc53160399261574774eca5759912953deead1c6ad8993d0eb834605f1879e2ab1a8fb8d6a417276037d62ab9daafc9b8e6bf436d19ffcd5776aa89afd42a2cc15fdf24644c37dd1c42d75a93f7eec9b5d7ba9f87490d6d66f16eca5f74464459b76496a7059e6aced91050e2c0433ba6bda694975ff9064cc49f2c753d0f79e1a03a46722587d14fbd235693a6199ccf8384c3a67bbffb43c7b12f69745aba43c40f27225e006338be1a304d633b0ae4f724a7d96e49e84b22306acd954340d557928322b605a6e67333c1cd91e50ccfa865b2eb41c97989fb7087c90eed20d18a9d96e6674931b6bd9fd35e9a589117bc01770d1522d6d2d6d1d36f59af8becfababe7b9c9f5567f2cef109888f3a3bd9bd9b29751ce3abcb6814a357f98ad013164d69f0c07a8c130cfa0dc32a4d6f0f7b7c6efa107b19d9c27dee086bdcfbb896069a54aa5ed7a40cf9f590e2c62c81a8dc1cfee5f2dea70ca2fa1171a1734ca56c39f1af66268708bd7489844674c5281d039e548f2993190fe7fe5f78f79edd561e196ef6cc748130b7a7dd5f249d897f4097f3694971a31fb093d4380c50e162576a1a0a23789ba1564a8ae6bd8ff8a763dadcc1c157e7b103ab9c6f053d97de86f774850d4ea0cc4d582e221e938ca4ed650d5720befd55a92629233e183501ded6bfb5c869b912239161f9622695d631f124b40746dd7de76ecb29cfa333cb65aca75b8454a51657a1ca15545de1a13c1ad5594eec78e1cb4ed562b07a16c45766c6ee4d2c3c0807af4dde1235e614476f70b3ce6941fc07ae5242254b1aa867dddcd172eb00c5e15e8401556118a7b10ca1f137c0751c64e4b89f8b5de1e16e7d552c67cb4c823c0da6af9020680f45d32ebe1f5be767d5ed6c2f61047efec11ac6b4c600bdd2e997c7175fb6e24b6f1ee6c66d76fd3004e1d49fbe04c1eecc777410ab21cb36169f5d8910c6ef69ab65d881fc9243fb159c8ee49e2126a0ad0244ab9ad2a7ca7246e7422dacd22f3d7ffec04aac7b16095cd20fc258d9ffca74375c15431590fbc2c2f8a7c3dcdc7c9ed2037d7a9822867e4ca5be724db73431555d7322762ae12378af20f44b0d3aaf95f27db5bf72ac9be1a06ce6e0045841c0bccd81ad4572b05ba40b162c010620e050eabeb40517f4d01e68b0cccc7c91a026706e3c9f975f406afe26c328bd8ab3aea744be6f1f90ea70fb10209344506209e405b17ea4f31ef47948f80b568b6101f8cfe0efd9359777c2a76ed1ff054ebad22b55f42b003bdb3fdc80edf9d296e08e887dacdb5573c2d0f6bc7c9f1a7cbe6a7970f3c1e7a7002066e0ddecb16a53b7b8c4c6488840d0d6b532295a5bccfe08044fb7849ae303aac63f293f01916e3fb3e18fc8d1bfdee10a02f148ac76ca35cbdd32bde7bbf6ad4bd71996bede81cdb862c524cffbcf488925344697a9f57b181bef6d11650934b71ab19211f217b55ad47ad57d937eedb8d2d204ae35a2411d820ccbdabd0033f98bcd6a6598e17acad6566c9bd499bd40170bd7c6d6a8b9a3d0d89778ee3344fe86fdbea145a86d4eec240e6388100e32f229d565e538034c5a1611e9a53ecddcb25cad19aab0f55de77ccd7956ce6e8f0d4f711d7aae2d34d8e79f2613aaaca8bcb64070b91d2313285ca37d4360275a84e8cad5a409cb8e4e5f0a5f56c924e89d6e89410bb37edf96d4d77986335d02484f5b42ded11e033a00d3ef38d1f13ec578fd891aeb59f06b25a4f0ca440728c5014405b6576efd86cb268fe91e95c356720f2f72e34133fce21391877afa6f3aa3910bce8aa299ef796481590b9538f2d19a1e19a588be13318cfcf5032b5a57c7b3d6bd8de95c2546c1bcc0c02ac0e71051036e7f4fbc348c689dea7f580df95542a1c2ad248f5bd2192f937b5c9a1c94a9a9c9532252c65756e31eada592b5bb2e14ffb9cae478cd488713a904593f2cd86a5862eec2bf07b2f3891225aee00a9d6ed57732a3a2592d281e61e59b901370516d646ce23aefdc70457c5a78753947e1972a8b60b3bfbce3e84186eb8242727e844b4d8afe6deff4d052d9447be2beeb4bf0b92f5e3ac8f66dff7c560d9fdbbc43d6a1fef314366b67fb796010c57e4c43ec16afe59626dfcc09208815bed4dae544e0eca962209a52b914523ff68c8beddd5db226bdc9bb92a8e1db4c2755fb5e8542675f3801a5522fc0c8624d2d661d22a9d87697cb6fffa0c96a8497c84544fc40caeced18809ba1cb2db230bcc7cda34a2deef174249497cb30278f132122906687557fa214fedc0482ce632c529f446b3d413369bbed5264bf4448cc212bb4139e5e4e4bdb050161d62b44da0d0d9a8071ce8ae16ff3bd0cb07c4a70364f504209fa0ef401c2dba1fda667da46fa27073dbad168cba48a7ae07634da8d8a04787784c12245f3f674791458a858b78798a7a0105795339d2e8ca129fc699c404da0ac2bb41ec4dc8e89a67ebc556b710b79e5933b491513a435175135376967ff3e0c88146940f363a570df9378e4b1d32f4bb4c1776377a2b2c0c837983f6cbdf386fe364feef0aa292aa86933cd7d897d6732273a77436e864060d64752771215fd1b8795b306c88e6cc89c7f9cb3f9c796127d019f3064219fc15f2fab0fd6460f0283fb9e8f0606d4b89be1abc5295500ba01fc1f9315f754688145f728037e6fcd2f5ebf19adbc87f71f8aae141139e5200b0b9b30c149e67d47498c5d56b4fd3727ccef4cca0505beec33e473e09ddb133d887d1e76be914f11a39a1c79cd9510b58678491c309ca448d94654e8f145cd4835eff750b3a5edc301bba54957af5303e1a8584c0f973f97d1e1cee4f0f9d954d37faa771e9d16d02ab9d8534568c20380c6708c196e5e32cc62f5c7b2fec96cfcabc7dee6e8e35e17c4313bd19c3aa991c93dbc1e957fb48288f89b1b2e4ff4a44f6a46b8c90565ac0a6e7b7c929d9e8e35f0a47e4bbeac19336827f7ac24fb549fd48edd4d40a382c37d9fa329b6add0bbb383a4172c4d4d0c09c1fd03d8bd16a47f6a532d29b4fa67ee2c898d0260532be05b774481cf9e68a1007a163a3d2eff888331534f3d6486efdffd26fda0a6ad665d7379a34515edd78a45a6725bbb63bb7cf29518df0fc44afb351d7e283c6581a14421bea1b1e8065abb01fecca3d8dd09617869c5738e5af3474090a84e3750ce7bf77ffbd09b3c1718e190c2f79eb408c85a0875e72223d7defeeedb16af21a71d86775dca51c0160d16d18da80a4050024e49ecbcd0da6c4c73210f5ff21f40f33e903b159f5cd9dce1f4d0dd2ff8c95d4791e850c3d6994847e26db980def4ec37855bd11e15e86110cde7b3a2d926bbcf80f6168132a73380c08d3b470279ffbde1b8873496acea58eb2d10475d66436d4fc48db9cafc48fc3a28ab064ea995fc965d8177f06c94bcb53cd79799679cd81ac821167ab6fe959ecff035c717f0f9f0cfd91780b67510a4fe3fd71287fd35d9d2f124c41d9a482a6efa4a69c150aa30fa8bd5eda0fbf01e7a48cf7a78f5ada30499d9ec84c988305d8bbc8699905998f373879f94d8674b9c437ef89ab4f93fc9882ef1f0144f095db24369ba0d87473b595a02c1b3f23c77583525df396d981bf8e7cb8eab1ecc5706f12771eda796233311b9ccb219bc57fe5742d2e5e00192f7bae8b4882fe5d578357c08619cdf62c91ea7c692219cb6ec64f7fd910307b014a9715b5123134dad232ff3941a024d580b48e5a6fdedbd380226e962e21bf97db86f684825027df74e037cfbc221d14d8555e52b97f1df78164d07739b614368f0f26cfe325a4471c83b18b25a8434fb8a3d72632290f26fc5c3a564309c729357b724e02bbd74baf35ab69f298227dffae5c121730540127ab5bdee7a5f2a617902762efe5071a6292bf2bd767c426c3ada669b04c65f5c1440b7ede096fc7a62669dbad508f149aadc6c14583e54b65fb9379787abc5c06dbf5b4f266756ffa45538de321b79dddad66901f70e4a03fe41868fa9ea6f30e3fa88ea566c0ab18e04010c42c20b8e4f25beca65dbd22d33d2009619f2dc742c3d44626911c685edf686c581fdb2650e0b15830961d202d5bf7f7122b1bb58ee743241de07bf1e33789559c70d4cb058431928f31e3098da914c493df5dfadef1860c38cab7295231e9d2d0e04ab5f560a3a3ef9f632627dd8547ccb1a0de64beef7e733519bb52e3171f324afcb3a723fc36345e923a62a03a17dcb59cebc185a9e24eeed10e1a9f72dbe5c9bb14761244bb985d7e1a151e59632e33a28094090c7cbd83f9d58e6f1d8fb39d4b694232b30b0ddaf7014fa19dbae5fd448c95b32d9a1ee2b2f787a7d537fc2f5a50f2a2e10068020f22bed445128fcac63485853cc16a4fba824ef830b0fc006762bb67d8be18249e0915122dd6957de058987eadab7092e63011f24e750a076a41fdde74bccaaa56b2187aeaa7902f855e78aed44821c2459b9cd636a9d3e79b7ad806061d9d7013ad0d8ff2aae151e0ca4f32b28fa2a8515eb808e1a7c2f126e1429f779fda2ef74903ceab1bfc9c4f10f57539c3d45a90bdcd3d829789019c831163e8311e980a9a6fe13d76fe0e1e8ce605ba1a67f3e66dc16924cc77f49501cbf94566146c03a96368f22c5af3b13c7946897e61bc83fd294bee3c98d28acf1455842224f0c3a27955954fa8c2c437b58c990604d5042c7cb1ffa076cd48f3c2312d10324150b295e3c9fc68503071fc5e71d8a65aa826c2d64724f796e538c744a104292e667e3fe551e0fd51f628a6c6d6a6b777fc443f8efddb3714928b066f3fe33f65ee4c3ba56bc6efb653712df3936723300a50f77bf8ddc947bd630bef3ef3c91662857fa54f31388ada99aa8084bb845e1b3c9d5d90c6d7020ad5b"}, {&(0x7f0000000380)="8ed5fdb249be8125336e0b869b526e5ae20f69746287c3b032bd7c29ff1b6cd6a59f17abe09b534a4b294c71b7a6487f6218a89edd1e936c9f7c2d9140117a8494c4b0d6406e62dc89bd5ef640342058e30cb8555eb4d4bc31c95b9b6ad2cea690dd4d2abdaae93bafe49a0ef7df3c407673eac26959074c79aa5866b5bb1b2cd54971f76dca6c9cc5613a90a896c236c0f134f6b4218cfafc62364a684310a1a262474cd352c497568aa278931d3c15e8812f3f4ed5d75158e38cb386b69c1e481be793bf5dd49d3c88ba1383e24095ed5e25d65f400ed67e63a0756141ef3fb693262c9354c9e88a89f8c42e838a099338398a17"}, {&(0x7f0000000480)="b31afed95f1733eacd02267304ebb242644c76aa3445a569ffbc39fed16da5d2c5aa132b64829e3a04887a8afc10313db22b1264b3ed60eff3caf8d1794406f089c5e0faf11708215763537976dc494282be88d1856b3a74ae1ada9c57ce88df0b9c2b73"}, {&(0x7f0000001a80)="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"}, {&(0x7f0000000500)="b26d38c4a147617c77d3173e5625fcfb5ff07596f4de0b29459dc871eea99252fa9ac2c14965486890ee14b3c93525200e2c7dd286cceaa23932af6f04e92ce02f41c7eb23f378cfe9d6dfc69df5ef1cdf23623b59ebd42d7e8e80946f755a91f92f0bbae623cbc2fec36740dc8457f35d4637c29f5e695f3a2e17d403a9555bb41821b348b8bf5a72cbc9894881bb1d9cc3e9fb627d0b219b86aa8668659ba0642764dc57e6ab"}], 0x0, &(0x7f00000002c0)=ANY=[], 0x107}, 0x8080) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x116) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014103000000000a00180e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 04:17:12 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) recvmsg(r1, &(0x7f0000009100)={&(0x7f0000007d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000009040)=[{&(0x7f0000007d80)=""/189, 0xbd}, {&(0x7f0000007e40)=""/225, 0xe1}, {&(0x7f0000007f40)=""/28, 0x1c}, {&(0x7f0000007f80)=""/101, 0x65}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000009000)}], 0x6, &(0x7f00000090c0)=""/13, 0xd}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000091c0)={0x3, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd059, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1e}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3e}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x64, &(0x7f0000000240)=""/100, 0x41f00, 0x3, [], r2, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000009140)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000009180)={0xbe, 0x7, 0x620a, 0x400040000}, 0x10}, 0x70) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) [ 3013.852766][T26787] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x60000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000000007000000000000009500000000000000667a70eeb84a06d6883ac932152b3892a9f8ecb6f9bc67eb567874002098c5e61bdfc59efca063c4a2270993a45d5b3ebbe34afcce"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0x36, 0x0, &(0x7f0000000200)="e40400000000000000000a7586dd6a000000000733eb3014cd3ec8a755c1e1380081ffad00000030d500000001040009880bd320d98a", 0x0, 0x200000}, 0x28) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:17:12 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) recvmsg(r1, &(0x7f0000009100)={&(0x7f0000007d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000009040)=[{&(0x7f0000007d80)=""/189, 0xbd}, {&(0x7f0000007e40)=""/225, 0xe1}, {&(0x7f0000007f40)=""/28, 0x1c}, {&(0x7f0000007f80)=""/101, 0x65}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000009000)}], 0x6, &(0x7f00000090c0)=""/13, 0xd}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000091c0)={0x3, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd059, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1e}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3e}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x64, &(0x7f0000000240)=""/100, 0x41f00, 0x3, [], r2, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000009140)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000009180)={0xbe, 0x7, 0x620a, 0x400040000}, 0x10}, 0x70) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) 04:17:12 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) recvmsg(r0, &(0x7f0000009100)={&(0x7f0000007d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000009040)=[{&(0x7f0000007d80)=""/189, 0xbd}, {&(0x7f0000007e40)=""/225, 0xe1}, {&(0x7f0000007f40)=""/28, 0x1c}, {&(0x7f0000007f80)=""/101, 0x65}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000009000)}], 0x6, &(0x7f00000090c0)=""/13, 0xd}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000091c0)={0x3, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd059, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1e}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3e}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x64, &(0x7f0000000240)=""/100, 0x41f00, 0x3, [], r1, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000009140)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000009180)={0xbe, 0x7, 0x620a, 0x400040000}, 0x10}, 0x70) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:12 executing program 2: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000100)='memory.events\x00', 0xffffffffffffffff}, 0x30) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) gettid() openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xfffffd55) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00\xb9\xe9\x9c\xa8I@P\xfeHS~\x81\xb4\xa8\n\xd1-', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, 0x0, &(0x7f0000000280)="763c2fe075185f13ce6c39e8c7b3f68c583eb773df7fa67d15a62e5296a7026c27b7cc4171714c579985a5ff76a9a239087265105cd8cd050dac4b342fdd7b4ae7380ca8733af7a5b63724a26d65cb800315fbe26366db3b96a39d16d4bc3de9dca81f7e4a4f68a1e8463122d5866d9ae614e1cfda221b5a8166598ab51f2280fe8dfbc277e9e21c0fb575d38b970b98d222dde8194c82a4a1c48abedf27a18a01dff7d3e544543d692e251ec2b1cd32cfc229b1bb36de1c1d8852a3534e85231f2f95f7519964d24e835ba07d7a4c7cde1ee744f3b76168120968fd2e67b0b5ccad7c25488ed956"}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x401c5820, 0x20400008) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r3}, 0x10) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x1) [ 3014.719302][T26824] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xe0910100}, 0x0) 04:17:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000500)=0x1) sendmsg$sock(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x200000}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)="dc8174b0d69e87da48eaf1d12ea941cdfaf2c8cfc7e90c6858e83ca74243ad93202063a5c5f18862343b82c38757c03fe6f4111c7523f8c0af72bab7fa6a2a9d65cfc0f756f645b8de1dacad442a2237c498b5db0ca4ed5184b5fbc2afdf76bcd4aefc51640da66a78586827904d3130ff98e18562d7bd7b5d688658b0b20aaa9580c52a78665de1968c45eafe05416abd07a9f426044239f185c99e9a990e39ae1a3e56e01299c4e8680ad634fa7e6082eeca2015debdb50da0c7376042", 0xbe}, {&(0x7f00000002c0)="c7e6e9c98d38fae9976f2adcfaae73dcf48e02f569fe42b01c4bd4db48067c6fdd04fc9f7bf88f6bddb17a0a806e60e810e5a0281596da1ff2ab889fc1bb05d30a6848a92661233b2c2ad5eb9c2ecdd5fabe452d665a3079100c86623033e62eb8645277307e58e447a3d3ca9210d9dd199016310fd1b2d69fd4b4f027d2c15a03112232ce8c5bfc8986c69df5355dea066f65ac20115da86c4445a7cb9f7122eae931f2fd3c67af7f77ba95f777c649", 0xb0}], 0x2, &(0x7f00000003c0)=[@timestamping={{0x14, 0x1, 0x25, 0xf3}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xd5}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x90}, 0x4000051) close(r0) r4 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000000)={r2, r2}) write$cgroup_int(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:17:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xded\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:13 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) recvmsg(r0, &(0x7f0000009100)={&(0x7f0000007d00)=@can, 0x80, &(0x7f0000009040)=[{&(0x7f0000007d80)=""/189, 0xbd}, {&(0x7f0000007e40)=""/225, 0xe1}, {&(0x7f0000007f40)=""/28, 0x1c}, {&(0x7f0000007f80)=""/101, 0x65}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000009000)}], 0x6, &(0x7f00000090c0)=""/13, 0xd}, 0x20) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:13 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) recvmsg(r0, &(0x7f0000009100)={&(0x7f0000007d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000009040)=[{&(0x7f0000007d80)=""/189, 0xbd}, {&(0x7f0000007e40)=""/225, 0xe1}, {&(0x7f0000007f40)=""/28, 0x1c}, {&(0x7f0000007f80)=""/101, 0x65}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000009000)}], 0x6, &(0x7f00000090c0)=""/13, 0xd}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000091c0)={0x3, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd059, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1e}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3e}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x64, &(0x7f0000000240)=""/100, 0x41f00, 0x3, [], r1, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000009140)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000009180)={0xbe, 0x7, 0x620a, 0x400040000}, 0x10}, 0x70) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x730a0000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3015.194706][T26852] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:17:13 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xdfd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000300)=""/91) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'io'}, {0x2d, 'rdma'}, {0x0, 'pids'}]}, 0x1a) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x0, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xffffff93) 04:17:14 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3015.608617][ T26] audit: type=1804 audit(1559362634.050:256): pid=26867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir810052681/syzkaller.LfrOkV/5057/memory.events" dev="sda1" ino=17030 res=1 04:17:14 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:14 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = socket$kcm(0x2b, 0xfffffffffffffffc, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 3016.093431][T26849] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3016.127255][T26849] CPU: 1 PID: 26849 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3016.135260][T26849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3016.145316][T26849] Call Trace: [ 3016.148619][T26849] dump_stack+0x172/0x1f0 [ 3016.152965][T26849] dump_header+0x10f/0xb6c [ 3016.157396][T26849] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3016.163221][T26849] ? ___ratelimit+0x60/0x595 [ 3016.167824][T26849] ? do_raw_spin_unlock+0x57/0x270 [ 3016.172958][T26849] oom_kill_process.cold+0x10/0x15 [ 3016.178090][T26849] out_of_memory+0x79a/0x1280 [ 3016.182797][T26849] ? lock_downgrade+0x880/0x880 [ 3016.187655][T26849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3016.193911][T26849] ? oom_killer_disable+0x280/0x280 [ 3016.199119][T26849] ? find_held_lock+0x35/0x130 [ 3016.203903][T26849] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3016.209457][T26849] ? memcg_event_wake+0x230/0x230 [ 3016.214498][T26849] ? do_raw_spin_unlock+0x57/0x270 [ 3016.219626][T26849] ? _raw_spin_unlock+0x2d/0x50 [ 3016.224494][T26849] try_charge+0x102c/0x15c0 [ 3016.229004][T26849] ? find_held_lock+0x35/0x130 [ 3016.233795][T26849] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3016.239350][T26849] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3016.244902][T26849] ? find_held_lock+0x35/0x130 [ 3016.249703][T26849] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3016.255258][T26849] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3016.260809][T26849] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3016.266020][T26849] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3016.271577][T26849] __memcg_kmem_charge+0x136/0x300 [ 3016.276705][T26849] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3016.282082][T26849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3016.288349][T26849] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3016.294333][T26849] ? copy_process.part.0+0x43f7/0x6790 [ 3016.299793][T26849] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3016.305088][T26849] ? trace_hardirqs_on+0x67/0x220 [ 3016.310164][T26849] ? kasan_check_read+0x11/0x20 [ 3016.315034][T26849] copy_process.part.0+0x4a0/0x6790 [ 3016.320250][T26849] ? __lock_acquire+0x54f/0x5490 [ 3016.325208][T26849] ? __cleanup_sighand+0x60/0x60 [ 3016.330172][T26849] ? rcu_read_lock_sched_held+0x110/0x130 [ 3016.335894][T26849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3016.342137][T26849] _do_fork+0x25d/0xfe0 [ 3016.346312][T26849] ? copy_init_mm+0x20/0x20 [ 3016.350840][T26849] ? blkcg_maybe_throttle_current+0x5e2/0xfb0 [ 3016.356922][T26849] ? lock_downgrade+0x880/0x880 [ 3016.361770][T26849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3016.367992][T26849] ? blkcg_exit_queue+0x30/0x30 [ 3016.372850][T26849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3016.378298][T26849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3016.383738][T26849] ? do_syscall_64+0x26/0x680 [ 3016.388416][T26849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3016.394471][T26849] ? do_syscall_64+0x26/0x680 [ 3016.399157][T26849] __x64_sys_clone+0xbf/0x150 [ 3016.403916][T26849] do_syscall_64+0xfd/0x680 [ 3016.408406][T26849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3016.414275][T26849] RIP: 0033:0x45bc49 [ 3016.418150][T26849] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3016.437838][T26849] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3016.446238][T26849] RAX: ffffffffffffffda RBX: 00007f2a40c7e700 RCX: 000000000045bc49 [ 3016.461035][T26849] RDX: 00007f2a40c7e9d0 RSI: 00007f2a40c7ddb0 RDI: 00000000003d0f00 [ 3016.469012][T26849] RBP: 00007ffc60c47ca0 R08: 00007f2a40c7e700 R09: 00007f2a40c7e700 [ 3016.476963][T26849] R10: 00007f2a40c7e9d0 R11: 0000000000000202 R12: 0000000000000000 [ 3016.484914][T26849] R13: 00007ffc60c47b3f R14: 00007f2a40c7e9c0 R15: 000000000075c06c [ 3016.496407][T26849] memory: usage 307188kB, limit 307200kB, failcnt 198 [ 3016.503238][T26849] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3016.512345][T26849] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3016.519199][T26849] Memory cgroup stats for /syz4: cache:96KB rss:32KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xe1910100}, 0x0) 04:17:15 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe0d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x9effffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3016.539800][T26849] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26849,uid=0 [ 3016.557131][T26849] Memory cgroup out of memory: Killed process 26849 (syz-executor.4) total-vm:72840kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3016.572531][ T1042] oom_reaper: reaped process 26849 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:15 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3016.705731][T26898] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3016.778749][ T26] audit: type=1804 audit(1559362635.220:257): pid=26867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir810052681/syzkaller.LfrOkV/5057/memory.events" dev="sda1" ino=17030 res=1 [ 3016.870538][ T26] audit: type=1804 audit(1559362635.310:258): pid=26870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir810052681/syzkaller.LfrOkV/5057/memory.events" dev="sda1" ino=17030 res=1 04:17:15 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3016.920207][ T26] audit: type=1804 audit(1559362635.320:259): pid=26905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir810052681/syzkaller.LfrOkV/5057/memory.events" dev="sda1" ino=17030 res=1 04:17:15 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x6) close(r0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r1, r0, 0x0, 0x12, &(0x7f0000000040)='(mime_type-bdev@\'\x00', r2}, 0x30) socketpair$tipc(0x1e, 0xfffffffffffffffd, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r3}) sendmsg$kcm(r5, &(0x7f0000001a40)={&(0x7f0000000540)=@pptp={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0x20}}}, 0x80, &(0x7f00000008c0)=[{&(0x7f00000005c0)="c408b3ec812f9933aa7460ef2dd1e7d351a389f71634e1f5f279c51a9e718e50823d2ecd2a7ef5586499466afae52a44d4c80a7e3e6346a89ea1a27b0f92c99e5f008956661c1cf83dbfa60436d3a5911657ce2c793e0876b2cd3fe0221553ac0a187fd20a719f16b4c1fb6192d1d31646e596341379d5b8b42b3cb9d243d4e9960b8b4f9c4bbadccc84169d416e4897b093315452fcec9df5fdf902e96a0f147b0ae480398a95e63b9f3550c3645dc4f2e4fa722deff0ab5ee36c530102191d1e6200d8358e50a6c4e55e012082404e873968ea89b47025a240890c9ca5", 0xde}, {&(0x7f00000006c0)="65746b5420a0a321cfc752c83d31e1985749dcf3bff14c0e1c68b177c3737bc77a9a2e9fe41610157251baf4844e2b6b1f053c7248cd8e68075e665f937e08e5af4cf63b5cdcac94639cb003cf638b8ceaecad45e413edd02be3e311fe248a", 0x5f}, {&(0x7f0000000740)="6cdf2a54fd798cf2a163ca5d12a2d9c801f52f9bf2f25d2c819613df8f3defc155c9450e4b7734b6d563cdaa3e5623473b1983607c8971bf8e27c9ff31a86cbbd2ea6fe6465b9759482199e6591584eb4fbbe27eceed51f5bfc96c27becf50c8855fc26d4f1fce761a2f9132eea2c84bb784b6301c", 0x75}, {&(0x7f00000007c0)="af44c7127e72beee9d14ea25ba6429eb8f130bdb6f9acd371432cf22250c9a40e28029fad996441c39fa2cfbf942af9bf1264622abe1c3532a24f255c369958d3010123786702ed2bec11eaf75d15137caa27f4bfb5bad05a0de84edf69b0c2a8b501caa6359287ee4c0fbbc40427ae5bd1da597b3033ff7e634ae4bc5452fc7876ab4ea62f1213ad8d4ffe25579691290257df3ed4d2d2fa691c86d05f32f6f53bcc0a8221a55c64a318e634666524d59537de63133c7e6d78aab3a00c43c4e5546f11e2d7c84f171ba0fdcc516d0dcb974510ed4f9b2eaf936311784e8fe1369daeb3846599edb526cd8dbbb8e94552b936e", 0xf3}], 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="10100000000000001100000007000000ae9830823d3d07229b562924cde5de2de5858118dd586308f30117eaa2d9e5a0e2bed3e8f5717b261dd460ecaceeaa22378151c9c0aa6dc8996e35e7caf0f63bb1845c355a9db5c5448db5bad991629ee550946dd72a6b6aa1ffaeb1ca0d583da538ccbb9d6a5e5b863a2e2e2ab1dbf90e4b0d906a319dc113079830215f81cb8782630152f71878ab4c06d5526d940c8290c49c9683b93afd2e97c54cf171e11a8a5499f8bb68e75bcf8ba8d9837745ea63d80bec134220923992fe1dcc4dc5b8adecd286cce07fbd22336658cf6461ed5224aa7daa1768323655cefdacf0f9b3eeb798dcad386f1eca248a2e9011da9f763338fddb1f22a0d08207cbcd19ba15eb3f73fe3b2cd7f34687d2b3b055d3341166dac194604e5eb4da89a156579dbc0c4e814986c41fdade70fd31fe713fe90457ba410af66775d8b7dfbb993fa0e200ee788890fb354ef931a336eabe6c56e1158f24fd66017dc944e5d60b15554e2918a7ec49e95908b5ead46c2e3744cdb944a82a38389570b90a5154374b1bdc8f75076a0176bafb0e34942a630f1cbdadc885ad33bb6ca2cf3f5c98bb02213c92a2fc2306b18cf9be4d473a1d43a9abbc0aa09554686d883a53789e748fa2d03b80826e453cc00452354f3e5f473383d5528485890cd865f2d17e2b9dfe2be857070e0c6ecc5240063638247615028ad96bab862ada6715b092918f22c0812e5c37dc5b1831e56cd15fe54d32206613686926a4310213af7df1c1d278eda4287a0384073d1951bf18c4b74eb7263357305e5c554338af19110f88821afc84a8c3ef8f009ba9d1b9e1b1929a492d95cb756febb69e2d777812616ac452486d05866453cc2c1f0158a7ed12cbb539fadbd042f6ff5051dd5b1fa08dae52cf1a02a1a13919a65e556ad0a5b640ff59839d2d5836b2d7c9102830f5fe84219fc1a019e3232362f9fffa578a18eefb5ae772d10079278e70528ba8701755935be8e27877a70af3afefa8b7697e2a7a6e9eedddcceab40c0750c89d8356afbf2bceb5e6d7a57b9e02b7246cc723ebbfaa81bcacf49d91c6a9c980d8cc82299557308ddf736366ee123637a0586b140767abe5066723f09d38c31fffd07cb19bf7d814003aeff285b1c036e2e4499136d9daf74d25812f1fa64b8815e6c1633fb1da220fc93b098eb357793d9b3d1994f49cfadcfcec6b20bd49a23be97c60b40443810be86e26e37521bdffe4141a19257d7f6b6125e72d7b7eb532308e692253f6072a518b7cc46f2cbbcc1dd18b1f91b81e5a5be244100dd42e21af6150809f3c848ba6e1c6ad0c170959d42be8438ef5a2b6a80820896477c83f3d60230351a8118b78ecc310e87908757cdc468cd828a12620a2e043891fa8b208bdb576954a2d62e436ec2ac6025efd31aeb9bedce87c7d6c84d9360ba48763c860dfede1e6135ea917a44352a388ce2007a06d3f03ed977f08b7cf5c9a708a19f7e0dbf9ce7bae6784c079fe5e16b207610fe68f62c132fe5b31effb71e652be4d0a3779423bb48dba5065e4f6c9080ccf2b5fda1522f931b857049c06291b012037ae801b17abeb318da029f6249fafc1b68c08be4df882f06963017f3a967ae97f468f56aa276587a6cfb573883dcb55a0ec87a33a7c0dea5c7dede1c6b6dfb44aab7d166bb1f3775c7ff32585296bc4987d31b0947c06097534408abc1eb55108165dfd2c795381783d14ee4498a8022a2e16a6daca43603a483e98f4f04e6948bd0ff933788698970db53aef3254fbb6d058807c0160a18fe7d33506fc117cb65b39d554b814d8d0a61595de4bf8e6759afb55217c653f8afc67be0451d90943714f439714b2503de3707d27db99aafece06c78362860c005f7bb583837a2a4dcf90101e6e269cedf899c5f1bf1f4177a08faacf1b27f1203e771a2d696178e332c785fb296155a8f53d5f2528eb7dd2d2a6592f17e6da231251e92d0783f852ec66e3b59a1d042089094c08507d3b4dbef76a78b9f0a09134820cedc6d9086e34e0249e1679fa557c3b3684019f5b14feafc0977699629e3ff515e3840e7fdfb1a3ae2fffde2cf1a3afbe40ef4f44ba2a69530456cadffd3cac40a911b67a8e49c0cfc4352525a44b5513c716a0afb9c95c4b7dbe1f675e451acd4449067fe4f95e4d2232aa69c2184b4afe4539719fb9ace2e7df31019be08f8e9d54c7d52d027224f7489c071fcd868766b75997bfb9079971f9f9e83c67aa72dc240c4863bdabef4401ce0ae5366b203ce74bdb0a3bb077247c173e40304a3c4dc0df26e2e4e09297669a2fa9ef9a118bb883585888dcfe6b60b237bed5537a757977fa59cca12108969ca7542271689c346993dee24f2815b4f64ff31bfaf09fc79e8773c700331e05734106752a4c14f9950468484a031dcfced0fff18265528522d70a9519c76c83a72602c7361ab49246c40ce770f1a6b2f04890f222ea55bad9ce8a4a81137a69dd70afb2b0357d7566566616edfb4bd21f81a3922c1cc9a6caea5b37dfc8fd71357ce7526a9ff7af0d9ffd15a9f2ca293c1f9d03a30869b4974188fcb6d85b3b60a93eb0cfd3274657f20443a84dee3aa8d7505e667a78b420a254cfb23a12f79291f6f2a299a53020c318bc3d27f1a5a25ef2b96c711c4d6302364311042f3955e7e455c6288846a655c1de3a010ffca5252c10ae9f6364c1c6caa7cc73131eb1f01b2f537b550f2376c9609424848ea29c07cfd7f4eb175fb6626ff36d963c50e4478de1ecb0be0915280271cf4e45f794807d9058b5767179372fcd452d7e2577c63c50a78d3d03f5aab0ee49de535dcb3953b06321388a99b172ca258cc4b610d19a3f2b3bd2f6268d81b5facd6b0a6ea532bf9dfc577ed48b473a8b11c5cd74fedfc9b11e6902dfe90af7763f97d3d3bcdc684e24052fec51a1c4d9f2a8552ec24dc1e3f7b8f8526cf150ba2f251b5ee6ebf179e4ddc1e53cc5136d8314604d22a6712d901864d96bb11a30f9325ff1d610c0e6e2acb004bc770a5f5a9b0e64763e046ab755bf03bbe226f8e4603bf1c874e3647c501cd45734023249ac04c5f2b2981456bcfc8080d1413d6d0c07ee57c5a12f9f62d6da8d19910b3323578733744fd826529988d372f014db37f269f213e618eaad7a911591ca2fac90e4ebfa08950936e875a0841a8f1b1039cec902132e39a6e0b6e44c1ab7c62005375cc14cd2f7df7bfab2edaabc4d988bcc697c009ae0d98313aa2ccb8adef2d95a69ee8eb5d30041ac10e4d07ed496915be71dd54a585be095cc6680441b3641410c7403d164f9e6bdd69bf2f61de06aca3bd4c1926b8ce3f0e521e538179ed187839dee04ca240d96ca1196216fee4b3427fb29c05f40a29604df4fc23bd45b02bf104a7918a22eae464340afb896ef4bad1a666ad48897bbac671a466d1f4f97480072bb8233440a79a297470aabd44220170081f16df2835423592d10c9765f5050330c5434009dfde0fa5f465fbf257043709c407ec8b08b423fe40c623e3928ad0318165240955fe6dcba527553e5a5c9350aa406dc0da1b132b9f27fd1ff9871ce87415857d0d2139f950cd5447b01bd5670568582170282c59ea864f7422fd8706d311c2a685a370db73b9dfbee836c605e0319f7d52c8e7428344a080a9216eb1a77d680575c08b727d2583936ebbc634cb0b757b2f72a4b5618556b047bae9ee61e2f42f3c27f601073ea94f8150552e8d2362f7c3cfcd0341dc66c1fbf6f36b4d1240d1794e3a800e1a4d63aecca08c1b8af75026a23ab8fd3bec5dc9c4ede405c7ddec67dfa29fe3e2617a10439502deba84ea3f06593102ce86cb97fe62a6d0406cd3fa6fb9587bd282e50cb016b63058694f1740da1e141f20fc4e2e74dd0f6dc8c2d27ca46aa9b622242f50bd4fbfc778d315dd3ca4037a392273dd9cc6754500aa10053494710af7c52806ab30bf44e5f452897b4cf356f2dcbae750d2e96a81e0beb7472da7adf56613442bf8858df97bb7dec023c64cc82e6e98b016994ec8e975a471d8f386d18d10da64524c0578d64a376c07d48d79096f8378e5a2b2bb20aa0a2e699eea422d4807c497fc0a242ec208d0a3f024c45fee6a3ba25e813e240600c7aa4caaf21533c94b98e0fb1bad97e1527c43722e6e2afef9b6cbb9f6d4c9d5d1ac86f3e8800b05de14acc3f6ec3e76333419c10ad9b3ff23e1b52f83e18b4868602fe771d94b5a8a689aea79dd21ef5bed05b192bee61167b83053435da35b4bd5977313dbdde485122588e9738954211b3c9ebf96a4267c6562f418206d4f51bd5eb0be6b23f3d5bbed446d45fc55a805a11860ecca2b3760740f5ec5d2622f6fb2ef5959d0f1f114ead5f59aa4d2a597e3cb9197e0f375bd6da9874f7a159a755b2b7b227b01e96a66f71fa2f488d010f0f0a6db143db2e867d17285f77430bcc538c5392544ea8e4dfae43b48c65418efde6e651adf0ea7b9cea0a9d242d4446ddfe3bc86a4601be3edfe90fcfd535afeed3b9b46a27af3164900916e2353cf91d7059d29f133b4c2413526476e9b3321edb4204af4f4400790e3330434873a72b3108c3a091db105182747b1584bba4c96b97dc03eb5c78aebbbe32b5c7f69f75315417b869d833327b379ffde14390173c0dda0bbd88ae9f37541533bf4050d9e18dfea39295b1fe7de4726c670548bd58c565996aab60c5a2857a5a5ae13e823fd7dace0e177b8ed4e6606ac70338ee3eb977845def082a398c817493d5f4e05ffb0e89e333584e68cad2ca6b9adff844dfef017d85eaf77a13fb8392d411bf8b5ded1bf6e722d5dd5d50f72c12403c80580207617d3f8dfeb92e29fe40bb6e53481a946d79425a33a5888a276aa9125fe525546cb096aacd774356ec656e1c07a4c65baf4c6f89f2f4ad8ca2b385d1ad07520a2d6d6778d61df2065c82a2d741afc380f9ce04a2bcfb53bd4e8876f47030ee665bb7c32334c2d58890298653ebbed471bd796c2968953c47dd8b2dc15b14030654d694d39fc7d4fd18aab3ce9f3dbd37ec0854ee0efa3b786600dd60877cccf0e2aee7aa3d9699f9f26a04c0daec7a0d3ff45a076274a470192b3d58ae2e38f049911db0c3af1b1527217a692cfc98c0d67f4897c27222c385469ee0daca3d7650396299d06f9ec7e54186ebdef71e2d5c3b5a30cbdad85504ece598ce5800a091fe2717c13a8472ee274135d11d682119af2b9fe7a80659827d7d7587d25752f04454dbcf2a47e1317c1c60c4879543ea131f07a4fcc0d058fc757989b8e8a28936ca87b1516cf0986f0612253f5ba1b3124d15bc8aaa5848eb8089bd925db36b746beeac592081029465742f399b356719f6a30d4391aabd3f17590d9f28fc21eeddfc337e787284d7a89d1b2eb31642a1faa725043dbeb04bc88e11a4ec0c7bec8163213e3e84ec0d2c0f684a1d5eccf2ff6a1fb8ac1db497336f57b7f0656ab7a215c6952a6b66b8a16facc6e600c97dc498e763adfc59b838b77606085648841f7febd7a6e103d5207f6dd86ed00b0238e07e43db05cd2efedfb0439088d9bd00fdb646343337436f256fa8260eb70d8cfcfe21a54c76261580ef48a2c51122da642b681d992e775ddc71965c3a854893bca5a1f5b37c11746140b48812c9d50a9a1ba08052a569bb00d676d4df89ac0ba7e502499803d8ab876b2747bc1ff2a04ccfebb3a898035ad3d1d727cb2daece9e9434e347ebaba6c55a558d07e5fec3c31b509a7e0f2c5c1ffed4fbd8489078d0f1f80000000000000002010000ffffff7f84a919d0c5170b9a4153220a3ed424e6db808f3d5f75fb8c0c63019c3f57b178158f16342cf4403c463aea1e2d2b29added7e10aab03dc08f6937afd83b0cc3b785d516460bc60c5a60c87d8f4343df55e9d722d7a27500ce1e135a8fc3ac9507ef3ad7576173cce70d2eed9cb2a51cf7d33c563725ab64e5f749b1d53a799709fd4bd4fac1936cd6df190417c8808784559b99dd74e2ca2e0cd5738a6af0cac74e8e1632b4369dbf403fc52585ee1e54e2305d674f4f5843e8b028959d71766ddb1c4cce1697437bf440e7da5d349616c4a9187f4d54435251579e1a5292a170f00000000000000200000000000000000000000feffffff6b4cef98781a050600"/4392], 0x1128}, 0x40000) close(r0) r6 = socket$kcm(0x2b, 0x5, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$kcm(0x29, 0x5, 0x0) 04:17:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000000200)=@llc={0x1a, 0x10e, 0x5, 0x7fffffff, 0x8, 0x4, @broadcast}, 0x80, &(0x7f0000002440)=[{&(0x7f0000000280)="de51fd64d9a5757d2f2f78014cc510147f18afadc860a706493709f3e2ac96e8e7baa24f20bb1ca9272cc7adb0713280e5cf7369aec2ee87b6eb5ed5c5fec647985a8347afbdf0126f73ad83f2ea770164af5fa23d2e3fbf8f932638694c1fd402614d25a02108402dc65d36857c5cacc5003019bafe2c6bf5d47b36b487f5debd2ede941e", 0x85}, {&(0x7f0000000100)="180857e095aeb7c467b53e28e50371", 0xf}, {&(0x7f0000000340)="aac737318664e2731755ce4e74133dae2ad87d91cbb92e70db148cc4f4933e9c6b88f5d60364184bb9f544ca8e7439bc643279da6ca1c71d39711e60096745b9a01caa30f6a492ad255ab28ac16f607b2b4fc36f71bb686f926829f48fd5a4bcaf81fd67f7b075c2bf3fc7cd60131fbd9c0c7f9d3b857a3cef709154cdc58a1011aea949ffda65fe0c5c233f77e3d5ba09f7cdaed7e7b864ee67b39215d2f787a163cb0419cbf085a331b85adc255423ddee164286cfc0ddb43de4870b1cb5504004bc999984aed89741066972a89a8497228bc2ab00ba518552fb1415fec56c525f", 0xe2}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="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", 0x1000}], 0x5}, 0x20000010) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000002500)=0x6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) close(r0) r3 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 04:17:15 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:15 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x84) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='+pkds -cpcpu +io \x00'/28], 0x1c) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="6846b1e5ac0ae1b8cc5cefd33586790934b77a0105f2ae98963bbd5c42fd14b328f15ad1d559bb4b72c5613dadfd5a70911139389e5e2c7514579ba1ab9aa5ddeee409f23a0991eac0eabb60d62d1e686c9f547d9c02bec9b042e0290b744f7b424e6826243578452fe8ff061eb45d2355694592bc8408b0dc0ffaafdd10f8c52ad6e1f640079e5ff471865ca00820c1e06953848c7adbd0446202b5de9e9da4a9bccb6dcf45922b0232544693762d14d2ba7eb8a163f008ec134bbdaa714937304ac832bc7f3810c01cab950a2c52a2e2afc2ee47cfd50adac4e1a3bff4e0c3a0d1", 0xe2}, {&(0x7f0000000440)="7cdcab37afa6303cd1bb0c6b3f49a9c249fe3906afcec2b38dd2a992aa95c4392944ac10e2ca2c76713bb754b49e4b6a510958626f95f8469b97d6e102bd87ae5127dd751285a5954ea688ee20971109f9fb29b13d466453a8e0bed66c4cd0dc3c7400325141784aca19ef2d5685f2396c2b67702e84a175b8fcf88a88f9d6e3f58c74e8d2c3deb60636c665246a77dc990904dc3a80d228fb9c7670d70ee75647", 0xa1}, {&(0x7f0000000500)="7e9afc8fd5e4dd097e134a2465256110c2a3551ecab9dbf8be86710cde1e2f1eca8622e57396ef3e0d8e19f02ae60fa64eae32647aba20cb342290c10a601e6f9cc8176b279792c609a0273f56dda3d0d22bf7e17ceed644c999e33c9d10ad8270b24b8161eee9dcf4ecf1f8e216fd6029f802c7862d1a540a6b481a68b69770be9087fb20860e7435438ba9c92e760856da25700e60e0631fecca116f8589627b872992b130b3eda0f38e575a60c34d2f11277f2ba286bec876a6277b4bb46b1ab31cc31ebce4d6850048c1f2a5545e3710e6728fac8136", 0xd8}], 0x3, &(0x7f0000000600)=[{0x38, 0x101, 0x5, "eec131b0058affc9918d23afa62f05dbcbba5eb8bff63fd098e57bca3e782dd0836b2d87a90fac45"}, {0x60, 0x117, 0x800, "53b650e64bcb237a823c32267b4d3c2273cba7cf71fef3919634efd83da634b34f696f15f7a655cce6c29e108a11c6df15cabb3d2e6a4ca62863ecc168a700e12eddb5d115572ecbff013ecf40"}, {0x30, 0x19d, 0x5, "0697a5a862bc368a0e1830b46f8b78f59b00d4d2c20dab0a70a2aabb7b3b"}, {0x20, 0x103, 0x3, "e2daef92b4ebe552c2b043"}, {0x60, 0x0, 0x0, "441f471d7375d084ce48950a33069773f45f4df83b380dc5087238f026b4526439dc66aa95c84f8e6b4a3971059eb63728638757ad460136d42aa7830573876859574855c0c5a3336d8d3950f1"}, {0x50, 0x11f, 0x5, "ccc196b910a2ccd6b041419ad479ece9ba83efa981ec6910b025e02a4805aab97f1ec015cf6d98327f35bdaf74241f18003f90a134ddaa98cc"}, {0x80, 0x100, 0x3, "4c4f77797dc883380ee798f81d2657b293bbc866dc7b0c41f6407bf12546543ec694b8ac4c95b9dd378ec6095b047c468c1e95a70b03800d44a533c253e61c99b567dee7d40633166734f76383170b29df3f73d3e76390d61ec1f964a656e885abc2beabcd624199f40c2a094a"}], 0x218}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x105800, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000000c0)=r3, 0x157) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x3000000000000000, 0x0, 0x4e23}, 0x4d, 0x0, 0x0, 0x0, 0x0, 0xf401}, 0x60) 04:17:15 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3017.544190][T26894] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3017.634389][T26894] CPU: 1 PID: 26894 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3017.642416][T26894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3017.652467][T26894] Call Trace: [ 3017.655778][T26894] dump_stack+0x172/0x1f0 [ 3017.660120][T26894] dump_header+0x10f/0xb6c [ 3017.664549][T26894] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3017.670369][T26894] ? ___ratelimit+0x60/0x595 [ 3017.674971][T26894] ? do_raw_spin_unlock+0x57/0x270 [ 3017.680139][T26894] oom_kill_process.cold+0x10/0x15 [ 3017.685271][T26894] out_of_memory+0x79a/0x1280 [ 3017.689961][T26894] ? lock_downgrade+0x880/0x880 [ 3017.694833][T26894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3017.701086][T26894] ? oom_killer_disable+0x280/0x280 [ 3017.701099][T26894] ? find_held_lock+0x35/0x130 [ 3017.701127][T26894] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3017.701146][T26894] ? memcg_event_wake+0x230/0x230 [ 3017.711103][T26894] ? do_raw_spin_unlock+0x57/0x270 [ 3017.711120][T26894] ? _raw_spin_unlock+0x2d/0x50 [ 3017.711140][T26894] try_charge+0x102c/0x15c0 [ 3017.711152][T26894] ? find_held_lock+0x35/0x130 [ 3017.711176][T26894] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3017.721739][T26894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3017.721757][T26894] ? kasan_check_read+0x11/0x20 [ 3017.721778][T26894] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3017.731727][T26894] mem_cgroup_try_charge+0x24d/0x5e0 [ 3017.731748][T26894] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3017.731771][T26894] wp_page_copy+0x416/0x1770 [ 3017.741102][T26894] ? do_wp_page+0x486/0x1500 [ 3017.741124][T26894] ? pmd_pfn+0x1d0/0x1d0 [ 3017.741153][T26894] ? lock_downgrade+0x880/0x880 [ 3017.752920][T26894] ? swp_swapcount+0x540/0x540 [ 3017.752943][T26894] ? kasan_check_read+0x11/0x20 [ 3017.752964][T26894] ? do_raw_spin_unlock+0x57/0x270 [ 3017.763375][T26894] do_wp_page+0x48e/0x1500 [ 3017.763397][T26894] ? finish_mkwrite_fault+0x540/0x540 [ 3017.763427][T26894] __handle_mm_fault+0x22e3/0x3eb0 [ 3017.774355][T26894] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3017.774370][T26894] ? find_held_lock+0x35/0x130 [ 3017.774384][T26894] ? handle_mm_fault+0x292/0xa90 [ 3017.774407][T26894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3017.774423][T26894] ? kasan_check_read+0x11/0x20 [ 3017.774441][T26894] handle_mm_fault+0x3b7/0xa90 [ 3017.774460][T26894] __do_page_fault+0x5ef/0xda0 [ 3017.774487][T26894] do_page_fault+0x71/0x57d [ 3017.862577][T26894] ? page_fault+0x8/0x30 [ 3017.866859][T26894] page_fault+0x1e/0x30 [ 3017.871196][T26894] RIP: 0033:0x40c4dc [ 3017.875099][T26894] Code: 88 48 20 48 8b 4c 24 50 80 60 20 01 48 89 48 10 48 8b 4c 24 60 48 89 48 18 8b 4c 24 5c 89 48 24 31 c0 48 8b 8c 04 20 01 00 00 <48> 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 e8 1d 71 ff [ 3017.894712][T26894] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010293 [ 3017.900782][T26894] RAX: 0000000000000010 RBX: 0000000000000064 RCX: 0000000000000000 [ 3017.908759][T26894] RDX: 00000000000000a0 RSI: 00007f2a40c9edb0 RDI: 000000000075bfc8 [ 3017.916735][T26894] RBP: 00000000000006c1 R08: 0000000000000000 R09: 00007f2a40c9f700 [ 3017.924706][T26894] R10: 00007f2a40c9f9d0 R11: 0000000000000202 R12: 000000000075bfc0 [ 3017.932660][T26894] R13: 0000000000000005 R14: 0000000000000001 R15: 000000000075bfcc [ 3017.941956][T26894] memory: usage 307200kB, limit 307200kB, failcnt 225 [ 3017.948738][T26894] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3017.956296][T26894] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3017.963436][T26894] Memory cgroup stats for /syz4: cache:96KB rss:32KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3017.984193][T26894] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26894,uid=0 [ 3017.999689][T26894] Memory cgroup out of memory: Killed process 26894 (syz-executor.4) total-vm:72708kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3018.014486][ T1042] oom_reaper: reaped process 26894 (syz-executor.4), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 04:17:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xe2910100}, 0x0) 04:17:16 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={r2}) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="a9fc20fc643ee9f01872117dba2da22a7b3a3a3f4435957d3321fdb4c7c651696b177db48eb52290a42bbcdcb6816c39f07e0e7d5c142c46499f0c46ed86f7e8f8440f9e0893aad21dacbab96bb5025a7e0ec7bea4bffd36ebcc9ca198b22e0f093752bac011a903e949c96afb68c521828e13102b4eb04a08ccf8a581c47a93f7030ec3b58fbf1126fed45a1e", 0xfffffdad}], 0x1, 0x0, 0xfffffffffffffdeb}, 0x0) close(r0) r3 = socket$kcm(0x2b, 0x2, 0x0) write$cgroup_int(r1, 0x0, 0xfffffffffffffd18) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:17:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe1d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xa0008000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:16 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x84) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='+pkds -cpcpu +io \x00'/28], 0x1c) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="6846b1e5ac0ae1b8cc5cefd33586790934b77a0105f2ae98963bbd5c42fd14b328f15ad1d559bb4b72c5613dadfd5a70911139389e5e2c7514579ba1ab9aa5ddeee409f23a0991eac0eabb60d62d1e686c9f547d9c02bec9b042e0290b744f7b424e6826243578452fe8ff061eb45d2355694592bc8408b0dc0ffaafdd10f8c52ad6e1f640079e5ff471865ca00820c1e06953848c7adbd0446202b5de9e9da4a9bccb6dcf45922b0232544693762d14d2ba7eb8a163f008ec134bbdaa714937304ac832bc7f3810c01cab950a2c52a2e2afc2ee47cfd50adac4e1a3bff4e0c3a0d1", 0xe2}, {&(0x7f0000000440)="7cdcab37afa6303cd1bb0c6b3f49a9c249fe3906afcec2b38dd2a992aa95c4392944ac10e2ca2c76713bb754b49e4b6a510958626f95f8469b97d6e102bd87ae5127dd751285a5954ea688ee20971109f9fb29b13d466453a8e0bed66c4cd0dc3c7400325141784aca19ef2d5685f2396c2b67702e84a175b8fcf88a88f9d6e3f58c74e8d2c3deb60636c665246a77dc990904dc3a80d228fb9c7670d70ee75647", 0xa1}, {&(0x7f0000000500)="7e9afc8fd5e4dd097e134a2465256110c2a3551ecab9dbf8be86710cde1e2f1eca8622e57396ef3e0d8e19f02ae60fa64eae32647aba20cb342290c10a601e6f9cc8176b279792c609a0273f56dda3d0d22bf7e17ceed644c999e33c9d10ad8270b24b8161eee9dcf4ecf1f8e216fd6029f802c7862d1a540a6b481a68b69770be9087fb20860e7435438ba9c92e760856da25700e60e0631fecca116f8589627b872992b130b3eda0f38e575a60c34d2f11277f2ba286bec876a6277b4bb46b1ab31cc31ebce4d6850048c1f2a5545e3710e6728fac8136", 0xd8}], 0x3, &(0x7f0000000600)=[{0x38, 0x101, 0x5, "eec131b0058affc9918d23afa62f05dbcbba5eb8bff63fd098e57bca3e782dd0836b2d87a90fac45"}, {0x60, 0x117, 0x800, "53b650e64bcb237a823c32267b4d3c2273cba7cf71fef3919634efd83da634b34f696f15f7a655cce6c29e108a11c6df15cabb3d2e6a4ca62863ecc168a700e12eddb5d115572ecbff013ecf40"}, {0x30, 0x19d, 0x5, "0697a5a862bc368a0e1830b46f8b78f59b00d4d2c20dab0a70a2aabb7b3b"}, {0x20, 0x103, 0x3, "e2daef92b4ebe552c2b043"}, {0x60, 0x0, 0x0, "441f471d7375d084ce48950a33069773f45f4df83b380dc5087238f026b4526439dc66aa95c84f8e6b4a3971059eb63728638757ad460136d42aa7830573876859574855c0c5a3336d8d3950f1"}, {0x50, 0x11f, 0x5, "ccc196b910a2ccd6b041419ad479ece9ba83efa981ec6910b025e02a4805aab97f1ec015cf6d98327f35bdaf74241f18003f90a134ddaa98cc"}, {0x80, 0x100, 0x3, "4c4f77797dc883380ee798f81d2657b293bbc866dc7b0c41f6407bf12546543ec694b8ac4c95b9dd378ec6095b047c468c1e95a70b03800d44a533c253e61c99b567dee7d40633166734f76383170b29df3f73d3e76390d61ec1f964a656e885abc2beabcd624199f40c2a094a"}], 0x218}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x105800, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000000c0)=r3, 0x157) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x3000000000000000, 0x0, 0x4e23}, 0x4d, 0x0, 0x0, 0x0, 0x0, 0xf401}, 0x60) 04:17:16 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:16 executing program 5: r0 = socket$kcm(0xa, 0x4, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x7, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x17, 0x7, 0x5, 0x0, 0x4, 0x1, 0x7, [], 0x0, r0, 0x0, 0x4}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f0000000140)}, 0x10) socketpair$unix(0x1, 0x800000000, 0x0, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000001e40)={&(0x7f0000000440)=@isdn={0x22, 0x3, 0x7ff, 0x0, 0x81}, 0x80, 0x0}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000100)) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000001e80)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000001ec0)='cpuacct.usage_sys\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r6 = socket$kcm(0xa, 0x0, 0x88) recvmsg(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/69, 0x45}, {&(0x7f0000000340)=""/7, 0x7}], 0x2, &(0x7f00000003c0)=""/19, 0x13}, 0x40000000) setsockopt$sock_attach_bpf(r5, 0x1, 0x25, &(0x7f00000001c0), 0x4) recvmsg$kcm(r6, &(0x7f0000002080)={&(0x7f0000001900)=@isdn, 0x80, 0x0}, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r7) socket$kcm(0x2b, 0x4000000000000001, 0x0) 04:17:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3018.335703][T26961] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 04:17:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2d, 'rdma'}, {0x2b, 'pids'}, {0x2f, 'io'}, {0x2b, 'pids'}, {0x2f, 'cpu'}]}, 0x1b) write$cgroup_int(r0, &(0x7f0000000080), 0x12) openat$cgroup_ro(r0, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0xfffffffffffffffe) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='+pirdma \x00pids /ryma -dpu +pids \x00memory'], 0x26) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000140)=r0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) [ 3018.428596][T26961] CPU: 1 PID: 26961 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3018.436842][T26961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3018.446900][T26961] Call Trace: [ 3018.450197][T26961] dump_stack+0x172/0x1f0 [ 3018.454551][T26961] dump_header+0x10f/0xb6c [ 3018.458975][T26961] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3018.464820][T26961] ? ___ratelimit+0x60/0x595 [ 3018.469416][T26961] ? do_raw_spin_unlock+0x57/0x270 [ 3018.474542][T26961] oom_kill_process.cold+0x10/0x15 [ 3018.479664][T26961] out_of_memory+0x79a/0x1280 [ 3018.479684][T26961] ? lock_downgrade+0x880/0x880 [ 3018.479699][T26961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3018.479717][T26961] ? oom_killer_disable+0x280/0x280 [ 3018.479730][T26961] ? find_held_lock+0x35/0x130 [ 3018.479755][T26961] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3018.512030][T26961] ? memcg_event_wake+0x230/0x230 [ 3018.517078][T26961] ? do_raw_spin_unlock+0x57/0x270 [ 3018.522212][T26961] ? _raw_spin_unlock+0x2d/0x50 [ 3018.522234][T26961] try_charge+0x102c/0x15c0 [ 3018.522248][T26961] ? find_held_lock+0x35/0x130 [ 3018.522273][T26961] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3018.522292][T26961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3018.522310][T26961] ? kasan_check_read+0x11/0x20 [ 3018.522331][T26961] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3018.558591][T26961] mem_cgroup_try_charge+0x24d/0x5e0 [ 3018.563896][T26961] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3018.569549][T26961] wp_page_copy+0x416/0x1770 [ 3018.574164][T26961] ? do_wp_page+0x486/0x1500 [ 3018.578778][T26961] ? pmd_pfn+0x1d0/0x1d0 [ 3018.583038][T26961] ? lock_downgrade+0x880/0x880 [ 3018.587902][T26961] ? __pte_alloc_kernel+0x220/0x220 [ 3018.593129][T26961] ? kasan_check_read+0x11/0x20 [ 3018.598001][T26961] ? do_raw_spin_unlock+0x57/0x270 [ 3018.603136][T26961] do_wp_page+0x48e/0x1500 [ 3018.607562][T26961] ? do_raw_spin_lock+0x12a/0x2e0 [ 3018.612601][T26961] ? rwlock_bug.part.0+0x90/0x90 [ 3018.617566][T26961] ? finish_mkwrite_fault+0x540/0x540 [ 3018.622963][T26961] ? add_mm_counter_fast.part.0+0x40/0x40 [ 3018.628705][T26961] __handle_mm_fault+0x22e3/0x3eb0 [ 3018.633836][T26961] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3018.639402][T26961] ? find_held_lock+0x35/0x130 [ 3018.644183][T26961] ? handle_mm_fault+0x292/0xa90 [ 3018.649148][T26961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3018.655406][T26961] ? kasan_check_read+0x11/0x20 [ 3018.660278][T26961] handle_mm_fault+0x3b7/0xa90 [ 3018.665059][T26961] __do_page_fault+0x5ef/0xda0 [ 3018.666025][ T26] audit: type=1804 audit(1559362636.870:260): pid=26983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir810052681/syzkaller.LfrOkV/5061/memory.events" dev="sda1" ino=16724 res=1 [ 3018.669854][T26961] do_page_fault+0x71/0x57d [ 3018.669871][T26961] ? page_fault+0x8/0x30 [ 3018.669888][T26961] page_fault+0x1e/0x30 [ 3018.669900][T26961] RIP: 0033:0x40e418 04:17:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe2d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3018.669915][T26961] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf 31 e8 4b 00 31 c0 e8 63 38 ff ff 31 ff e8 ac 34 ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 20 66 00 [ 3018.669923][T26961] RSP: 002b:00007ffc60c47af0 EFLAGS: 00010246 [ 3018.737833][T26961] RAX: 00000000b439889f RBX: 00000000ac37c196 RCX: 0000001b2f520000 [ 3018.745806][T26961] RDX: 0000000000000000 RSI: 000000000000089f RDI: ffffffffb439889f [ 3018.745815][T26961] RBP: 0000000000000001 R08: 00000000b439889f R09: 00000000b43988a3 [ 3018.745822][T26961] R10: 00007ffc60c47c90 R11: 0000000000000246 R12: 000000000075bfa8 [ 3018.745830][T26961] R13: 0000000080000000 R14: 00007f2a42cc1008 R15: 0000000000000001 04:17:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2d, 'rdma'}, {0x2b, 'pids'}, {0x2f, 'io'}, {0x2b, 'pids'}, {0x2f, 'cpu'}]}, 0x1b) write$cgroup_int(r0, &(0x7f0000000080), 0x12) openat$cgroup_ro(r0, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0xfffffffffffffffe) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='+pirdma \x00pids /ryma -dpu +pids \x00memory'], 0x26) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000140)=r0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) [ 3018.918623][T26961] memory: usage 307200kB, limit 307200kB, failcnt 267 [ 3018.931411][T26961] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3018.960402][T26961] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3019.024573][T26961] Memory cgroup stats for /syz4: cache:96KB rss:32KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3019.080925][ T26] audit: type=1804 audit(1559362637.520:261): pid=26996 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir810052681/syzkaller.LfrOkV/5062/memory.events" dev="sda1" ino=16728 res=1 [ 3019.151283][T26961] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26961,uid=0 04:17:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xe3910100}, 0x0) 04:17:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xa0010000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe1d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3019.209551][T26961] Memory cgroup out of memory: Killed process 26961 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3019.224705][ T1042] oom_reaper: reaped process 26961 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:17 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xfffffc2a, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:17:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe3d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3019.453211][T27017] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3019.559135][T27017] CPU: 0 PID: 27017 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3019.567164][T27017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3019.577246][T27017] Call Trace: [ 3019.580555][T27017] dump_stack+0x172/0x1f0 [ 3019.584907][T27017] dump_header+0x10f/0xb6c [ 3019.589332][T27017] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3019.595162][T27017] ? ___ratelimit+0x60/0x595 [ 3019.599763][T27017] ? do_raw_spin_unlock+0x57/0x270 04:17:18 executing program 2: r0 = socket$kcm(0xa, 0x4, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x7, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x17, 0x7, 0x5, 0x0, 0x4, 0x1, 0x7, [], 0x0, r0, 0x0, 0x4}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f0000000140)}, 0x10) socketpair$unix(0x1, 0x800000000, 0x0, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000001e40)={&(0x7f0000000440)=@isdn={0x22, 0x3, 0x7ff, 0x0, 0x81}, 0x80, 0x0}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000100)) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'gre0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000001e80)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000001ec0)='cpuacct.usage_sys\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r6 = socket$kcm(0xa, 0x0, 0x88) recvmsg(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/69, 0x45}, {&(0x7f0000000340)=""/7, 0x7}], 0x2, &(0x7f00000003c0)=""/19, 0x13}, 0x40000000) setsockopt$sock_attach_bpf(r5, 0x1, 0x25, &(0x7f00000001c0), 0x4) recvmsg$kcm(r6, &(0x7f0000002080)={&(0x7f0000001900)=@isdn, 0x80, 0x0}, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r7) socket$kcm(0x2b, 0x4000000000000001, 0x0) [ 3019.604899][T27017] oom_kill_process.cold+0x10/0x15 [ 3019.610031][T27017] out_of_memory+0x79a/0x1280 [ 3019.610049][T27017] ? lock_downgrade+0x880/0x880 [ 3019.610065][T27017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3019.610085][T27017] ? oom_killer_disable+0x280/0x280 [ 3019.625854][T27017] ? find_held_lock+0x35/0x130 [ 3019.625886][T27017] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3019.625906][T27017] ? memcg_event_wake+0x230/0x230 [ 3019.646466][T27017] ? do_raw_spin_unlock+0x57/0x270 [ 3019.651649][T27017] ? _raw_spin_unlock+0x2d/0x50 [ 3019.656514][T27017] try_charge+0x102c/0x15c0 [ 3019.661072][T27017] ? find_held_lock+0x35/0x130 [ 3019.665883][T27017] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3019.671454][T27017] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3019.677018][T27017] ? find_held_lock+0x35/0x130 [ 3019.681804][T27017] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3019.687382][T27017] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3019.692983][T27017] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3019.698215][T27017] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3019.703780][T27017] __memcg_kmem_charge+0x136/0x300 [ 3019.708909][T27017] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3019.714303][T27017] ? get_futex_key+0x1660/0x1660 [ 3019.719255][T27017] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3019.724996][T27017] ? __lock_acquire+0x54f/0x5490 [ 3019.729963][T27017] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3019.735697][T27017] ? do_huge_pmd_anonymous_page+0x420/0x1660 [ 3019.741696][T27017] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3019.747957][T27017] alloc_pages_current+0x107/0x210 [ 3019.753092][T27017] pte_alloc_one+0x1b/0x1a0 [ 3019.757642][T27017] __pte_alloc+0x20/0x310 [ 3019.761990][T27017] __handle_mm_fault+0x3386/0x3eb0 [ 3019.767167][T27017] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3019.772759][T27017] ? find_held_lock+0x35/0x130 [ 3019.777537][T27017] ? handle_mm_fault+0x292/0xa90 [ 3019.782503][T27017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3019.788762][T27017] ? kasan_check_read+0x11/0x20 [ 3019.793640][T27017] handle_mm_fault+0x3b7/0xa90 [ 3019.798427][T27017] __do_page_fault+0x5ef/0xda0 [ 3019.803211][T27017] do_page_fault+0x71/0x57d [ 3019.807730][T27017] ? page_fault+0x8/0x30 [ 3019.811999][T27017] page_fault+0x1e/0x30 [ 3019.816168][T27017] RIP: 0033:0x40c4f3 [ 3019.820071][T27017] Code: 48 18 8b 4c 24 5c 89 48 24 31 c0 48 8b 8c 04 20 01 00 00 48 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 e8 1d 71 ff ff <83> 05 0a 3b 55 00 01 80 7c 24 1e 00 74 0b f6 44 24 18 01 0f 84 89 [ 3019.839731][T27017] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010217 [ 3019.845813][T27017] RAX: 0000000000000000 RBX: 0000000000000064 RCX: 0000000000459279 04:17:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xa0028000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3019.853793][T27017] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 3019.861766][T27017] RBP: 00000000000006c1 R08: 00007f2a40cc0700 R09: ffffffffffffffff [ 3019.869765][T27017] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 3019.877743][T27017] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3019.921438][T27017] memory: usage 307200kB, limit 307200kB, failcnt 287 [ 3019.928307][T27017] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3020.036501][T27017] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe4d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3020.076309][T27017] Memory cgroup stats for /syz4: cache:96KB rss:164KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3020.194136][T27017] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27017,uid=0 04:17:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3020.396622][T27017] Memory cgroup out of memory: Killed process 27017 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xe4ffffff}, 0x0) 04:17:18 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/240, 0xd932}, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000]}, 0x7}, 0x80, &(0x7f0000000340), 0x16, &(0x7f0000000180)}, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r3 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:17:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xc00e0000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe5d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3020.482228][ T1042] oom_reaper: reaped process 27017 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='GPL\x00', r0}, 0x10) 04:17:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3020.746553][T27082] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 3020.768374][T27095] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3020.858481][T27095] CPU: 1 PID: 27095 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3020.866514][T27095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3020.876573][T27095] Call Trace: [ 3020.879892][T27095] dump_stack+0x172/0x1f0 [ 3020.884259][T27095] dump_header+0x10f/0xb6c [ 3020.888718][T27095] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3020.894548][T27095] ? ___ratelimit+0x60/0x595 [ 3020.899157][T27095] ? do_raw_spin_unlock+0x57/0x270 [ 3020.904287][T27095] oom_kill_process.cold+0x10/0x15 [ 3020.909413][T27095] out_of_memory+0x79a/0x1280 [ 3020.914120][T27095] ? lock_downgrade+0x880/0x880 [ 3020.918989][T27095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3020.925243][T27095] ? oom_killer_disable+0x280/0x280 [ 3020.930447][T27095] ? find_held_lock+0x35/0x130 [ 3020.935233][T27095] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3020.940784][T27095] ? memcg_event_wake+0x230/0x230 [ 3020.945857][T27095] ? do_raw_spin_unlock+0x57/0x270 [ 3020.951000][T27095] ? _raw_spin_unlock+0x2d/0x50 [ 3020.955867][T27095] try_charge+0x102c/0x15c0 [ 3020.960371][T27095] ? find_held_lock+0x35/0x130 [ 3020.965151][T27095] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3020.970697][T27095] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3020.976241][T27095] ? find_held_lock+0x35/0x130 [ 3020.981000][T27095] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3020.986553][T27095] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3020.992113][T27095] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3020.997320][T27095] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3021.002865][T27095] __memcg_kmem_charge+0x136/0x300 [ 3021.007978][T27095] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3021.013356][T27095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3021.019598][T27095] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3021.025321][T27095] ? copy_process.part.0+0x43f7/0x6790 [ 3021.030779][T27095] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3021.036074][T27095] ? trace_hardirqs_on+0x67/0x220 [ 3021.041135][T27095] ? kasan_check_read+0x11/0x20 [ 3021.045986][T27095] copy_process.part.0+0x4a0/0x6790 [ 3021.051208][T27095] ? __lock_acquire+0x54f/0x5490 [ 3021.056170][T27095] ? __cleanup_sighand+0x60/0x60 [ 3021.061121][T27095] ? rcu_read_lock_sched_held+0x110/0x130 [ 3021.066848][T27095] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3021.073110][T27095] _do_fork+0x25d/0xfe0 [ 3021.077276][T27095] ? copy_init_mm+0x20/0x20 [ 3021.081804][T27095] ? blkcg_maybe_throttle_current+0x5e2/0xfb0 [ 3021.087889][T27095] ? lock_downgrade+0x880/0x880 [ 3021.092736][T27095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3021.098977][T27095] ? blkcg_exit_queue+0x30/0x30 [ 3021.103835][T27095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3021.109288][T27095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3021.114764][T27095] ? do_syscall_64+0x26/0x680 [ 3021.119437][T27095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3021.125499][T27095] ? do_syscall_64+0x26/0x680 [ 3021.130182][T27095] __x64_sys_clone+0xbf/0x150 [ 3021.134877][T27095] do_syscall_64+0xfd/0x680 [ 3021.139381][T27095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3021.145264][T27095] RIP: 0033:0x45bc49 [ 3021.149156][T27095] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3021.168755][T27095] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3021.177166][T27095] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3021.185168][T27095] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3021.193138][T27095] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3021.201121][T27095] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3021.209111][T27095] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe6d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:19 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={r1}) 04:17:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0xb395, 0x4, 0x40, 0x80, 0xffffffffffffff9c, 0x4, [], 0x0, 0xffffffffffffff9c, 0x4, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f00000000c0)="ac4bb88b12273d40f2584bebdae712bc5631915bbcabce96a443a078fad7784ed24858498b19", &(0x7f0000000100)="523ec5c1da93840cba9a02f18aabcfa110d98c5a5067623ffea481f6907abeaea401fa272df5ca8638611b30f76e1c6f252b5fda3efb97114867e08c2fbb1cdfe8fb7aecd201d5dd900e5bf8f8a096", 0x4}, 0x20) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'bridge0\x00', @random="01003a1e2410"}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) [ 3021.491303][T27095] memory: usage 307172kB, limit 307200kB, failcnt 318 [ 3021.498132][T27095] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3021.498140][T27095] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3021.498146][T27095] Memory cgroup stats for /syz4: cache:96KB rss:164KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3021.710230][T27095] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27095,uid=0 [ 3021.777546][T27095] Memory cgroup out of memory: Killed process 27095 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3021.877136][ T1042] oom_reaper: reaped process 27095 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 04:17:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe7d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) 04:17:20 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r3 = socket$kcm(0x2b, 0x5, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) close(r1) 04:17:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0xb395, 0x4, 0x40, 0x80, 0xffffffffffffff9c, 0x4, [], 0x0, 0xffffffffffffff9c, 0x4, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f00000000c0)="ac4bb88b12273d40f2584bebdae712bc5631915bbcabce96a443a078fad7784ed24858498b19", &(0x7f0000000100)="523ec5c1da93840cba9a02f18aabcfa110d98c5a5067623ffea481f6907abeaea401fa272df5ca8638611b30f76e1c6f252b5fda3efb97114867e08c2fbb1cdfe8fb7aecd201d5dd900e5bf8f8a096", 0x4}, 0x20) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'bridge0\x00', @random="01003a1e2410"}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) [ 3022.055540][T27154] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3022.094378][T27154] CPU: 0 PID: 27154 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3022.102550][T27154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3022.112611][T27154] Call Trace: [ 3022.115929][T27154] dump_stack+0x172/0x1f0 [ 3022.120281][T27154] dump_header+0x10f/0xb6c [ 3022.124713][T27154] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3022.130529][T27154] ? ___ratelimit+0x60/0x595 [ 3022.135135][T27154] ? do_raw_spin_unlock+0x57/0x270 [ 3022.140260][T27154] oom_kill_process.cold+0x10/0x15 [ 3022.145389][T27154] out_of_memory+0x79a/0x1280 [ 3022.150082][T27154] ? lock_downgrade+0x880/0x880 [ 3022.154959][T27154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3022.161231][T27154] ? oom_killer_disable+0x280/0x280 [ 3022.166431][T27154] ? find_held_lock+0x35/0x130 [ 3022.171226][T27154] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3022.176785][T27154] ? memcg_event_wake+0x230/0x230 [ 3022.181832][T27154] ? do_raw_spin_unlock+0x57/0x270 [ 3022.186957][T27154] ? _raw_spin_unlock+0x2d/0x50 [ 3022.192106][T27154] try_charge+0x102c/0x15c0 [ 3022.196622][T27154] ? find_held_lock+0x35/0x130 [ 3022.201430][T27154] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3022.207008][T27154] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3022.212584][T27154] ? find_held_lock+0x35/0x130 [ 3022.217360][T27154] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3022.222938][T27154] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3022.228496][T27154] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3022.233705][T27154] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3022.239259][T27154] __memcg_kmem_charge+0x136/0x300 [ 3022.244379][T27154] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3022.249758][T27154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3022.256007][T27154] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3022.261737][T27154] ? copy_process.part.0+0x43f7/0x6790 [ 3022.267206][T27154] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3022.272511][T27154] ? trace_hardirqs_on+0x67/0x220 [ 3022.277544][T27154] ? kasan_check_read+0x11/0x20 [ 3022.282425][T27154] copy_process.part.0+0x4a0/0x6790 [ 3022.287635][T27154] ? __lock_acquire+0x54f/0x5490 [ 3022.292591][T27154] ? __cleanup_sighand+0x60/0x60 [ 3022.297549][T27154] ? rcu_read_lock_sched_held+0x110/0x130 [ 3022.303284][T27154] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3022.309543][T27154] _do_fork+0x25d/0xfe0 [ 3022.313735][T27154] ? copy_init_mm+0x20/0x20 [ 3022.318252][T27154] ? blkcg_maybe_throttle_current+0x5e2/0xfb0 [ 3022.324327][T27154] ? lock_downgrade+0x880/0x880 [ 3022.329184][T27154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3022.335451][T27154] ? blkcg_exit_queue+0x30/0x30 [ 3022.340313][T27154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3022.345812][T27154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3022.351281][T27154] ? do_syscall_64+0x26/0x680 [ 3022.355988][T27154] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3022.362061][T27154] ? do_syscall_64+0x26/0x680 [ 3022.366786][T27154] __x64_sys_clone+0xbf/0x150 [ 3022.371528][T27154] do_syscall_64+0xfd/0x680 [ 3022.376076][T27154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3022.382031][T27154] RIP: 0033:0x45bc49 [ 3022.385934][T27154] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 04:17:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3022.405990][T27154] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3022.414420][T27154] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3022.422410][T27154] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3022.430386][T27154] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3022.438385][T27154] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3022.446389][T27154] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:20 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000540)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x80, 0x0, 0x0, 0x0, 0xc0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000540)=@hci, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.cpu/syz\xf0\xda\x0f5\x1cUc\xd9\xef\x17\x95\xbe\xb7\xa3\xff\x97w\xf7DV\x15~\x03\x02>5=94\xf9\x91U\x03\xf4\xc3\xda\xf1/\xe4\x9f\xfe\x90\x1e{\x8e\x81\v\x95h\xabA\xea\xbe\x81\xfa.\xb6Jk\xa0\xeb\x108\x12c\x8c\xf2T\xd0\xcf\x9d\x02\xe0\'\xdb\x80m\x9bV\'\xf9I&\x1b\xde6\xfc\xc3\x8d\x9f\x9b\x9c\x10\xdc\x81Og\x1f\xd7`\x7f\x8c\xd5\xa0V\xc9((\x87\xba\xafq\x9f\\e\x03\x15c\xa5\x13#@\x8d\xff^\x18\x1f\"\x11\x81\xd4\x14\x03\xd1\xe5\xaa\"\xfc\x14QK\x13cLJh\xca\xb0,\xa3\xdd\x7fz\x97\xe5\xa0\xe1\xcdb}Lp\x85\xc4\x12?ZS/\x84\x84@w\xde\x81\x9d\fe\xab\x80#\xa1]R\x17>\xa1\xf5\xf6\x8bTwb\x86\xbd\x8c\x18\xe9rn}@fS\x0f\xa8\xde\xf1\xb3\x7f68\xd0[Rt\xcf \x85\xcag3\xc0W\xa9v\xa9\xb1j=C\xc6\x95uVW', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu\xed\xe1?\xd1W\xfe\xf7\xf1#accc\xb5\xbaz\xa4\xf0\xcf-@\x91c\xdax\xa8\t\x9buE\x81\x81\xaa\x1d\xf1\xa94B/F\x85D!\xa4\x85f\x96\xf9\xe7\xe7\x01m-\xee43`\x85\xc1/N\xf0\x7f]\x9d|*\xea7+\xfc\x15\xe1\xa8\xb0\x8deK\xf3\xb2!\xee\xc92P\x91', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x649}, 0x28) openat$cgroup(0xffffffffffffffff, &(0x7f00000008c0)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000003100817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8936, &(0x7f0000000000)={r1}) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x16) r3 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x8, 0x0, 0x0) 04:17:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe8d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3022.514633][T27154] memory: usage 307172kB, limit 307200kB, failcnt 357 [ 3022.550580][T27154] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3022.572030][T27154] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3022.600886][T27154] Memory cgroup stats for /syz4: cache:96KB rss:164KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3022.657254][T27185] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3022.702295][T27154] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27154,uid=0 04:17:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3022.769866][T27154] Memory cgroup out of memory: Killed process 27154 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xffffff7f, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3022.835578][ T1042] oom_reaper: reaped process 27154 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:17:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xfdffffff}, 0x0) 04:17:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xe9d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3023.108823][T27206] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 04:17:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, 0x0, 0xfc) [ 3023.168857][T27206] CPU: 1 PID: 27206 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3023.176872][T27206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3023.186930][T27206] Call Trace: [ 3023.190271][T27206] dump_stack+0x172/0x1f0 [ 3023.194627][T27206] dump_header+0x10f/0xb6c [ 3023.199057][T27206] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3023.204867][T27206] ? ___ratelimit+0x60/0x595 [ 3023.209476][T27206] ? do_raw_spin_unlock+0x57/0x270 [ 3023.214599][T27206] oom_kill_process.cold+0x10/0x15 [ 3023.219732][T27206] out_of_memory+0x79a/0x1280 [ 3023.224421][T27206] ? lock_downgrade+0x880/0x880 [ 3023.229278][T27206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3023.236650][T27206] ? oom_killer_disable+0x280/0x280 [ 3023.241861][T27206] ? find_held_lock+0x35/0x130 [ 3023.246648][T27206] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3023.252211][T27206] ? memcg_event_wake+0x230/0x230 [ 3023.257248][T27206] ? do_raw_spin_unlock+0x57/0x270 [ 3023.262373][T27206] ? _raw_spin_unlock+0x2d/0x50 [ 3023.267242][T27206] try_charge+0x102c/0x15c0 [ 3023.271755][T27206] ? find_held_lock+0x35/0x130 [ 3023.276558][T27206] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3023.282123][T27206] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3023.287707][T27206] ? find_held_lock+0x35/0x130 [ 3023.292481][T27206] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3023.298031][T27206] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3023.303584][T27206] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3023.308805][T27206] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3023.314378][T27206] __memcg_kmem_charge+0x136/0x300 [ 3023.319515][T27206] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3023.324896][T27206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3023.331148][T27206] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3023.336881][T27206] ? copy_process.part.0+0x43f7/0x6790 [ 3023.342363][T27206] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3023.347662][T27206] ? trace_hardirqs_on+0x67/0x220 [ 3023.352692][T27206] ? kasan_check_read+0x11/0x20 [ 3023.357590][T27206] copy_process.part.0+0x4a0/0x6790 04:17:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, 0x0, 0xfc) [ 3023.368972][T27206] ? __lock_acquire+0x54f/0x5490 [ 3023.373939][T27206] ? __cleanup_sighand+0x60/0x60 [ 3023.378897][T27206] ? rcu_read_lock_sched_held+0x110/0x130 [ 3023.384628][T27206] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3023.390882][T27206] _do_fork+0x25d/0xfe0 [ 3023.395059][T27206] ? copy_init_mm+0x20/0x20 [ 3023.399593][T27206] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3023.405672][T27206] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3023.411140][T27206] ? do_syscall_64+0x26/0x680 [ 3023.415823][T27206] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3023.415842][T27206] ? do_syscall_64+0x26/0x680 [ 3023.426582][T27206] __x64_sys_clone+0xbf/0x150 [ 3023.431288][T27206] do_syscall_64+0xfd/0x680 [ 3023.435803][T27206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3023.435815][T27206] RIP: 0033:0x45bc49 [ 3023.435831][T27206] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 04:17:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, 0x0, 0xfc) [ 3023.435845][T27206] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3023.473633][T27206] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3023.481610][T27206] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3023.489593][T27206] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3023.497604][T27206] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3023.505589][T27206] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xead\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3023.522435][T27206] memory: usage 307176kB, limit 307200kB, failcnt 390 [ 3023.568579][T27206] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3023.605737][T27206] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3023.643801][T27206] Memory cgroup stats for /syz4: cache:96KB rss:164KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:22 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000540)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x80, 0x0, 0x0, 0x0, 0xc0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000540)=@hci, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.cpu/syz\xf0\xda\x0f5\x1cUc\xd9\xef\x17\x95\xbe\xb7\xa3\xff\x97w\xf7DV\x15~\x03\x02>5=94\xf9\x91U\x03\xf4\xc3\xda\xf1/\xe4\x9f\xfe\x90\x1e{\x8e\x81\v\x95h\xabA\xea\xbe\x81\xfa.\xb6Jk\xa0\xeb\x108\x12c\x8c\xf2T\xd0\xcf\x9d\x02\xe0\'\xdb\x80m\x9bV\'\xf9I&\x1b\xde6\xfc\xc3\x8d\x9f\x9b\x9c\x10\xdc\x81Og\x1f\xd7`\x7f\x8c\xd5\xa0V\xc9((\x87\xba\xafq\x9f\\e\x03\x15c\xa5\x13#@\x8d\xff^\x18\x1f\"\x11\x81\xd4\x14\x03\xd1\xe5\xaa\"\xfc\x14QK\x13cLJh\xca\xb0,\xa3\xdd\x7fz\x97\xe5\xa0\xe1\xcdb}Lp\x85\xc4\x12?ZS/\x84\x84@w\xde\x81\x9d\fe\xab\x80#\xa1]R\x17>\xa1\xf5\xf6\x8bTwb\x86\xbd\x8c\x18\xe9rn}@fS\x0f\xa8\xde\xf1\xb3\x7f68\xd0[Rt\xcf \x85\xcag3\xc0W\xa9v\xa9\xb1j=C\xc6\x95uVW', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu\xed\xe1?\xd1W\xfe\xf7\xf1#accc\xb5\xbaz\xa4\xf0\xcf-@\x91c\xdax\xa8\t\x9buE\x81\x81\xaa\x1d\xf1\xa94B/F\x85D!\xa4\x85f\x96\xf9\xe7\xe7\x01m-\xee43`\x85\xc1/N\xf0\x7f]\x9d|*\xea7+\xfc\x15\xe1\xa8\xb0\x8deK\xf3\xb2!\xee\xc92P\x91', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x649}, 0x28) openat$cgroup(0xffffffffffffffff, &(0x7f00000008c0)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000003100817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8936, &(0x7f0000000000)={r1}) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x16) r3 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x8, 0x0, 0x0) 04:17:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xffffff9e, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3023.770425][T27206] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27206,uid=0 [ 3023.794470][T27206] Memory cgroup out of memory: Killed process 27206 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3023.878342][ T1042] oom_reaper: reaped process 27206 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xebd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:22 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280)}], 0x1, 0x0, 0xfffffe47}, 0x2) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200000, 0x0) 04:17:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xfe010000}, 0x0) 04:17:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3024.265458][T27267] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.2'. 04:17:22 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000006b80)={&(0x7f0000005ac0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006b40)=[{&(0x7f0000005b40)=""/4096, 0x1000}], 0x1}, 0x2000) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000006bc0)=r2) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r4 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 3024.337211][T27265] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 04:17:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xfffffff0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x20}, 0xfc) [ 3024.461299][T27265] CPU: 0 PID: 27265 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3024.469370][T27265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3024.479468][T27265] Call Trace: [ 3024.482771][T27265] dump_stack+0x172/0x1f0 [ 3024.482792][T27265] dump_header+0x10f/0xb6c [ 3024.482810][T27265] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3024.482825][T27265] ? ___ratelimit+0x60/0x595 [ 3024.482850][T27265] ? do_raw_spin_unlock+0x57/0x270 [ 3024.482880][T27265] oom_kill_process.cold+0x10/0x15 [ 3024.512682][T27265] out_of_memory+0x79a/0x1280 [ 3024.517376][T27265] ? lock_downgrade+0x880/0x880 [ 3024.522236][T27265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3024.522257][T27265] ? oom_killer_disable+0x280/0x280 [ 3024.522270][T27265] ? find_held_lock+0x35/0x130 [ 3024.522297][T27265] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3024.522313][T27265] ? memcg_event_wake+0x230/0x230 [ 3024.522335][T27265] ? do_raw_spin_unlock+0x57/0x270 [ 3024.522353][T27265] ? _raw_spin_unlock+0x2d/0x50 [ 3024.522381][T27265] try_charge+0x102c/0x15c0 [ 3024.549162][T27265] ? find_held_lock+0x35/0x130 [ 3024.549193][T27265] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3024.549213][T27265] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3024.579481][T27265] ? find_held_lock+0x35/0x130 [ 3024.584262][T27265] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3024.589829][T27265] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3024.595404][T27265] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3024.600638][T27265] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3024.606211][T27265] __memcg_kmem_charge+0x136/0x300 [ 3024.611342][T27265] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3024.611360][T27265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3024.611379][T27265] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3024.611396][T27265] ? copy_process.part.0+0x43f7/0x6790 [ 3024.611414][T27265] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3024.611431][T27265] ? trace_hardirqs_on+0x67/0x220 [ 3024.611444][T27265] ? kasan_check_read+0x11/0x20 [ 3024.611466][T27265] copy_process.part.0+0x4a0/0x6790 [ 3024.611484][T27265] ? __lock_acquire+0x54f/0x5490 [ 3024.611508][T27265] ? __cleanup_sighand+0x60/0x60 [ 3024.639596][T27265] ? rcu_read_lock_sched_held+0x110/0x130 [ 3024.639613][T27265] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3024.639636][T27265] _do_fork+0x25d/0xfe0 [ 3024.639667][T27265] ? copy_init_mm+0x20/0x20 [ 3024.685206][T27265] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3024.690699][T27265] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3024.696166][T27265] ? do_syscall_64+0x26/0x680 [ 3024.700850][T27265] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3024.706940][T27265] ? do_syscall_64+0x26/0x680 04:17:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xecd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3024.711690][T27265] __x64_sys_clone+0xbf/0x150 [ 3024.716385][T27265] do_syscall_64+0xfd/0x680 [ 3024.720906][T27265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3024.726804][T27265] RIP: 0033:0x45bc49 [ 3024.730708][T27265] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3024.750314][T27265] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3024.758729][T27265] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3024.766702][T27265] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3024.774680][T27265] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3024.782690][T27265] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3024.790667][T27265] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3024.880440][T27265] memory: usage 307180kB, limit 307200kB, failcnt 426 [ 3024.887949][T27265] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3024.895648][T27265] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3024.902722][T27265] Memory cgroup stats for /syz4: cache:96KB rss:164KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3024.924843][T27265] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27265,uid=0 [ 3024.970701][T27265] Memory cgroup out of memory: Killed process 27265 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xffffff7f, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3025.035538][ T1042] oom_reaper: reaped process 27265 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xedd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 04:17:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:23 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7b) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r3 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r2, 0x0, 0x0) r4 = getpid() perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8, 0x8, 0x1, 0x100000000, 0x0, 0x9, 0x50228, 0x8, 0x3ff, 0x6, 0x9, 0x290a, 0x8, 0x6, 0xfffffffffffffffa, 0x6b, 0x2, 0x2, 0x0, 0x4, 0x7, 0x4, 0x1, 0x4, 0x528b, 0x7, 0x8037, 0x850, 0x10000, 0x7, 0x3, 0x8, 0x4, 0x1000, 0x81, 0x8, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000000c0), 0xf}, 0x28, 0x0, 0x7, 0x7, 0x2a, 0x80, 0x80}, r4, 0xc, r1, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 3025.354334][T27323] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3025.408162][T27323] CPU: 1 PID: 27323 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3025.416185][T27323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3025.426242][T27323] Call Trace: [ 3025.429550][T27323] dump_stack+0x172/0x1f0 [ 3025.433907][T27323] dump_header+0x10f/0xb6c [ 3025.438342][T27323] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3025.444161][T27323] ? ___ratelimit+0x60/0x595 [ 3025.448765][T27323] ? do_raw_spin_unlock+0x57/0x270 [ 3025.453893][T27323] oom_kill_process.cold+0x10/0x15 [ 3025.459016][T27323] out_of_memory+0x79a/0x1280 [ 3025.463707][T27323] ? lock_downgrade+0x880/0x880 [ 3025.468558][T27323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3025.474793][T27323] ? oom_killer_disable+0x280/0x280 [ 3025.479995][T27323] ? find_held_lock+0x35/0x130 [ 3025.484788][T27323] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3025.490338][T27323] ? memcg_event_wake+0x230/0x230 [ 3025.495385][T27323] ? do_raw_spin_unlock+0x57/0x270 [ 3025.500509][T27323] ? _raw_spin_unlock+0x2d/0x50 [ 3025.505376][T27323] try_charge+0x102c/0x15c0 [ 3025.509902][T27323] ? find_held_lock+0x35/0x130 [ 3025.514701][T27323] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3025.520268][T27323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3025.526520][T27323] ? kasan_check_read+0x11/0x20 [ 3025.531389][T27323] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3025.536953][T27323] mem_cgroup_try_charge+0x24d/0x5e0 [ 3025.542254][T27323] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3025.547900][T27323] wp_page_copy+0x416/0x1770 [ 3025.552498][T27323] ? do_wp_page+0x486/0x1500 [ 3025.557115][T27323] ? pmd_pfn+0x1d0/0x1d0 [ 3025.561395][T27323] ? lock_downgrade+0x880/0x880 [ 3025.566262][T27323] ? swp_swapcount+0x540/0x540 [ 3025.571066][T27323] ? kasan_check_read+0x11/0x20 [ 3025.575926][T27323] ? do_raw_spin_unlock+0x57/0x270 [ 3025.581047][T27323] do_wp_page+0x48e/0x1500 [ 3025.585481][T27323] ? finish_mkwrite_fault+0x540/0x540 [ 3025.590976][T27323] __handle_mm_fault+0x22e3/0x3eb0 [ 3025.596309][T27323] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3025.601863][T27323] ? find_held_lock+0x35/0x130 [ 3025.606648][T27323] ? handle_mm_fault+0x292/0xa90 [ 3025.611624][T27323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3025.617882][T27323] ? kasan_check_read+0x11/0x20 [ 3025.622779][T27323] handle_mm_fault+0x3b7/0xa90 [ 3025.627559][T27323] __do_page_fault+0x5ef/0xda0 [ 3025.632349][T27323] do_page_fault+0x71/0x57d [ 3025.636881][T27323] ? page_fault+0x8/0x30 [ 3025.641140][T27323] page_fault+0x1e/0x30 [ 3025.645311][T27323] RIP: 0033:0x430356 04:17:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x40030000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3025.649212][T27323] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 3025.668819][T27323] RSP: 002b:00007ffc60c479b0 EFLAGS: 00010206 [ 3025.674886][T27323] RAX: 00000000000205b1 RBX: 0000000000713640 RCX: 0000000000000121 [ 3025.682865][T27323] RDX: 0000555555663930 RSI: 0000555555663a50 RDI: 0000000000000000 [ 3025.690837][T27323] RBP: 0000000000000121 R08: ffffffffffffffff R09: 0000000000000000 [ 3025.690846][T27323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 04:17:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3025.690854][T27323] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 3025.726874][T27323] memory: usage 307200kB, limit 307200kB, failcnt 463 [ 3025.734065][T27323] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3025.742065][T27323] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xeed\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3025.749049][T27323] Memory cgroup stats for /syz4: cache:96KB rss:164KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3025.770798][T27323] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27323,uid=0 [ 3025.791464][T27323] Memory cgroup out of memory: Killed process 27323 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3025.846890][ T1042] oom_reaper: reaped process 27323 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 04:17:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0}, 0xfc) 04:17:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xefd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0}, 0xfc) 04:17:24 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r3, 0x2f, 0x8}, 0xc) 04:17:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x8000a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0}, 0xfc) [ 3026.573073][T27378] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3026.626923][T27378] CPU: 0 PID: 27378 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3026.634961][T27378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3026.645036][T27378] Call Trace: [ 3026.648352][T27378] dump_stack+0x172/0x1f0 [ 3026.652702][T27378] dump_header+0x10f/0xb6c [ 3026.657139][T27378] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3026.662969][T27378] ? ___ratelimit+0x60/0x595 [ 3026.668172][T27378] ? do_raw_spin_unlock+0x57/0x270 [ 3026.673294][T27378] oom_kill_process.cold+0x10/0x15 [ 3026.678420][T27378] out_of_memory+0x79a/0x1280 [ 3026.683123][T27378] ? lock_downgrade+0x880/0x880 [ 3026.687982][T27378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3026.694426][T27378] ? oom_killer_disable+0x280/0x280 [ 3026.699627][T27378] ? find_held_lock+0x35/0x130 [ 3026.704418][T27378] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3026.709984][T27378] ? memcg_event_wake+0x230/0x230 [ 3026.715023][T27378] ? do_raw_spin_unlock+0x57/0x270 [ 3026.720158][T27378] ? _raw_spin_unlock+0x2d/0x50 04:17:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}, 0xfc) [ 3026.725048][T27378] try_charge+0x102c/0x15c0 [ 3026.729586][T27378] ? find_held_lock+0x35/0x130 [ 3026.734368][T27378] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3026.739922][T27378] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3026.745469][T27378] ? find_held_lock+0x35/0x130 [ 3026.750242][T27378] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3026.755809][T27378] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3026.761378][T27378] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3026.766593][T27378] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3026.772162][T27378] __memcg_kmem_charge+0x136/0x300 04:17:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}, 0xfc) [ 3026.777288][T27378] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3026.782693][T27378] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3026.788430][T27378] ? __lock_acquire+0x54f/0x5490 [ 3026.793376][T27378] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3026.799627][T27378] alloc_pages_current+0x107/0x210 [ 3026.804764][T27378] __pmd_alloc+0x41/0x460 [ 3026.809108][T27378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3026.815376][T27378] __handle_mm_fault+0x1925/0x3eb0 [ 3026.820508][T27378] ? vmf_insert_mixed_mkwrite+0x40/0x40 04:17:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3026.826062][T27378] ? find_held_lock+0x35/0x130 [ 3026.830854][T27378] ? handle_mm_fault+0x292/0xa90 [ 3026.835834][T27378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3026.842098][T27378] ? kasan_check_read+0x11/0x20 [ 3026.846982][T27378] handle_mm_fault+0x3b7/0xa90 [ 3026.851764][T27378] __do_page_fault+0x5ef/0xda0 [ 3026.856546][T27378] do_page_fault+0x71/0x57d [ 3026.861058][T27378] ? page_fault+0x8/0x30 [ 3026.865334][T27378] page_fault+0x1e/0x30 [ 3026.869499][T27378] RIP: 0033:0x4019f7 [ 3026.873408][T27378] Code: 00 00 00 48 83 ec 08 48 8b 15 bd ea 66 00 48 8b 05 ae ea 66 00 48 39 d0 48 8d 8a 00 00 00 01 72 17 48 39 c8 73 12 48 8d 50 04 <89> 38 48 89 15 90 ea 66 00 48 83 c4 08 c3 48 89 c6 bf b8 90 4c 00 [ 3026.893018][T27378] RSP: 002b:00007ffc60c47bb0 EFLAGS: 00010287 [ 3026.899089][T27378] RAX: 0000001b2e520000 RBX: 0000000000000000 RCX: 0000001b2f520000 [ 3026.899110][T27378] RDX: 0000001b2e520004 RSI: 00007ffc60c47970 RDI: 0000000000000000 [ 3026.915054][T27378] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000004 04:17:25 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001280), 0x203a0}], 0x1}, 0x0) close(r0) r2 = socket$kcm(0x2b, 0x4000000000000001, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 3026.923026][T27378] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000001 [ 3026.923041][T27378] R13: 00007ffc60c47da0 R14: 0000000000000000 R15: 00007ffc60c47db0 [ 3027.031298][T27378] memory: usage 307200kB, limit 307200kB, failcnt 688 [ 3027.045294][T27378] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3027.090039][T27378] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3027.124764][T27378] Memory cgroup stats for /syz4: cache:96KB rss:164KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3027.166952][T27378] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27378,uid=0 [ 3027.232632][T27378] Memory cgroup out of memory: Killed process 27378 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xffffff97}, 0x0) 04:17:25 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000540)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x80, 0x0, 0x0, 0x0, 0xc0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000540)=@hci, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.cpu/syz\xf0\xda\x0f5\x1cUc\xd9\xef\x17\x95\xbe\xb7\xa3\xff\x97w\xf7DV\x15~\x03\x02>5=94\xf9\x91U\x03\xf4\xc3\xda\xf1/\xe4\x9f\xfe\x90\x1e{\x8e\x81\v\x95h\xabA\xea\xbe\x81\xfa.\xb6Jk\xa0\xeb\x108\x12c\x8c\xf2T\xd0\xcf\x9d\x02\xe0\'\xdb\x80m\x9bV\'\xf9I&\x1b\xde6\xfc\xc3\x8d\x9f\x9b\x9c\x10\xdc\x81Og\x1f\xd7`\x7f\x8c\xd5\xa0V\xc9((\x87\xba\xafq\x9f\\e\x03\x15c\xa5\x13#@\x8d\xff^\x18\x1f\"\x11\x81\xd4\x14\x03\xd1\xe5\xaa\"\xfc\x14QK\x13cLJh\xca\xb0,\xa3\xdd\x7fz\x97\xe5\xa0\xe1\xcdb}Lp\x85\xc4\x12?ZS/\x84\x84@w\xde\x81\x9d\fe\xab\x80#\xa1]R\x17>\xa1\xf5\xf6\x8bTwb\x86\xbd\x8c\x18\xe9rn}@fS\x0f\xa8\xde\xf1\xb3\x7f68\xd0[Rt\xcf \x85\xcag3\xc0W\xa9v\xa9\xb1j=C\xc6\x95uVW', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu\xed\xe1?\xd1W\xfe\xf7\xf1#accc\xb5\xbaz\xa4\xf0\xcf-@\x91c\xdax\xa8\t\x9buE\x81\x81\xaa\x1d\xf1\xa94B/F\x85D!\xa4\x85f\x96\xf9\xe7\xe7\x01m-\xee43`\x85\xc1/N\xf0\x7f]\x9d|*\xea7+\xfc\x15\xe1\xa8\xb0\x8deK\xf3\xb2!\xee\xc92P\x91', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x649}, 0x28) openat$cgroup(0xffffffffffffffff, &(0x7f00000008c0)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000003100817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8936, &(0x7f0000000000)={r1}) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x16) r3 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x8, 0x0, 0x0) 04:17:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf0d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x8002a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}, 0xfc) 04:17:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}, 0xfc) [ 3027.518088][T27454] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3027.632615][T27454] CPU: 0 PID: 27454 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3027.640645][T27454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3027.650704][T27454] Call Trace: [ 3027.654007][T27454] dump_stack+0x172/0x1f0 [ 3027.658354][T27454] dump_header+0x10f/0xb6c [ 3027.662784][T27454] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3027.668596][T27454] ? ___ratelimit+0x60/0x595 [ 3027.673192][T27454] ? do_raw_spin_unlock+0x57/0x270 [ 3027.678326][T27454] oom_kill_process.cold+0x10/0x15 [ 3027.683452][T27454] out_of_memory+0x79a/0x1280 [ 3027.688157][T27454] ? lock_downgrade+0x880/0x880 [ 3027.693017][T27454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3027.699282][T27454] ? oom_killer_disable+0x280/0x280 [ 3027.704487][T27454] ? find_held_lock+0x35/0x130 [ 3027.708895][T27445] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3027.709310][T27454] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3027.709339][T27454] ? memcg_event_wake+0x230/0x230 [ 3027.709377][T27454] ? do_raw_spin_unlock+0x57/0x270 [ 3027.709406][T27454] ? _raw_spin_unlock+0x2d/0x50 [ 3027.739194][T27454] try_charge+0x102c/0x15c0 [ 3027.743703][T27454] ? find_held_lock+0x35/0x130 [ 3027.748510][T27454] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3027.754093][T27454] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3027.759691][T27454] ? find_held_lock+0x35/0x130 [ 3027.764468][T27454] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3027.770036][T27454] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3027.775584][T27454] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3027.780797][T27454] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3027.786366][T27454] __memcg_kmem_charge+0x136/0x300 [ 3027.791542][T27454] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3027.797008][T27454] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3027.802743][T27454] ? __lock_acquire+0x54f/0x5490 [ 3027.807690][T27454] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3027.813956][T27454] alloc_pages_current+0x107/0x210 [ 3027.819093][T27454] __pmd_alloc+0x41/0x460 [ 3027.823452][T27454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:17:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}, 0xfc) [ 3027.829716][T27454] __handle_mm_fault+0x1925/0x3eb0 [ 3027.834841][T27454] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3027.840394][T27454] ? find_held_lock+0x35/0x130 [ 3027.845168][T27454] ? handle_mm_fault+0x292/0xa90 [ 3027.850139][T27454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3027.856401][T27454] ? kasan_check_read+0x11/0x20 [ 3027.861260][T27454] handle_mm_fault+0x3b7/0xa90 [ 3027.866036][T27454] __do_page_fault+0x5ef/0xda0 [ 3027.870834][T27454] do_page_fault+0x71/0x57d [ 3027.875349][T27454] ? page_fault+0x8/0x30 [ 3027.879617][T27454] page_fault+0x1e/0x30 04:17:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xf0ffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3027.883773][T27454] RIP: 0033:0x4019f7 [ 3027.887670][T27454] Code: 00 00 00 48 83 ec 08 48 8b 15 bd ea 66 00 48 8b 05 ae ea 66 00 48 39 d0 48 8d 8a 00 00 00 01 72 17 48 39 c8 73 12 48 8d 50 04 <89> 38 48 89 15 90 ea 66 00 48 83 c4 08 c3 48 89 c6 bf b8 90 4c 00 [ 3027.907272][T27454] RSP: 002b:00007ffc60c47bb0 EFLAGS: 00010287 [ 3027.913339][T27454] RAX: 0000001b2e520000 RBX: 0000000000000000 RCX: 0000001b2f520000 04:17:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf1d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3027.921318][T27454] RDX: 0000001b2e520004 RSI: 00007ffc60c47970 RDI: 0000000000000000 [ 3027.935453][T27454] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000004 [ 3027.935463][T27454] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000001 [ 3027.935475][T27454] R13: 00007ffc60c47da0 R14: 0000000000000000 R15: 00007ffc60c47db0 04:17:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}, 0xfc) [ 3028.508919][T27454] memory: usage 307200kB, limit 307200kB, failcnt 723 [ 3028.524823][T27454] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3028.538398][T27454] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3028.547811][T27454] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3028.575318][T27454] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27454,uid=0 04:17:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 04:17:27 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000540)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x80, 0x0, 0x0, 0x0, 0xc0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000540)=@hci, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.cpu/syz\xf0\xda\x0f5\x1cUc\xd9\xef\x17\x95\xbe\xb7\xa3\xff\x97w\xf7DV\x15~\x03\x02>5=94\xf9\x91U\x03\xf4\xc3\xda\xf1/\xe4\x9f\xfe\x90\x1e{\x8e\x81\v\x95h\xabA\xea\xbe\x81\xfa.\xb6Jk\xa0\xeb\x108\x12c\x8c\xf2T\xd0\xcf\x9d\x02\xe0\'\xdb\x80m\x9bV\'\xf9I&\x1b\xde6\xfc\xc3\x8d\x9f\x9b\x9c\x10\xdc\x81Og\x1f\xd7`\x7f\x8c\xd5\xa0V\xc9((\x87\xba\xafq\x9f\\e\x03\x15c\xa5\x13#@\x8d\xff^\x18\x1f\"\x11\x81\xd4\x14\x03\xd1\xe5\xaa\"\xfc\x14QK\x13cLJh\xca\xb0,\xa3\xdd\x7fz\x97\xe5\xa0\xe1\xcdb}Lp\x85\xc4\x12?ZS/\x84\x84@w\xde\x81\x9d\fe\xab\x80#\xa1]R\x17>\xa1\xf5\xf6\x8bTwb\x86\xbd\x8c\x18\xe9rn}@fS\x0f\xa8\xde\xf1\xb3\x7f68\xd0[Rt\xcf \x85\xcag3\xc0W\xa9v\xa9\xb1j=C\xc6\x95uVW', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu\xed\xe1?\xd1W\xfe\xf7\xf1#accc\xb5\xbaz\xa4\xf0\xcf-@\x91c\xdax\xa8\t\x9buE\x81\x81\xaa\x1d\xf1\xa94B/F\x85D!\xa4\x85f\x96\xf9\xe7\xe7\x01m-\xee43`\x85\xc1/N\xf0\x7f]\x9d|*\xea7+\xfc\x15\xe1\xa8\xb0\x8deK\xf3\xb2!\xee\xc92P\x91', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x649}, 0x28) openat$cgroup(0xffffffffffffffff, &(0x7f00000008c0)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000003100817491bc655067d7aee4050c00130f00010000000000000000008b1832", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8936, &(0x7f0000000000)={r1}) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x16) r3 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x8, 0x0, 0x0) 04:17:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00'], 0x8}, 0xfc) 04:17:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf2d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x100000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3028.597497][T27454] Memory cgroup out of memory: Killed process 27454 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00'], 0x8}, 0xfc) [ 3028.812536][T27521] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3028.896176][T27521] CPU: 1 PID: 27521 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3028.904201][T27521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3028.914268][T27521] Call Trace: [ 3028.917577][T27521] dump_stack+0x172/0x1f0 [ 3028.921931][T27521] dump_header+0x10f/0xb6c [ 3028.926370][T27521] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3028.932186][T27521] ? ___ratelimit+0x60/0x595 [ 3028.936785][T27521] ? do_raw_spin_unlock+0x57/0x270 [ 3028.941912][T27521] oom_kill_process.cold+0x10/0x15 [ 3028.947032][T27521] out_of_memory+0x79a/0x1280 [ 3028.951724][T27521] ? lock_downgrade+0x880/0x880 [ 3028.956610][T27521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3028.962925][T27521] ? oom_killer_disable+0x280/0x280 [ 3028.968147][T27521] ? find_held_lock+0x35/0x130 [ 3028.972936][T27521] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3028.978510][T27521] ? memcg_event_wake+0x230/0x230 [ 3028.983545][T27521] ? do_raw_spin_unlock+0x57/0x270 [ 3028.983562][T27521] ? _raw_spin_unlock+0x2d/0x50 [ 3028.983582][T27521] try_charge+0x102c/0x15c0 [ 3028.983621][T27521] ? find_held_lock+0x35/0x130 [ 3029.002896][T27521] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3029.008462][T27521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3029.014718][T27521] ? kasan_check_read+0x11/0x20 [ 3029.019590][T27521] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3029.025182][T27521] mem_cgroup_try_charge+0x24d/0x5e0 [ 3029.030481][T27521] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3029.036144][T27521] wp_page_copy+0x416/0x1770 [ 3029.040750][T27521] ? do_wp_page+0x486/0x1500 [ 3029.045435][T27521] ? pmd_pfn+0x1d0/0x1d0 [ 3029.049694][T27521] ? lock_downgrade+0x880/0x880 [ 3029.054553][T27521] ? swp_swapcount+0x540/0x540 [ 3029.059327][T27521] ? kasan_check_read+0x11/0x20 [ 3029.064197][T27521] ? do_raw_spin_unlock+0x57/0x270 [ 3029.069351][T27521] do_wp_page+0x48e/0x1500 [ 3029.073785][T27521] ? finish_mkwrite_fault+0x540/0x540 [ 3029.079184][T27521] __handle_mm_fault+0x22e3/0x3eb0 [ 3029.082160][T27533] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3029.084312][T27521] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3029.084329][T27521] ? find_held_lock+0x35/0x130 [ 3029.084346][T27521] ? handle_mm_fault+0x292/0xa90 [ 3029.084373][T27521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3029.084394][T27521] ? kasan_check_read+0x11/0x20 [ 3029.120010][T27521] handle_mm_fault+0x3b7/0xa90 [ 3029.124793][T27521] __do_page_fault+0x5ef/0xda0 [ 3029.129589][T27521] do_page_fault+0x71/0x57d [ 3029.134115][T27521] ? page_fault+0x8/0x30 [ 3029.138367][T27521] page_fault+0x1e/0x30 [ 3029.142525][T27521] RIP: 0033:0x40c34a [ 3029.146429][T27521] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a0 00 00 00 41 83 fe 10 75 d7 bf 1d e9 4b 00 31 c0 e8 46 58 ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 3029.166033][T27521] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010246 [ 3029.172112][T27521] RAX: 0000000000000001 RBX: 000000000075bf2c RCX: 00007ffc60c47c78 [ 3029.180088][T27521] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 3029.188070][T27521] RBP: 000000000075bf2c R08: 00007ffc60c47c80 R09: 0000000000760888 04:17:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00'], 0x8}, 0xfc) 04:17:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf3d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="200000000000000001000000"], 0xc}, 0xfc) 04:17:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3029.188085][T27521] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000075bf20 [ 3029.204032][T27521] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c 04:17:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="200000000000000001000000"], 0xc}, 0xfc) [ 3029.442928][T27521] memory: usage 307200kB, limit 307200kB, failcnt 763 [ 3029.450520][T27521] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3029.458180][T27521] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3029.465220][T27521] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3029.489593][T27521] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27521,uid=0 [ 3029.529760][T27521] Memory cgroup out of memory: Killed process 27521 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3029.552244][ T1042] oom_reaper: reaped process 27521 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xffffffe4}, 0x0) 04:17:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf4d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x200000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="200000000000000001000000"], 0xc}, 0xfc) 04:17:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'nlmon0\x00', 0x400}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000070c0)) sendmsg$kcm(r3, 0x0, 0x4) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="03d88aa174036ed793dd86dd60b5c932599b32b2870550aba81507000000fee95c7d91d2f51cf3702d076da5d50f30b03c1f16e6cbbb8ecc5fe4a79d1e379fa9d092826f8dd0163e56b38fab2d7179c7d901026c8e6c8e671f53fb972a71ebdf5074cf89d43c498ab9947111f2e56e54138e5d77c0666b8f5b8f61b9217ee9bd96ff0f00007e2fc5e3df567fb7274d1d8f9af36f7025d127d389648e456d9493c3f8c7c7156000"/176], 0xa0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) [ 3029.866043][T27577] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3029.932721][T27577] CPU: 1 PID: 27577 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3029.940745][T27577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3029.950818][T27577] Call Trace: [ 3029.954131][T27577] dump_stack+0x172/0x1f0 [ 3029.958516][T27577] dump_header+0x10f/0xb6c [ 3029.962948][T27577] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3029.968758][T27577] ? ___ratelimit+0x60/0x595 [ 3029.973351][T27577] ? do_raw_spin_unlock+0x57/0x270 [ 3029.978472][T27577] oom_kill_process.cold+0x10/0x15 [ 3029.983593][T27577] out_of_memory+0x79a/0x1280 [ 3029.988293][T27577] ? lock_downgrade+0x880/0x880 [ 3029.993148][T27577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3029.999402][T27577] ? oom_killer_disable+0x280/0x280 [ 3030.004610][T27577] ? find_held_lock+0x35/0x130 [ 3030.009407][T27577] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3030.014970][T27577] ? memcg_event_wake+0x230/0x230 [ 3030.020015][T27577] ? do_raw_spin_unlock+0x57/0x270 [ 3030.025137][T27577] ? _raw_spin_unlock+0x2d/0x50 [ 3030.030000][T27577] try_charge+0x102c/0x15c0 [ 3030.034510][T27577] ? find_held_lock+0x35/0x130 [ 3030.039294][T27577] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3030.044855][T27577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3030.051109][T27577] ? kasan_check_read+0x11/0x20 [ 3030.055978][T27577] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3030.061531][T27577] mem_cgroup_try_charge+0x24d/0x5e0 [ 3030.066840][T27577] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3030.072531][T27577] wp_page_copy+0x416/0x1770 [ 3030.077130][T27577] ? do_wp_page+0x486/0x1500 [ 3030.081751][T27577] ? pmd_pfn+0x1d0/0x1d0 [ 3030.086009][T27577] ? lock_downgrade+0x880/0x880 [ 3030.090873][T27577] ? swp_swapcount+0x540/0x540 [ 3030.095657][T27577] ? kasan_check_read+0x11/0x20 [ 3030.100544][T27577] ? do_raw_spin_unlock+0x57/0x270 [ 3030.105727][T27577] do_wp_page+0x48e/0x1500 [ 3030.110174][T27577] ? finish_mkwrite_fault+0x540/0x540 [ 3030.115571][T27577] __handle_mm_fault+0x22e3/0x3eb0 [ 3030.120710][T27577] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3030.126268][T27577] ? find_held_lock+0x35/0x130 [ 3030.131048][T27577] ? handle_mm_fault+0x292/0xa90 [ 3030.136005][T27577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3030.142275][T27577] ? kasan_check_read+0x11/0x20 [ 3030.147143][T27577] handle_mm_fault+0x3b7/0xa90 [ 3030.151927][T27577] __do_page_fault+0x5ef/0xda0 [ 3030.156712][T27577] do_page_fault+0x71/0x57d [ 3030.161232][T27577] ? page_fault+0x8/0x30 [ 3030.165522][T27577] page_fault+0x1e/0x30 [ 3030.169675][T27577] RIP: 0033:0x40c34a 04:17:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x400000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3030.173571][T27577] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a0 00 00 00 41 83 fe 10 75 d7 bf 1d e9 4b 00 31 c0 e8 46 58 ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 3030.193177][T27577] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010246 [ 3030.199248][T27577] RAX: 0000000000000001 RBX: 000000000075bf2c RCX: 00007ffc60c47c78 [ 3030.207221][T27577] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 3030.215196][T27577] RBP: 000000000075bf2c R08: 00007ffc60c47c80 R09: 0000000000760888 [ 3030.223181][T27577] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000075bf20 04:17:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000000000000000010000000800"], 0xe}, 0xfc) 04:17:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3030.231149][T27577] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c 04:17:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf5d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:28 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101003, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x7, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd', 0x60}]}, 0x140) 04:17:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000000000000000010000000800"], 0xe}, 0xfc) [ 3030.767123][T27577] memory: usage 307200kB, limit 307200kB, failcnt 792 [ 3030.780332][T27577] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3030.801958][T27577] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3030.808847][T27577] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3030.901245][T27577] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27577,uid=0 [ 3030.928729][T27577] Memory cgroup out of memory: Killed process 27577 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 04:17:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000000000000000010000000800"], 0xe}, 0xfc) 04:17:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000002e0000002c000000000000080000000000ac382d0baee71c6481c447a2bbb748e6602a89f237411e7829bf123ad2e972d47fc434d319351463c5de978bf0"], 0x0, 0x52}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={r0, 0x0, 0x0}, 0xfffffffffffffd76) 04:17:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xa00000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf6d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3030.958804][ T1042] oom_reaper: reaped process 27577 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000300)=0x9, 0x12) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000002c0)={'ip_vti0\x00', @random="b6fb5b732c24"}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x1000) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2f72646d61202f637075202f637075202f637075202f163b308272646d61202d70696473202f7069647320"], 0x2b) write$cgroup_type(r0, &(0x7f0000000340)='threaded\x00', 0x9) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000100)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x16, 0x1, 0x9c, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) 04:17:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="200000000000000001000000080000"], 0xf}, 0xfc) [ 3031.295880][T27669] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 04:17:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf7d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3031.373690][T27669] CPU: 1 PID: 27669 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3031.381727][T27669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3031.391788][T27669] Call Trace: [ 3031.395098][T27669] dump_stack+0x172/0x1f0 [ 3031.399444][T27669] dump_header+0x10f/0xb6c [ 3031.404875][T27669] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3031.410719][T27669] ? ___ratelimit+0x60/0x595 [ 3031.415330][T27669] ? do_raw_spin_unlock+0x57/0x270 [ 3031.420458][T27669] oom_kill_process.cold+0x10/0x15 [ 3031.425584][T27669] out_of_memory+0x79a/0x1280 [ 3031.430280][T27669] ? lock_downgrade+0x880/0x880 [ 3031.435141][T27669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3031.441401][T27669] ? oom_killer_disable+0x280/0x280 [ 3031.446607][T27669] ? find_held_lock+0x35/0x130 [ 3031.451398][T27669] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3031.456953][T27669] ? memcg_event_wake+0x230/0x230 [ 3031.462000][T27669] ? do_raw_spin_unlock+0x57/0x270 [ 3031.467124][T27669] ? _raw_spin_unlock+0x2d/0x50 [ 3031.471990][T27669] try_charge+0x102c/0x15c0 [ 3031.476508][T27669] ? find_held_lock+0x35/0x130 [ 3031.481297][T27669] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3031.486859][T27669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3031.493116][T27669] ? kasan_check_read+0x11/0x20 [ 3031.497987][T27669] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3031.503549][T27669] mem_cgroup_try_charge+0x24d/0x5e0 [ 3031.508851][T27669] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3031.514495][T27669] wp_page_copy+0x416/0x1770 [ 3031.519094][T27669] ? do_wp_page+0x486/0x1500 [ 3031.523706][T27669] ? pmd_pfn+0x1d0/0x1d0 [ 3031.527973][T27669] ? lock_downgrade+0x880/0x880 [ 3031.532839][T27669] ? swp_swapcount+0x540/0x540 [ 3031.537621][T27669] ? kasan_check_read+0x11/0x20 [ 3031.542484][T27669] ? do_raw_spin_unlock+0x57/0x270 [ 3031.547610][T27669] do_wp_page+0x48e/0x1500 [ 3031.552055][T27669] ? finish_mkwrite_fault+0x540/0x540 [ 3031.557452][T27669] __handle_mm_fault+0x22e3/0x3eb0 [ 3031.562579][T27669] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3031.568162][T27669] ? find_held_lock+0x35/0x130 [ 3031.572992][T27669] ? handle_mm_fault+0x292/0xa90 [ 3031.577954][T27669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3031.584210][T27669] ? kasan_check_read+0x11/0x20 [ 3031.589078][T27669] handle_mm_fault+0x3b7/0xa90 [ 3031.593892][T27669] __do_page_fault+0x5ef/0xda0 [ 3031.598689][T27669] do_page_fault+0x71/0x57d [ 3031.603215][T27669] ? page_fault+0x8/0x30 [ 3031.607483][T27669] page_fault+0x1e/0x30 [ 3031.611676][T27669] RIP: 0033:0x40c34a [ 3031.615580][T27669] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a0 00 00 00 41 83 fe 10 75 d7 bf 1d e9 4b 00 31 c0 e8 46 58 ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 3031.635212][T27669] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010246 [ 3031.641299][T27669] RAX: 0000000000000001 RBX: 000000000075bf2c RCX: 00007ffc60c47c78 [ 3031.649274][T27669] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 3031.657251][T27669] RBP: 000000000075bf2c R08: 00007ffc60c47c80 R09: 0000000000760888 [ 3031.665231][T27669] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000075bf20 04:17:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="200000000000000001000000080000"], 0xf}, 0xfc) 04:17:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="200000000000000001000000080000"], 0xf}, 0xfc) [ 3031.673221][T27669] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3031.709531][ T26] audit: type=1804 audit(1559362650.150:262): pid=27684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir507440853/syzkaller.3YmJvd/1673/memory.events" dev="sda1" ino=17159 res=1 [ 3031.735611][T27669] memory: usage 307200kB, limit 307200kB, failcnt 821 [ 3031.751127][T27669] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3031.763395][T27669] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3031.770566][T27669] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3031.800044][T27669] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27669,uid=0 [ 3031.884120][T27669] Memory cgroup out of memory: Killed process 27669 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3031.998349][ T1042] oom_reaper: reaped process 27669 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) 04:17:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0x0) 04:17:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xe00000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf8d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0x0) [ 3032.357890][T27721] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3032.429395][T27721] CPU: 0 PID: 27721 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3032.437416][T27721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3032.447467][T27721] Call Trace: [ 3032.450770][T27721] dump_stack+0x172/0x1f0 [ 3032.455128][T27721] dump_header+0x10f/0xb6c [ 3032.459560][T27721] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3032.465375][T27721] ? ___ratelimit+0x60/0x595 [ 3032.469977][T27721] ? do_raw_spin_unlock+0x57/0x270 [ 3032.475120][T27721] oom_kill_process.cold+0x10/0x15 [ 3032.480253][T27721] out_of_memory+0x79a/0x1280 [ 3032.484945][T27721] ? lock_downgrade+0x880/0x880 [ 3032.489804][T27721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3032.496071][T27721] ? oom_killer_disable+0x280/0x280 [ 3032.501300][T27721] ? find_held_lock+0x35/0x130 [ 3032.506087][T27721] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3032.512343][T27721] ? memcg_event_wake+0x230/0x230 [ 3032.517381][T27721] ? do_raw_spin_unlock+0x57/0x270 [ 3032.522499][T27721] ? _raw_spin_unlock+0x2d/0x50 [ 3032.527374][T27721] try_charge+0x102c/0x15c0 [ 3032.531883][T27721] ? find_held_lock+0x35/0x130 [ 3032.536664][T27721] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3032.542227][T27721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3032.548481][T27721] ? kasan_check_read+0x11/0x20 [ 3032.553347][T27721] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3032.558904][T27721] mem_cgroup_try_charge+0x24d/0x5e0 [ 3032.564208][T27721] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3032.569865][T27721] wp_page_copy+0x416/0x1770 [ 3032.574471][T27721] ? do_wp_page+0x486/0x1500 [ 3032.579076][T27721] ? pmd_pfn+0x1d0/0x1d0 [ 3032.583358][T27721] ? lock_downgrade+0x880/0x880 [ 3032.588218][T27721] ? swp_swapcount+0x540/0x540 [ 3032.593000][T27721] ? kasan_check_read+0x11/0x20 [ 3032.597864][T27721] ? do_raw_spin_unlock+0x57/0x270 [ 3032.603023][T27721] do_wp_page+0x48e/0x1500 [ 3032.607461][T27721] ? finish_mkwrite_fault+0x540/0x540 [ 3032.612857][T27721] __handle_mm_fault+0x22e3/0x3eb0 [ 3032.618002][T27721] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3032.623567][T27721] ? find_held_lock+0x35/0x130 [ 3032.628342][T27721] ? handle_mm_fault+0x292/0xa90 [ 3032.633311][T27721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3032.639558][T27721] ? kasan_check_read+0x11/0x20 [ 3032.644429][T27721] handle_mm_fault+0x3b7/0xa90 [ 3032.649237][T27721] __do_page_fault+0x5ef/0xda0 [ 3032.654031][T27721] do_page_fault+0x71/0x57d [ 3032.658555][T27721] ? page_fault+0x8/0x30 [ 3032.662808][T27721] page_fault+0x1e/0x30 [ 3032.666965][T27721] RIP: 0033:0x40c34a [ 3032.670862][T27721] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a0 00 00 00 41 83 fe 10 75 d7 bf 1d e9 4b 00 31 c0 e8 46 58 ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 3032.690616][T27721] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010246 [ 3032.696688][T27721] RAX: 0000000000000001 RBX: 000000000075bf2c RCX: 00007ffc60c47c78 [ 3032.704663][T27721] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 3032.712639][T27721] RBP: 000000000075bf2c R08: 00007ffc60c47c80 R09: 0000000000760888 [ 3032.720614][T27721] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000075bf20 [ 3032.728590][T27721] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3032.853969][T27721] memory: usage 307180kB, limit 307200kB, failcnt 862 [ 3032.868990][T27721] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3032.883543][T27721] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3032.890597][T27721] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3032.912011][T27721] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27721,uid=0 [ 3032.930219][T27721] Memory cgroup out of memory: Killed process 27721 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000300)=0x9, 0x12) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000002c0)={'ip_vti0\x00', @random="b6fb5b732c24"}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x1000) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2f72646d61202f637075202f637075202f637075202f163b308272646d61202d70696473202f7069647320"], 0x2b) write$cgroup_type(r0, &(0x7f0000000340)='threaded\x00', 0x9) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000100)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x16, 0x1, 0x9c, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) 04:17:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xf00000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0x0) 04:17:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xf9d\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3032.945447][ T1042] oom_reaper: reaped process 27721 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x800000000}, 0x0) [ 3033.255600][T27759] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3033.312460][T27759] CPU: 0 PID: 27759 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3033.320484][T27759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3033.330541][T27759] Call Trace: [ 3033.333847][T27759] dump_stack+0x172/0x1f0 [ 3033.338190][T27759] dump_header+0x10f/0xb6c [ 3033.342642][T27759] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3033.348481][T27759] ? ___ratelimit+0x60/0x595 [ 3033.353079][T27759] ? do_raw_spin_unlock+0x57/0x270 04:17:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xfad\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3033.358259][T27759] oom_kill_process.cold+0x10/0x15 [ 3033.363389][T27759] out_of_memory+0x79a/0x1280 [ 3033.363407][T27759] ? lock_downgrade+0x880/0x880 [ 3033.363421][T27759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3033.363439][T27759] ? oom_killer_disable+0x280/0x280 [ 3033.363451][T27759] ? find_held_lock+0x35/0x130 [ 3033.363477][T27759] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3033.373000][T27759] ? memcg_event_wake+0x230/0x230 [ 3033.373028][T27759] ? do_raw_spin_unlock+0x57/0x270 [ 3033.373044][T27759] ? _raw_spin_unlock+0x2d/0x50 [ 3033.373063][T27759] try_charge+0x102c/0x15c0 [ 3033.373082][T27759] ? find_held_lock+0x35/0x130 [ 3033.419643][T27759] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3033.425202][T27759] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3033.430758][T27759] ? find_held_lock+0x35/0x130 [ 3033.435536][T27759] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3033.441109][T27759] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3033.446679][T27759] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3033.450730][ T26] audit: type=1804 audit(1559362651.890:263): pid=27752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir507440853/syzkaller.3YmJvd/1674/memory.events" dev="sda1" ino=17147 res=1 [ 3033.451888][T27759] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3033.451906][T27759] __memcg_kmem_charge+0x136/0x300 [ 3033.451924][T27759] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3033.451939][T27759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3033.451959][T27759] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3033.505470][T27759] ? copy_process.part.0+0x43f7/0x6790 [ 3033.510957][T27759] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3033.516334][T27759] ? trace_hardirqs_on+0x67/0x220 [ 3033.521360][T27759] ? kasan_check_read+0x11/0x20 [ 3033.526228][T27759] copy_process.part.0+0x4a0/0x6790 [ 3033.531440][T27759] ? __lock_acquire+0x54f/0x5490 [ 3033.536403][T27759] ? __cleanup_sighand+0x60/0x60 [ 3033.541363][T27759] ? rcu_read_lock_sched_held+0x110/0x130 [ 3033.547141][T27759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3033.553463][T27759] _do_fork+0x25d/0xfe0 [ 3033.557638][T27759] ? copy_init_mm+0x20/0x20 [ 3033.562185][T27759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3033.567661][T27759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3033.573148][T27759] ? do_syscall_64+0x26/0x680 [ 3033.577857][T27759] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3033.583961][T27759] ? do_syscall_64+0x26/0x680 [ 3033.588666][T27759] __x64_sys_clone+0xbf/0x150 [ 3033.593354][T27759] do_syscall_64+0xfd/0x680 [ 3033.597884][T27759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3033.603780][T27759] RIP: 0033:0x45bc49 [ 3033.607686][T27759] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3033.627296][T27759] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3033.635800][T27759] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3033.643789][T27759] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3033.651776][T27759] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 04:17:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:32 executing program 0 (fault-call:2 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x3f00000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3033.659765][T27759] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3033.667744][T27759] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3033.698871][T27759] memory: usage 307196kB, limit 307200kB, failcnt 879 [ 3033.750631][T27759] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3033.770428][T27783] FAULT_INJECTION: forcing a failure. [ 3033.770428][T27783] name failslab, interval 1, probability 0, space 0, times 0 [ 3033.783412][T27783] CPU: 0 PID: 27783 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #11 [ 3033.791515][T27783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3033.797420][T27759] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3033.801581][T27783] Call Trace: [ 3033.801642][T27783] dump_stack+0x172/0x1f0 [ 3033.801681][T27783] should_fail.cold+0xa/0x15 [ 3033.801704][T27783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3033.826542][T27783] ? mark_held_locks+0xa4/0xf0 [ 3033.831325][T27783] __should_failslab+0x121/0x190 [ 3033.836282][T27783] should_failslab+0x9/0x14 [ 3033.840796][T27783] kmem_cache_alloc+0x47/0x6f0 [ 3033.843753][T27759] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3033.845583][T27783] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3033.845620][T27783] sctp_get_port_local+0x45a/0x16e0 [ 3033.877108][T27783] ? sctp_unhash+0x10/0x10 [ 3033.881557][T27783] ? mark_held_locks+0xa4/0xf0 [ 3033.886343][T27783] sctp_get_port+0xf8/0x170 [ 3033.890858][T27783] ? sctp_get_port_local+0x16e0/0x16e0 [ 3033.896350][T27783] ? __local_bh_enable_ip+0x15a/0x270 [ 3033.901771][T27783] inet_autobind+0xb9/0x1a0 [ 3033.906291][T27783] inet_sendmsg+0x40a/0x5d0 [ 3033.910810][T27783] ? ipip_gro_receive+0x100/0x100 [ 3033.915849][T27783] sock_sendmsg+0xd7/0x130 [ 3033.920290][T27783] ___sys_sendmsg+0x803/0x920 [ 3033.925001][T27783] ? copy_msghdr_from_user+0x430/0x430 [ 3033.930482][T27783] ? lock_downgrade+0x880/0x880 [ 3033.934899][T27759] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27759,uid=0 [ 3033.935349][T27783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3033.956892][T27783] ? kasan_check_read+0x11/0x20 [ 3033.961759][T27783] ? __fget+0x381/0x550 [ 3033.965968][T27783] ? __fget_light+0x1a9/0x230 [ 3033.966964][T27759] Memory cgroup out of memory: Killed process 27759 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3033.970652][T27783] ? __fdget+0x1b/0x20 [ 3033.970668][T27783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3033.970688][T27783] __sys_sendmsg+0x105/0x1d0 [ 3033.970714][T27783] ? __ia32_sys_shutdown+0x80/0x80 [ 3033.970742][T27783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3033.970756][T27783] ? do_syscall_64+0x26/0x680 [ 3033.970772][T27783] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3033.970785][T27783] ? do_syscall_64+0x26/0x680 [ 3033.970803][T27783] __x64_sys_sendmsg+0x78/0xb0 [ 3033.970830][T27783] do_syscall_64+0xfd/0x680 [ 3033.970862][T27783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3034.040602][T27783] RIP: 0033:0x459279 04:17:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xfbd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3034.044503][T27783] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3034.064113][T27783] RSP: 002b:00007f452fb27c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3034.072543][T27783] RAX: ffffffffffffffda RBX: 00007f452fb27c90 RCX: 0000000000459279 [ 3034.080530][T27783] RDX: 00000000000000fc RSI: 00000000200006c0 RDI: 0000000000000003 [ 3034.088515][T27783] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:17:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1000000000}, 0x0) [ 3034.096579][T27783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f452fb286d4 [ 3034.104562][T27783] R13: 00000000004c6653 R14: 00000000004db310 R15: 0000000000000004 [ 3034.303385][T27800] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3034.371411][T27800] CPU: 0 PID: 27800 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3034.379428][T27800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3034.389478][T27800] Call Trace: [ 3034.392783][T27800] dump_stack+0x172/0x1f0 [ 3034.397144][T27800] dump_header+0x10f/0xb6c [ 3034.402022][T27800] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3034.407833][T27800] ? ___ratelimit+0x60/0x595 [ 3034.412431][T27800] ? do_raw_spin_unlock+0x57/0x270 [ 3034.417552][T27800] oom_kill_process.cold+0x10/0x15 [ 3034.422715][T27800] out_of_memory+0x79a/0x1280 [ 3034.427399][T27800] ? lock_downgrade+0x880/0x880 [ 3034.432258][T27800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3034.438509][T27800] ? oom_killer_disable+0x280/0x280 [ 3034.443712][T27800] ? find_held_lock+0x35/0x130 [ 3034.448509][T27800] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3034.454109][T27800] ? memcg_event_wake+0x230/0x230 [ 3034.459167][T27800] ? do_raw_spin_unlock+0x57/0x270 [ 3034.464682][T27800] ? _raw_spin_unlock+0x2d/0x50 [ 3034.469568][T27800] try_charge+0x102c/0x15c0 [ 3034.474085][T27800] ? find_held_lock+0x35/0x130 [ 3034.478951][T27800] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3034.484563][T27800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3034.490817][T27800] ? kasan_check_read+0x11/0x20 [ 3034.495682][T27800] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3034.501236][T27800] mem_cgroup_try_charge+0x24d/0x5e0 [ 3034.506548][T27800] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3034.512753][T27800] __handle_mm_fault+0x1e1a/0x3eb0 [ 3034.517879][T27800] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3034.523433][T27800] ? find_held_lock+0x35/0x130 [ 3034.528208][T27800] ? handle_mm_fault+0x292/0xa90 [ 3034.533169][T27800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3034.539417][T27800] ? kasan_check_read+0x11/0x20 [ 3034.544295][T27800] handle_mm_fault+0x3b7/0xa90 [ 3034.549079][T27800] __do_page_fault+0x5ef/0xda0 [ 3034.553878][T27800] do_page_fault+0x71/0x57d [ 3034.558401][T27800] ? page_fault+0x8/0x30 [ 3034.562672][T27800] page_fault+0x1e/0x30 [ 3034.566844][T27800] RIP: 0033:0x400590 [ 3034.570737][T27800] Code: 06 e9 49 01 00 00 48 8b 44 24 10 48 0b 44 24 28 75 1f 48 8b 14 24 48 8b 7c 24 20 be 04 00 00 00 e8 f5 56 00 00 48 8b 74 24 08 <89> 06 e9 1e 01 00 00 48 8b 44 24 08 48 8b 14 24 be 04 00 00 00 8b [ 3034.590340][T27800] RSP: 002b:00007ffc60c47b80 EFLAGS: 00010206 [ 3034.596413][T27800] RAX: 0000000000000000 RBX: 0000000000760000 RCX: 0000000000000000 [ 3034.604382][T27800] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000000 [ 3034.612374][T27800] RBP: fffffffffffffffe R08: 0000000000000000 R09: 0000000000000000 [ 3034.620345][T27800] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000760008 [ 3034.628365][T27800] R13: 00000000004c53b9 R14: 0000000000000000 R15: 00007ffc60c47db0 [ 3034.798591][T27800] memory: usage 307192kB, limit 307200kB, failcnt 893 [ 3034.811704][T27800] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3034.819364][T27800] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3034.832699][T27800] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:33 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="2e000000100081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001c80020000005e510befccd7", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) 04:17:33 executing program 0 (fault-call:2 fault-nth:1): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r0, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xfcd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x4000000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3034.895584][T27800] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27800,uid=0 [ 3034.911633][T27800] Memory cgroup out of memory: Killed process 27800 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3034.926664][ T1042] oom_reaper: reaped process 27800 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x6087ffffffff}, 0x0) 04:17:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3035.142282][T27838] netlink: 'syz-executor.5': attribute type 28 has an invalid length. [ 3035.181728][T27834] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3035.209115][T27834] CPU: 1 PID: 27834 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3035.217118][T27834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3035.227178][T27834] Call Trace: [ 3035.230485][T27834] dump_stack+0x172/0x1f0 [ 3035.234828][T27834] dump_header+0x10f/0xb6c [ 3035.239264][T27834] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3035.245079][T27834] ? ___ratelimit+0x60/0x595 [ 3035.249683][T27834] ? do_raw_spin_unlock+0x57/0x270 [ 3035.254795][T27834] oom_kill_process.cold+0x10/0x15 [ 3035.259899][T27834] out_of_memory+0x79a/0x1280 [ 3035.264613][T27834] ? lock_downgrade+0x880/0x880 [ 3035.269463][T27834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3035.275701][T27834] ? oom_killer_disable+0x280/0x280 [ 3035.280912][T27834] ? find_held_lock+0x35/0x130 [ 3035.285695][T27834] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3035.291235][T27834] ? memcg_event_wake+0x230/0x230 [ 3035.296287][T27834] ? do_raw_spin_unlock+0x57/0x270 [ 3035.301399][T27834] ? _raw_spin_unlock+0x2d/0x50 [ 3035.306252][T27834] try_charge+0x102c/0x15c0 [ 3035.310739][T27834] ? find_held_lock+0x35/0x130 [ 3035.315498][T27834] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3035.321040][T27834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3035.327282][T27834] ? kasan_check_read+0x11/0x20 [ 3035.332134][T27834] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3035.337680][T27834] mem_cgroup_try_charge+0x24d/0x5e0 [ 3035.343603][T27834] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3035.349253][T27834] wp_page_copy+0x416/0x1770 [ 3035.353841][T27834] ? do_wp_page+0x486/0x1500 [ 3035.358444][T27834] ? pmd_pfn+0x1d0/0x1d0 [ 3035.362684][T27834] ? lock_downgrade+0x880/0x880 [ 3035.367531][T27834] ? swp_swapcount+0x540/0x540 [ 3035.372294][T27834] ? kasan_check_read+0x11/0x20 [ 3035.377155][T27834] ? do_raw_spin_unlock+0x57/0x270 [ 3035.382265][T27834] do_wp_page+0x48e/0x1500 [ 3035.386682][T27834] ? finish_mkwrite_fault+0x540/0x540 [ 3035.392058][T27834] __handle_mm_fault+0x22e3/0x3eb0 [ 3035.397190][T27834] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3035.403236][T27834] ? find_held_lock+0x35/0x130 [ 3035.408013][T27834] ? handle_mm_fault+0x292/0xa90 [ 3035.412955][T27834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3035.419207][T27834] ? kasan_check_read+0x11/0x20 [ 3035.424057][T27834] handle_mm_fault+0x3b7/0xa90 [ 3035.428835][T27834] __do_page_fault+0x5ef/0xda0 [ 3035.433622][T27834] do_page_fault+0x71/0x57d [ 3035.438124][T27834] ? page_fault+0x8/0x30 [ 3035.442369][T27834] page_fault+0x1e/0x30 [ 3035.446534][T27834] RIP: 0033:0x40c34a [ 3035.450428][T27834] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a0 00 00 00 41 83 fe 10 75 d7 bf 1d e9 4b 00 31 c0 e8 46 58 ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 3035.470024][T27834] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010246 [ 3035.476083][T27834] RAX: 0000000000000001 RBX: 000000000075bf2c RCX: 00007ffc60c47c78 [ 3035.484068][T27834] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 3035.492037][T27834] RBP: 000000000075bf2c R08: 00007ffc60c47c80 R09: 0000000000760888 [ 3035.500014][T27834] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000075bf20 [ 3035.507980][T27834] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3035.557935][T27838] netlink: 'syz-executor.5': attribute type 28 has an invalid length. 04:17:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:34 executing program 5: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.current\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) 04:17:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xfdd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3035.656918][T27834] memory: usage 307200kB, limit 307200kB, failcnt 907 [ 3035.667681][T27834] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3035.696710][T27834] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r0, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3035.746434][T27834] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x4, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x6000000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3036.051433][T27834] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27834,uid=0 04:17:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xfed\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x1a0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3036.116239][T27834] Memory cgroup out of memory: Killed process 27834 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3036.253281][ T1042] oom_reaper: reaped process 27834 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r0, 0x0, 0xffffffffffffff9c, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1000000000000}, 0x0) 04:17:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x1, 0x7fffffff, 0x8, 0x8000, 0x0, 0x8, 0x800a, 0xe, 0xfffffffffffff745, 0x7f, 0x2, 0x0, 0xe5ae, 0x5a9f, 0x6, 0x8000, 0x9, 0x57e, 0x7, 0x80, 0xb720, 0x7, 0x935e, 0x0, 0x8, 0x800, 0x6, 0x80000000, 0x8, 0x64b79ab3, 0x1, 0xe49, 0x1, 0x1, 0xfffffffffffffffe, 0x7ff, 0x0, 0x4, 0x4, @perf_config_ext={0xdef, 0x80000000}, 0x0, 0x0, 0x2, 0x4, 0x80000000, 0x81}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x1, 0x3, 0x10001, 0x81, 0x0, 0x0, 0x1, 0x8, 0x67a2, 0x4, 0x3, 0x8, 0x0, 0x5, 0x9, 0x9, 0x1, 0xb89, 0x7ff, 0x7, 0x401, 0x2, 0x20, 0x2, 0x8, 0x8, 0x2, 0x800, 0x18, 0x8, 0x3f, 0x5, 0x2, 0x3, 0x3, 0x5, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x6, 0x9}, 0x2810, 0x0, 0x7, 0x9, 0x4, 0xffffffffffffff62, 0x10000}, r1, 0x9, r2, 0xb) r3 = socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xffffffffffffff30, 0x0, &(0x7f0000000280)="c66f098d1eb6e043edf5fa41051ce50e7b37a13a8a742db16b025178a7c7b07c6bec518f71f6e5a7fd5d88a41583b10300b9cd8dfbebcff299", 0x0, 0x2}, 0x2d) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x800000000000, 0x80000001, 0x1, 0x5, 0x0, 0x6, 0x4000, 0x9, 0x3, 0x1, 0x401, 0x6, 0x0, 0x100000000, 0xfffffffff4ec3b42, 0x64ec, 0x0, 0x30, 0x5, 0x200, 0x2, 0x0, 0x5, 0x6, 0xffffffffffff0000, 0x1, 0x0, 0x8000, 0x0, 0x4, 0x1, 0x1, 0xffff, 0x1, 0x100, 0x4, 0x0, 0xfffffffffffffff8, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x20002, 0x4, 0x7, 0xf, 0x3800, 0x6, 0x5}, r4, 0x4, r5, 0xb) 04:17:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x4000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xffd\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x730a000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3036.608150][T27904] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 04:17:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x34000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3036.691237][T27904] CPU: 0 PID: 27904 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3036.699296][T27904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3036.709343][T27904] Call Trace: [ 3036.709361][T27904] dump_stack+0x172/0x1f0 [ 3036.709373][T27904] dump_header+0x10f/0xb6c [ 3036.709383][T27904] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3036.709392][T27904] ? ___ratelimit+0x60/0x595 [ 3036.709401][T27904] ? do_raw_spin_unlock+0x57/0x270 [ 3036.709412][T27904] oom_kill_process.cold+0x10/0x15 [ 3036.709421][T27904] out_of_memory+0x79a/0x1280 [ 3036.709431][T27904] ? lock_downgrade+0x880/0x880 [ 3036.709440][T27904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3036.709449][T27904] ? oom_killer_disable+0x280/0x280 [ 3036.709456][T27904] ? find_held_lock+0x35/0x130 [ 3036.709471][T27904] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3036.709479][T27904] ? memcg_event_wake+0x230/0x230 [ 3036.709491][T27904] ? do_raw_spin_unlock+0x57/0x270 [ 3036.709499][T27904] ? _raw_spin_unlock+0x2d/0x50 [ 3036.709510][T27904] try_charge+0x102c/0x15c0 [ 3036.709516][T27904] ? find_held_lock+0x35/0x130 [ 3036.709529][T27904] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3036.709537][T27904] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3036.709545][T27904] ? find_held_lock+0x35/0x130 [ 3036.709554][T27904] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3036.709568][T27904] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3036.709575][T27904] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3036.709586][T27904] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3036.709595][T27904] __memcg_kmem_charge+0x136/0x300 [ 3036.709606][T27904] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3036.709614][T27904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3036.709629][T27904] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3036.709648][T27904] ? copy_process.part.0+0x43f7/0x6790 [ 3036.709667][T27904] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3036.727471][T27904] ? trace_hardirqs_on+0x67/0x220 [ 3036.727489][T27904] ? kasan_check_read+0x11/0x20 [ 3036.727511][T27904] copy_process.part.0+0x4a0/0x6790 [ 3036.883372][T27904] ? __lock_acquire+0x54f/0x5490 [ 3036.888326][T27904] ? __cleanup_sighand+0x60/0x60 [ 3036.893301][T27904] ? rcu_read_lock_sched_held+0x110/0x130 [ 3036.899022][T27904] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3036.905279][T27904] _do_fork+0x25d/0xfe0 [ 3036.909439][T27904] ? copy_init_mm+0x20/0x20 [ 3036.913952][T27904] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3036.919407][T27904] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3036.924864][T27904] ? do_syscall_64+0x26/0x680 [ 3036.929565][T27904] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3036.935645][T27904] ? do_syscall_64+0x26/0x680 [ 3036.940325][T27904] __x64_sys_clone+0xbf/0x150 [ 3036.945008][T27904] do_syscall_64+0xfd/0x680 [ 3036.949515][T27904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3036.955406][T27904] RIP: 0033:0x45bc49 [ 3036.959306][T27904] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3036.978904][T27904] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3036.987309][T27904] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3036.995999][T27904] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3037.003993][T27904] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3037.011956][T27904] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3037.019918][T27904] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x40000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3037.222112][T27904] memory: usage 307200kB, limit 307200kB, failcnt 951 04:17:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000040880)={&(0x7f00000400c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000040740)=[{&(0x7f0000040140)=""/24, 0x18}, {&(0x7f0000040180)=""/37, 0x25}, {&(0x7f00000401c0)=""/71, 0x47}, {&(0x7f0000040240)=""/143, 0x8f}, {&(0x7f0000040300)=""/219, 0xdb}, {&(0x7f0000040400)=""/202, 0xca}, {&(0x7f0000040500)=""/123, 0x7b}, {&(0x7f0000040580)=""/111, 0x6f}, {&(0x7f0000040600)=""/14, 0xe}, {&(0x7f0000040640)=""/225, 0xe1}], 0xa, &(0x7f0000040800)=""/106, 0x6a}, 0x10000) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000408c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000040980)={0x17, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x401}, [@ldst={0x0, 0x0, 0x6, 0x2, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}, @jmp={0x5, 0x3, 0xb, 0xb, 0xb, 0xfffffffffffffffc, 0xfffffffffffffffc}, @exit, @generic={0x5, 0x8, 0xe5, 0x84, 0x2}, @map={0x18, 0xf, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x3, 0xa, 0x2, 0x8, 0xffffffffffffffff}]}, &(0x7f0000000100)='syzkaller\x00', 0x1ff, 0xa2, &(0x7f0000000140)=""/162, 0x40f00, 0x1, [], r1, 0xc, r2, 0x8, &(0x7f0000040900)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000040940)={0x1, 0xb, 0x1}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xc, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) [ 3037.275152][T27904] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3037.357499][T27904] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3037.403072][T27904] Memory cgroup stats for /syz4: cache:96KB rss:160KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x400300, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3037.497030][T27904] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27904,uid=0 [ 3037.551898][T27904] Memory cgroup out of memory: Killed process 27904 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3037.598951][ T1042] oom_reaper: reaped process 27904 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x60000000000000}, 0x0) 04:17:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x9effffff00000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x8000a0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:36 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000f640)={0x0, 0x22a, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)=@nl=@unspec={0x0, 0x0, 0x1befff7f}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x80108906, 0x2070a000) [ 3037.948813][T27981] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3038.014268][T27981] CPU: 0 PID: 27981 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3038.022290][T27981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3038.032346][T27981] Call Trace: [ 3038.035646][T27981] dump_stack+0x172/0x1f0 [ 3038.040267][T27981] dump_header+0x10f/0xb6c [ 3038.044710][T27981] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3038.050525][T27981] ? ___ratelimit+0x60/0x595 [ 3038.055125][T27981] ? do_raw_spin_unlock+0x57/0x270 [ 3038.060242][T27981] oom_kill_process.cold+0x10/0x15 [ 3038.065353][T27981] out_of_memory+0x79a/0x1280 [ 3038.070027][T27981] ? lock_downgrade+0x880/0x880 [ 3038.074879][T27981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3038.081128][T27981] ? oom_killer_disable+0x280/0x280 [ 3038.086324][T27981] ? find_held_lock+0x35/0x130 [ 3038.091105][T27981] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3038.096698][T27981] ? memcg_event_wake+0x230/0x230 [ 3038.101739][T27981] ? do_raw_spin_unlock+0x57/0x270 [ 3038.106851][T27981] ? _raw_spin_unlock+0x2d/0x50 [ 3038.111702][T27981] try_charge+0x102c/0x15c0 [ 3038.116217][T27981] ? find_held_lock+0x35/0x130 [ 3038.120991][T27981] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3038.126551][T27981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3038.132816][T27981] ? kasan_check_read+0x11/0x20 [ 3038.137667][T27981] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3038.143216][T27981] mem_cgroup_try_charge+0x24d/0x5e0 [ 3038.148505][T27981] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3038.154146][T27981] __handle_mm_fault+0x1e1a/0x3eb0 [ 3038.159263][T27981] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3038.164805][T27981] ? find_held_lock+0x35/0x130 [ 3038.169567][T27981] ? handle_mm_fault+0x292/0xa90 [ 3038.174517][T27981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3038.180752][T27981] ? kasan_check_read+0x11/0x20 [ 3038.185606][T27981] handle_mm_fault+0x3b7/0xa90 [ 3038.190375][T27981] __do_page_fault+0x5ef/0xda0 [ 3038.195149][T27981] do_page_fault+0x71/0x57d [ 3038.199650][T27981] ? page_fault+0x8/0x30 [ 3038.203890][T27981] page_fault+0x1e/0x30 [ 3038.208039][T27981] RIP: 0033:0x410bbf [ 3038.211930][T27981] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 3038.231527][T27981] RSP: 002b:00007ffc60c47ad0 EFLAGS: 00010206 [ 3038.237586][T27981] RAX: 00007f2a40ca0000 RBX: 0000000000020000 RCX: 00000000004592ca [ 3038.245579][T27981] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 3038.253550][T27981] RBP: 00007ffc60c47bb0 R08: ffffffffffffffff R09: 0000000000000000 04:17:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x8002a0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x01e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3038.261513][T27981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60c47ca0 [ 3038.269490][T27981] R13: 00007f2a40cc0700 R14: 0000000000000000 R15: 000000000075bf2c 04:17:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3038.471439][T27981] memory: usage 307200kB, limit 307200kB, failcnt 984 [ 3038.496792][T27981] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x40000000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3038.530719][T27981] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x02e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3038.563538][T27981] Memory cgroup stats for /syz4: cache:96KB rss:160KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0xa0008000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xc00e000000000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3038.727331][T27981] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27981,uid=0 [ 3038.748934][T27981] Memory cgroup out of memory: Killed process 27981 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3038.871833][ T1042] oom_reaper: reaped process 27981 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x8000a0ffffffff}, 0x0) 04:17:37 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10e, 0xb, &(0x7f0000000000), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000840)="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", 0xfb}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000e40)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @broadcast}, 0x0, 0x2}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="ba7be84c076addaa733395c37a9fe11165dd706aa821703a0be02de1138b4092774a0c3c59c93c81c10e2ec820ec00f4fe00eccb847fbb8214d5f4023dd5ef34b9957a6de013f51158dac099ac3d8ce11772bb6e5bc11a0d08da091c3bb8b68f1dc6d57fd27ccc38d9033e3c050f17e5e87280a7f16ab80e0e9b979f13d7b9010f1c4f69e162385589c0f5e92fe52f4a74ccd819fe58533939a504df49774e0eebd776552a8109e65bfa7be1d6da", 0xae}, {&(0x7f0000000200)="b0b248811913e9028fada834044586ac53ea6951e461046e81f21c0783cc8c5f4c90dde971f5cd0d85efe2dd7e1e5994ec063827c44a5bd333aedc843a26e591f598566ee1af983c6f4cc8795edf3d72f64f878714fb085344af00be21f70f705d1d097fa864266ea3951998b176bd8ee76074142b359ae2d755607613439d046d973246fd56b9da93afff83e935ecdbc1324dbb02702d56f1fe419bb46a558419ec2e756f9fb9fb8242212585ecd5ea15c327cdb2d458be6899e96a68143ff4595daa910864377a804d2bb3c741f99f546ee83e", 0xd4}, {&(0x7f0000000540)="83b869d947c26bcfeb13ca3ea28386d758022b1b5227094641bf2d7331e985aeab5630d6c54fedf98f2ebef827", 0x2d}, {&(0x7f0000002600)="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", 0x1000}, {&(0x7f0000000580)="4a7c80fbe69f3ed3f8f410662c6187c63083f207befa8cad17bb1819d7a1fa241e35f64bcdd93cc5e0ea67f50fb56aabc9c1eb592409591ad7f54ca4c943feeaa91d4f21333b384f42e488ea2971b141fa7debc77429a18304896f5b48927962021e25cc", 0x64}, {&(0x7f0000000600)="d315161ec7dcb800c5fb5895d9a90227b0468a39d91f1f9a24c4", 0x1a}, {&(0x7f0000000640)="b47b86326c201ccc16d94072588cc6b4bf4fdfe9aa7379e5", 0x18}, {&(0x7f0000000680)="d11c6f861839f0c459aaab64b69de70cb28d2151f3a398f8cc51ad699fd025610076f1a2110b0bd35444d75482ea41354c16aebe", 0x34}, {&(0x7f00000006c0)="11eb9b613104ff5792a67ee8c018180b9f4466c1adfd9b88810af2f2c9805eabb9e52e78697505952a0a230106319334", 0x30}, {&(0x7f0000000700)="a8d0b3a06df22d17e2c1ced0205a5e41ed03aef812e7e3dcabfaad92388a0ccaf9d4d0255469a3fe659189736f66225c20020341e3c034cd5a2c59c8c037de0b9d5b6774e2206b6cc6e67372b3fe76967777ceaf63b65ef652a938a978ff79b9038a7c2bb173c66022a76d487079cbf1", 0x70}], 0xa, &(0x7f0000000e80)=ANY=[@ANYBLOB="f800000000000000ff010000020000004d1d03cc0060941ce0e0e8cfce1cd4d05fa721effcbbe3fbf2c8a0af6694715d2c135746317be65d68ed0a32db4c52873633f3168383e78030cfa679ee75f20f25327815ba9d9f332d2d841ca0f7af985cbe62cceb8e9aa59ad5a5fe9c19df750b992fc5092e90f2175d628eb62b4ab7d1ffd76ea110fee0a51776694478299fca9787a850368d00f089d41ca3d86fdcdb5fd8e1a108d2addac55f074bb865e413a832e10af3d52f4b4a16ec679068da3329c9b9e6503d093b238b9fcbed3b005e70b77ca86478b48c466be7edc2cc13b086f66aa7dda330362ae7e2e85a673235251634d21d000008010000000000001f01000004000000a82d2b12bc48a7a3204b8137b835b0c25ff3cf382c2afd20a51f9d5fe754898a06ce21db65bb9691fd72e3acaa5e5703767455cbbfd43350827700286e65f9579f5d2ee862c7b5f655afe6797e4f5ca2061a54946d9207296e95579f993287b37873a08610e255b7ff784568d645d01c8dda6bf21584b453d03a6543da2abfcc78ffcaea84e0a9cfe2af9d5084d840e12442a58d680c558334731fdb5efdd320ce353da082dbba089feec6fb3a12a5082940804448c763d07084d6a92bbd088f5db0563d09b6e7ef1393195841225c55d33445478ca5fc816f4723e15f4d5c04e6a7b95e4da8bc93ed6d0ec7e36d55d6b617190692dd960058000000000000008800000009000000b586c9d5f68ce1e2e5aca7917ab95d68db6962f96de8d12763572a8dd4139d25a5805f3cfe129e6fd3a39634d75f2338edbd2d172d0ef33f09fdeb9daf34da82b4e900000000000008010000000000000e010000fdffffff595659bcd8e8598b36e2dfa65db572cf85776b5187952a2f705afcee778c99243ef9c7a393585c6f542db72516a69935659128cc0f557a1b59a9f61280e391ac7556111c34650afcc5d032300515a2b3d307c0c011f4e91f7cddfe65a967ec3496fc9c074efcba59417a8a53645d5092e6c8ad4ba2ffe57fe162a7d8dc09b31d182320fba6bb13e5f334009fc0126a87f952213dfaebaaaf8b05ce9c4c07cfcb3296da5cf46f7bd5012518986e4c46ef69ec4003b07c7721514a427bff48f023f903ddd28eff9db53c87f4bc150e756078cbf766a3fef401c45b24a2ced40fa636398c51b1ebeb462ac1deb120599a00dbb400000000000010000000000000000f010000ff03000070000000000000000d01000001000000db8800f656fa4b804e01ea04fb15d3dd8500f2dfec2a04363acb4556cd565a6d7aa20d14eb0200c783cd72b533c22aebbeb598fa524493bc959f40642139f08cfa788a800c00126eaeb07a624e6dc47bc688dfeb8e21032faac7db6600000000c00000000000000005010000b0000000157bee8296c9963189ccaac627d8b7e53a250ef1fa0495b57713424c8d47d8ef98fa70a597c59c04e24e5e62ef603a33457fa07812bbe189030f6ce22ec906b7a9913110feb00ff4694331c0bfe8b51bb2ff5758e4b201933b83e43da66c247608502e66b783d420ca9ae94580a7c0dc93eaf1b66ff3923d72f96b4938efe654cb1e2e217e6e318bb96b881e37ec967415e3b71e2328120f4b7f716071c2ef3ec135a788d1b3a80050000000000000000b01000001800000a15be04ba493cc69f9dd4d46a349c3e09c00718b9fcd61d11e2bc7b2839702786e3f4a887b1b0e9f3207ba74cd7365576b2b8698d3ee844fa321243d52000000483065df2bb90183f490a02a4ba4faa8355aa51136f720fb453a69bfeec2e4"], 0x4f0}, 0x40005) sendmsg$sock(r0, &(0x7f0000000500)={0x0, 0xffffff2b, &(0x7f0000000440)=[{&(0x7f0000000340)="4f8ea8b7290fe87b228ad4c0371dbd260447ecb080a6f3f834b6f6beab035432ba9f35be50f2aae5664f52bcb39f70553a6f819bc8eab203adbcedce0098f179096ef16350054040a99c8ff5183326db939433b5429434a12117f6a844d80c90d7111ea7093ecc30a6825b98bb00f1af99d6a8f10d337845506df7640a9262aacecf50efcb924766adb3d4e32a9dd16b0e93c01b10248b3e5279081869bf92e472b111e5543b202223ec9f972bcf4c8e00f81bc6462f2f526996361d412f69de1e0850", 0xc3}, {&(0x7f0000001600)="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", 0x1000}], 0x2, &(0x7f0000000480)=[@txtime={{0x18, 0x1, 0x3d, 0x40}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0xffd}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x78}, 0x4000885) 04:17:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x03e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0xa0010000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:37 executing program 5: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000003c0)={0x4, 0x70, 0x0, 0x101, 0x40, 0x5, 0x0, 0x1, 0x40000, 0xf, 0x8, 0x0, 0x5, 0x6, 0x0, 0x6, 0x2, 0x2, 0x4, 0x2, 0x715, 0x1, 0x4a8, 0x1, 0x100000001, 0x0, 0x1, 0x0, 0xfff, 0x81, 0x1, 0x5, 0x78b, 0x0, 0x5, 0x3, 0x6, 0x9, 0x0, 0x9, 0x4, @perf_bp={0x0, 0x8}, 0x8000, 0x1, 0x1, 0x8, 0xbca3, 0x401, 0x8000}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000e80)={&(0x7f0000000340)=@in6={0xa, 0x4e21, 0x3, @remote, 0xda7}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000600)="d43ac6872b5cf1662b4f7f93e5169d0c02fb34f9a29989c2b6a8544283aa73e84ea0c359b1d91ad79e7232b666a5013192096e864c7231e62f80adf587131565a1e8d6abc2c07079f627", 0x4a}, {&(0x7f0000000680)="810797da7b88f52716c8e8aac5db3ddbffa0e42eea81a65b23b537d707a13a0840bc49f76bf7aa9d2e90cde04f11957daa169a3dea91bb2e5753b10f796c957de786eebd778064f273f1078cbf06f85fe5219b5f18786df6a292259de011cbb6b88c1aba41688288c393c16fbffb823563", 0x71}, {&(0x7f0000000700)="75a8756de0f582a0b7020c74d7b635383bed781570daa4e213c92dc95e1256039c5af8a8689b645d5d285715e9cb19df5ae65935757218a93cf0af399c7b66ceced86289fde737afbefc2f70ebba62a6b4866a1bf7c5ea43799523dca8f63a0d7387d3c6036aa7ed7e5bd8da8523e22798293e74c0794cdf58e70029ccfc6d5c19a24175d1c1d50853bdffb09bac84e6d245dc42ba711eeb7421d758b50035591dea6053ff0ebca4f2f5411d07b8a168227a21d0a6c7afe00d614629ca", 0xbd}, {&(0x7f0000000240)="1b69fc180896889be94703a7b3a237958324fa7b23470ef841e46835f611edfbc41cccf044ec2d171fd5dec08d2ed0f6f681a21e97c422b3969cc44027", 0x3d}, {&(0x7f00000007c0)="f438ff4db99f0084a7d9b638956d30e7d82aed0e3e66", 0x16}, {&(0x7f0000000800)="51bbca5cde84236b1d62b861cee223a62c2d4b54c9c18b3ed23da218eaca76d1bbfb312d10d1fe7ca50380d26e29c3fc0c9cb8393926745af638b04bc00a50ca7c64f212e68456b380bd55d8860d94412076c70120d9297dfdb88294ecb1ec8e75207be15531490e6d2cef9d2bf408e709b2c8e8b1a2da72a4362b373396791c57e77c71e680beac5a703833209d6d6b0707edf6c203318d178cf9dcc1c464f93578eb91ef06412c7b2cfaea7d662212c4c8ec2afbb71eaca2b56e4aefc60949dfce16bc18431f6c2f", 0xc9}, {&(0x7f0000000900)="9d3e363b7555ea3d8eeb6984b944e3b82c96f2f25db1dd60725cba779dddc5d3cf9c2955d0a504fc71b8ca0e9fd52ddd877f4f963d56614f2fab1b7994584561f075e44c5ecfa2504b9cfba4d010d5aa685ba22a9e8b126cef28d904acc8df343e88ab879d72b4be47cb1366ff2ec71494dee8bf7f42ff430ff69c1dcf6419a6ce61c152d7f13ca9471fc0432b952d307c68215d6eead4da5824768475a5201ef94a0f14e58a0947fb348c3068a3a262b5d431f896424f444e7f70b3d42d33126ee255754cc7d336d38c3445177568fe1e6416038ee4b0e430cf76b960dd906484af43bfd10ffd0f73169f", 0xeb}, {&(0x7f0000000a00)="ed74375cbf0913ee94e89758d0c0ee1886301ff81ac749906ac340ff16644871a12c0988b25713cd0aea73e70953e50c43f174d188e7347bb89601da7e35996d838d83afaa8b9bfa702912aed4340bb8dec4662369979ae4090387c52e3f740f7c8d70e9b7c9b494c6b43d46601870c054c2d77f7a77095e19413de61f5ba6ca60a457f21e474cdd9a741e5ec04b654ce767141885c276b7d76d73f7cfc60bdda27f12ad2a130ea14d1a2d6b8adda5e4f6fc13a00f4d8bba3e9d9be46248c217bd0ae86f1bcb1017b71a18fab03134e976108c79d13d954e7c886bc3da67ec8579f41dbfacd2da3fdababa293fb402", 0xef}, {&(0x7f0000000b00)="0bb3a6367956e5d1be5a4c7471e3727d16713eb8e04df15241bd250c975a8d18693f44c8bcdcd6468a72ca74f7194fb9c6991571afc5015043ffac71d481a5c2c977f3ba5f01c4cdeea57421e0dee905b6d9cabe5f200ca89d4306fa62935801f4a5c26e5388246ce0305b77e97902ce8a6f6c4865b0a12246a7315d272ffb19cba6242c1e9ed154a0a7cb195d53798158c972d829e7be8b9df85dbc386c9d2f408047efed50da0b2de96c6021932a6fe763aec319d70707188f71631f513f92f5f7fa88e3b0f199b6290f5aee7b8e5f58b5cbadd99e272ec675e80e11a14cfc9293f7b93dc4d6ffe52b60b05ffb", 0xee}, {&(0x7f0000000c00)="7438507f95928c7f07e0a9cb052c4755df1183c316e822d97a6c6a4a309ecb572d1015214e313df534dfc21991016bc725852342ea94ec86cded8db03abc42ed9a38db0b0c2124c6fb269ea22b2cbd9c1b0e613882fcd5dc7844c3e63d80c326df7b829e10e5f59c645ed5ff70436eb5f9999bcd5d2f80be3cae71ea4f088f5eb3afd55de870bcc4b0f14a8f70a921c6a437b5d9d073e2215d0b7acfc85c05a27efd37fa2989453caafab026a145ee52e1b1a653e17dc0651c2ef62abcfa20deea0ce3e95d7aecba011d77180057909250fa49a722da8ecd47cee6739cdeaf7cadc0ae1caa652fdf1642801b433d66", 0xef}], 0xa, &(0x7f0000000dc0)=[{0xa0, 0x29, 0x6, "d97146a3eeb1db4396d739f45da677c6fc476312237537af08570206844eceec876e853ef580f31f241130168d6358124e412db16b667b9ccf5feccc21587da1dad79ce9dbe3f0963bfa05ace637ff2176274a48bbbfd8cd2a88958de8a06312241c204a7d48ede9a0123cb6fe1b2d4731352b8c77cd16f5d984e1a34fe9d8cfb871ed59dff3b27ae8beb0703de348"}], 0xa0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000580)='./file0\x00', 0x0, 0x11}, 0xfd32) r2 = socket$kcm(0x29, 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0}, 0x151) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1080000040240, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r3, 0x1, 0x1, 0x4f9a, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz0\x00', 0x1ff) recvmsg$kcm(r2, 0x0, 0x200040) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000ec0)='syz0\x00', 0x200002, 0x0) openat$cgroup(r4, &(0x7f0000000f00)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000011c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'hwsim0\x00', 0x3}) r5 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r5, 0x29, 0x14, &(0x7f0000000080), 0xfcf3) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, &(0x7f0000000600)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='./cgroup.net/syz1\x00') socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r1, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={0xffffffffffffffff, 0x0}, 0xffc5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 3039.251426][T28060] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3039.300168][T28060] CPU: 1 PID: 28060 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3039.308220][T28060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3039.318287][T28060] Call Trace: [ 3039.321605][T28060] dump_stack+0x172/0x1f0 [ 3039.325961][T28060] dump_header+0x10f/0xb6c [ 3039.330388][T28060] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3039.336205][T28060] ? ___ratelimit+0x60/0x595 [ 3039.340804][T28060] ? do_raw_spin_unlock+0x57/0x270 [ 3039.345932][T28060] oom_kill_process.cold+0x10/0x15 [ 3039.351057][T28060] out_of_memory+0x79a/0x1280 [ 3039.355752][T28060] ? lock_downgrade+0x880/0x880 [ 3039.360607][T28060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3039.366870][T28060] ? oom_killer_disable+0x280/0x280 [ 3039.372082][T28060] ? find_held_lock+0x35/0x130 [ 3039.376877][T28060] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3039.382435][T28060] ? memcg_event_wake+0x230/0x230 [ 3039.387488][T28060] ? do_raw_spin_unlock+0x57/0x270 [ 3039.392613][T28060] ? _raw_spin_unlock+0x2d/0x50 [ 3039.397511][T28060] try_charge+0x102c/0x15c0 [ 3039.402625][T28060] ? find_held_lock+0x35/0x130 [ 3039.407417][T28060] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3039.412982][T28060] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3039.418536][T28060] ? find_held_lock+0x35/0x130 [ 3039.423311][T28060] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3039.428880][T28060] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3039.434440][T28060] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3039.439663][T28060] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3039.445214][T28060] __memcg_kmem_charge+0x136/0x300 [ 3039.445235][T28060] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3039.445257][T28060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3039.455737][T28060] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3039.455769][T28060] ? copy_process.part.0+0x43f7/0x6790 [ 3039.455799][T28060] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3039.455820][T28060] ? trace_hardirqs_on+0x67/0x220 [ 3039.483490][T28060] ? kasan_check_read+0x11/0x20 [ 3039.488356][T28060] copy_process.part.0+0x4a0/0x6790 [ 3039.493568][T28060] ? __lock_acquire+0x54f/0x5490 [ 3039.498553][T28060] ? __cleanup_sighand+0x60/0x60 [ 3039.503513][T28060] ? rcu_read_lock_sched_held+0x110/0x130 [ 3039.509241][T28060] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3039.515502][T28060] _do_fork+0x25d/0xfe0 [ 3039.519847][T28060] ? copy_init_mm+0x20/0x20 [ 3039.524379][T28060] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3039.529848][T28060] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3039.535322][T28060] ? do_syscall_64+0x26/0x680 [ 3039.540009][T28060] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3039.546082][T28060] ? do_syscall_64+0x26/0x680 [ 3039.550771][T28060] __x64_sys_clone+0xbf/0x150 [ 3039.555459][T28060] do_syscall_64+0xfd/0x680 [ 3039.559979][T28060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3039.565876][T28060] RIP: 0033:0x45bc49 [ 3039.569776][T28060] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3039.589385][T28060] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 04:17:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x04e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xd) gettid() write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x2b, 'cpu'}, {0x2b, 'rdma'}, {0x2f, 'rdma'}, {0x2b, 'cpu'}, {0x0, 'io'}, {0x0, 'cpu'}, {0x2f, 'memory'}, {0x2f, 'rdma'}, {0x2d, 'm\xabemory}]s\xa2\t\xfbv\xa0\x86$5\xa0\xc8\x94q\xe3f\xdd\xca\x06\x99Z\'\xb6Jv\xd28P\x86\x10_\x1b\x95\xf5\xb2\xee=\xc7\x01z5\xef\b\xd6\xd0\x16\xaa\xe7@\x9d\xbeG\x8d\xdd\xa0\x85g6\x13T:\xf7\x8e\xb2B\ng\x8eC\'\xd3/}\xd2\x9c.Z\x11\xf9\xea\xd8G\xe7^\x1ds19\xbd\xf4\x10Wb\xbc\x15\x14\x94\xc9J.\x18Pcu)\x8e\xcc\xb0\xff\x895\x161k\x86xx\xcf\x00\x82\xb9\x87\xe27C\n\xc1\xd7\xd8/\xac\xf2a\xb9\xdc\xb5~e\x17\xf4d|\xab6=+q\xf9\x80\x88\xb9V\v\a}\x87x\xd3X\xf5\xf7U-\xc8\x14\x90\x9c\xc6\x8b\xc9=Niw\xaf\xfc0&\x92\xb5\x1d|8\xb2\x05\xf8\x18\xd7m\x1e\xb3\x93\xdcI\x86\xcaK\xd2\x7f\\\xf5a\xb7mm\xf7\xe0HV\xb1\xdc\x01\xe0\x92'}]}, 0x10d) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2d70696473209595226e1f2f4634ea3cae328e201895c2ab41eb06c6b4b77295aa5f74d35c4cd912f0642e677fadbc13598d0d44fedbc85eed7d691e7d8b2cd8d50d45d516797f0acab124ab918977294c1a1e50bbd7051e9043704deb8fc9618cd5"], 0x62) 04:17:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0xa0028000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xf0ffffff00000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3039.597802][T28060] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3039.605775][T28060] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3039.613749][T28060] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3039.621726][T28060] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3039.629706][T28060] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3039.771428][T28060] memory: usage 307200kB, limit 307200kB, failcnt 1009 [ 3039.782092][T28060] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:38 executing program 5: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x420002, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000340)={0x1, 0x1, [@random="ff052c21615a"]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000616d2b67101c00000000ffffffff0000000000"], &(0x7f0000f6bffb)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 04:17:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x1a0ffffffff, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3039.869554][T28060] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3039.941191][T28060] Memory cgroup stats for /syz4: cache:96KB rss:160KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3040.028589][T28060] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28060,uid=0 [ 3040.162449][T28060] Memory cgroup out of memory: Killed process 28060 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) 04:17:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x4000000000000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x05e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xffffff7f00000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3040.239309][ T1042] oom_reaper: reaped process 28060 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x40030000000000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3040.406268][T28120] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3040.470908][T28120] CPU: 0 PID: 28120 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3040.478922][T28120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3040.489041][T28120] Call Trace: [ 3040.492350][T28120] dump_stack+0x172/0x1f0 [ 3040.492373][T28120] dump_header+0x10f/0xb6c [ 3040.492391][T28120] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3040.492411][T28120] ? ___ratelimit+0x60/0x595 [ 3040.506964][T28120] ? do_raw_spin_unlock+0x57/0x270 [ 3040.506986][T28120] oom_kill_process.cold+0x10/0x15 [ 3040.507004][T28120] out_of_memory+0x79a/0x1280 [ 3040.507023][T28120] ? lock_downgrade+0x880/0x880 [ 3040.532271][T28120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3040.538524][T28120] ? oom_killer_disable+0x280/0x280 [ 3040.543722][T28120] ? find_held_lock+0x35/0x130 [ 3040.548507][T28120] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3040.554067][T28120] ? memcg_event_wake+0x230/0x230 [ 3040.559103][T28120] ? do_raw_spin_unlock+0x57/0x270 [ 3040.564340][T28120] ? _raw_spin_unlock+0x2d/0x50 04:17:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x8000a0ffffffff, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3040.569204][T28120] try_charge+0x102c/0x15c0 [ 3040.573703][T28120] ? find_held_lock+0x35/0x130 [ 3040.578490][T28120] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3040.584072][T28120] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3040.589635][T28120] ? find_held_lock+0x35/0x130 [ 3040.594432][T28120] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3040.600010][T28120] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3040.605563][T28120] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3040.610776][T28120] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3040.616345][T28120] __memcg_kmem_charge+0x136/0x300 [ 3040.621498][T28120] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3040.626877][T28120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3040.633158][T28120] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3040.638888][T28120] ? copy_process.part.0+0x43f7/0x6790 [ 3040.644360][T28120] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3040.649660][T28120] ? trace_hardirqs_on+0x67/0x220 [ 3040.654702][T28120] ? kasan_check_read+0x11/0x20 [ 3040.654723][T28120] copy_process.part.0+0x4a0/0x6790 [ 3040.654741][T28120] ? __lock_acquire+0x54f/0x5490 [ 3040.654763][T28120] ? __cleanup_sighand+0x60/0x60 [ 3040.654784][T28120] ? rcu_read_lock_sched_held+0x110/0x130 [ 3040.654804][T28120] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3040.686643][T28120] _do_fork+0x25d/0xfe0 [ 3040.690822][T28120] ? copy_init_mm+0x20/0x20 [ 3040.695362][T28120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3040.700848][T28120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3040.706344][T28120] ? do_syscall_64+0x26/0x680 [ 3040.711026][T28120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3040.717100][T28120] ? do_syscall_64+0x26/0x680 04:17:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x06e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3040.721814][T28120] __x64_sys_clone+0xbf/0x150 [ 3040.726509][T28120] do_syscall_64+0xfd/0x680 [ 3040.731024][T28120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3040.736930][T28120] RIP: 0033:0x45bc49 [ 3040.740846][T28120] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3040.760462][T28120] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 04:17:39 executing program 5: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x420002, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000340)={0x1, 0x1, [@random="ff052c21615a"]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000616d2b67101c00000000ffffffff0000000000"], &(0x7f0000f6bffb)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) [ 3040.768890][T28120] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3040.776861][T28120] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3040.784864][T28120] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3040.792842][T28120] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3040.792851][T28120] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x8002a0ffffffff, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3040.991205][T28120] memory: usage 307164kB, limit 307200kB, failcnt 1042 [ 3040.998393][T28120] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3041.077720][T28120] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3041.085334][T28120] Memory cgroup stats for /syz4: cache:96KB rss:160KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3041.113954][T28120] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28120,uid=0 [ 3041.166362][T28120] Memory cgroup out of memory: Killed process 28120 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3041.230708][ T1042] oom_reaper: reaped process 28120 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 04:17:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xffffffff00000000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x4000000000000000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\ae\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0xffffffffa0008000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3041.571318][T28190] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3041.647914][T28190] CPU: 0 PID: 28190 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3041.655980][T28190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3041.666042][T28190] Call Trace: [ 3041.669356][T28190] dump_stack+0x172/0x1f0 [ 3041.673759][T28190] dump_header+0x10f/0xb6c [ 3041.678224][T28190] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3041.684036][T28190] ? ___ratelimit+0x60/0x595 [ 3041.684051][T28190] ? do_raw_spin_unlock+0x57/0x270 [ 3041.684070][T28190] oom_kill_process.cold+0x10/0x15 [ 3041.684088][T28190] out_of_memory+0x79a/0x1280 [ 3041.684114][T28190] ? lock_downgrade+0x880/0x880 [ 3041.684135][T28190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3041.684150][T28190] ? oom_killer_disable+0x280/0x280 [ 3041.684162][T28190] ? find_held_lock+0x35/0x130 [ 3041.684187][T28190] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3041.730209][T28190] ? memcg_event_wake+0x230/0x230 [ 3041.735390][T28190] ? do_raw_spin_unlock+0x57/0x270 [ 3041.740523][T28190] ? _raw_spin_unlock+0x2d/0x50 [ 3041.745404][T28190] try_charge+0x102c/0x15c0 [ 3041.749922][T28190] ? find_held_lock+0x35/0x130 [ 3041.754715][T28190] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3041.760274][T28190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3041.766535][T28190] ? kasan_check_read+0x11/0x20 [ 3041.771404][T28190] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3041.776968][T28190] mem_cgroup_try_charge+0x24d/0x5e0 [ 3041.782277][T28190] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3041.787957][T28190] __handle_mm_fault+0x1e1a/0x3eb0 [ 3041.793090][T28190] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3041.798657][T28190] ? find_held_lock+0x35/0x130 [ 3041.803433][T28190] ? handle_mm_fault+0x292/0xa90 [ 3041.808390][T28190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3041.814647][T28190] ? kasan_check_read+0x11/0x20 [ 3041.819512][T28190] handle_mm_fault+0x3b7/0xa90 [ 3041.824296][T28190] __do_page_fault+0x5ef/0xda0 [ 3041.829085][T28190] do_page_fault+0x71/0x57d [ 3041.833612][T28190] ? page_fault+0x8/0x30 [ 3041.837865][T28190] page_fault+0x1e/0x30 [ 3041.842041][T28190] RIP: 0033:0x40c4f3 [ 3041.845984][T28190] Code: 48 18 8b 4c 24 5c 89 48 24 31 c0 48 8b 8c 04 20 01 00 00 48 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 e8 1d 71 ff ff <83> 05 0a 3b 55 00 01 80 7c 24 1e 00 74 0b f6 44 24 18 01 0f 84 89 [ 3041.865595][T28190] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010217 [ 3041.871680][T28190] RAX: 0000000000000000 RBX: 0000000000000064 RCX: 0000000000459279 [ 3041.879654][T28190] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 3041.887627][T28190] RBP: 00000000000006c1 R08: 00007f2a40cc0700 R09: ffffffffffffffff 04:17:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3041.895598][T28190] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 3041.903602][T28190] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c 04:17:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\be\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3041.986876][T28190] memory: usage 307200kB, limit 307200kB, failcnt 1074 [ 3041.994052][T28190] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0xffffffffa0010000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3042.041221][T28190] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3042.058001][T28190] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xffffffffa0008000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3042.211350][T28190] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28190,uid=0 [ 3042.258553][T28190] Memory cgroup out of memory: Killed process 28190 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3042.332243][ T1042] oom_reaper: reaped process 28190 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 04:17:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0xffffffffa0028000, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\te\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3042.664680][T28258] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3042.723318][T28258] CPU: 1 PID: 28258 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3042.731339][T28258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3042.741466][T28258] Call Trace: [ 3042.744773][T28258] dump_stack+0x172/0x1f0 [ 3042.749137][T28258] dump_header+0x10f/0xb6c [ 3042.753563][T28258] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3042.759375][T28258] ? ___ratelimit+0x60/0x595 [ 3042.763976][T28258] ? do_raw_spin_unlock+0x57/0x270 [ 3042.769096][T28258] oom_kill_process.cold+0x10/0x15 [ 3042.774231][T28258] out_of_memory+0x79a/0x1280 [ 3042.778922][T28258] ? lock_downgrade+0x880/0x880 [ 3042.783797][T28258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3042.790083][T28258] ? oom_killer_disable+0x280/0x280 [ 3042.795301][T28258] ? find_held_lock+0x35/0x130 [ 3042.800101][T28258] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3042.805668][T28258] ? memcg_event_wake+0x230/0x230 [ 3042.810703][T28258] ? do_raw_spin_unlock+0x57/0x270 [ 3042.815833][T28258] ? _raw_spin_unlock+0x2d/0x50 [ 3042.820697][T28258] try_charge+0x102c/0x15c0 [ 3042.825207][T28258] ? find_held_lock+0x35/0x130 [ 3042.829990][T28258] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3042.835551][T28258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3042.841795][T28258] ? kasan_check_read+0x11/0x20 [ 3042.841817][T28258] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3042.841836][T28258] mem_cgroup_try_charge+0x24d/0x5e0 [ 3042.857521][T28258] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3042.863171][T28258] __handle_mm_fault+0x1e1a/0x3eb0 [ 3042.868309][T28258] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3042.868326][T28258] ? find_held_lock+0x35/0x130 [ 3042.868342][T28258] ? handle_mm_fault+0x292/0xa90 [ 3042.868368][T28258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3042.890535][T28258] ? kasan_check_read+0x11/0x20 [ 3042.895407][T28258] handle_mm_fault+0x3b7/0xa90 [ 3042.900187][T28258] __do_page_fault+0x5ef/0xda0 [ 3042.904968][T28258] do_page_fault+0x71/0x57d [ 3042.909483][T28258] ? page_fault+0x8/0x30 [ 3042.913737][T28258] page_fault+0x1e/0x30 [ 3042.913750][T28258] RIP: 0033:0x40c4f3 [ 3042.913772][T28258] Code: 48 18 8b 4c 24 5c 89 48 24 31 c0 48 8b 8c 04 20 01 00 00 48 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 e8 1d 71 ff ff <83> 05 0a 3b 55 00 01 80 7c 24 1e 00 74 0b f6 44 24 18 01 0f 84 89 [ 3042.941392][T28258] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010217 [ 3042.947460][T28258] RAX: 0000000000000000 RBX: 0000000000000064 RCX: 0000000000459279 [ 3042.955573][T28258] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 3042.963554][T28258] RBP: 00000000000006c1 R08: 00007f2a40cc0700 R09: ffffffffffffffff 04:17:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xffffffffa0010000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3042.971532][T28258] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 3042.979501][T28258] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c 04:17:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\ne\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3043.321505][T28258] memory: usage 307200kB, limit 307200kB, failcnt 1101 [ 3043.344116][T28258] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3043.384447][T28258] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3043.411193][T28258] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3043.545795][T28258] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28258,uid=0 [ 3043.651365][T28258] Memory cgroup out of memory: Killed process 28258 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3043.689002][ T1042] oom_reaper: reaped process 28258 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\ve\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xffffffffa0028000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 04:17:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3044.058223][T28348] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3044.158690][T28348] CPU: 1 PID: 28348 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3044.166721][T28348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3044.176771][T28348] Call Trace: [ 3044.180092][T28348] dump_stack+0x172/0x1f0 [ 3044.184457][T28348] dump_header+0x10f/0xb6c [ 3044.188891][T28348] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3044.194714][T28348] ? ___ratelimit+0x60/0x595 [ 3044.199316][T28348] ? do_raw_spin_unlock+0x57/0x270 [ 3044.204453][T28348] oom_kill_process.cold+0x10/0x15 [ 3044.209588][T28348] out_of_memory+0x79a/0x1280 [ 3044.214286][T28348] ? lock_downgrade+0x880/0x880 [ 3044.219149][T28348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3044.225410][T28348] ? oom_killer_disable+0x280/0x280 [ 3044.230637][T28348] ? find_held_lock+0x35/0x130 [ 3044.235424][T28348] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3044.241096][T28348] ? memcg_event_wake+0x230/0x230 [ 3044.246162][T28348] ? do_raw_spin_unlock+0x57/0x270 [ 3044.251286][T28348] ? _raw_spin_unlock+0x2d/0x50 [ 3044.256153][T28348] try_charge+0x102c/0x15c0 [ 3044.260656][T28348] ? find_held_lock+0x35/0x130 [ 3044.265435][T28348] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3044.270995][T28348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3044.277249][T28348] ? kasan_check_read+0x11/0x20 [ 3044.282132][T28348] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3044.287697][T28348] mem_cgroup_try_charge+0x24d/0x5e0 [ 3044.292996][T28348] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3044.298650][T28348] __handle_mm_fault+0x1e1a/0x3eb0 [ 3044.303783][T28348] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3044.309348][T28348] ? find_held_lock+0x35/0x130 [ 3044.314144][T28348] ? handle_mm_fault+0x292/0xa90 [ 3044.319163][T28348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3044.325419][T28348] ? kasan_check_read+0x11/0x20 [ 3044.330283][T28348] handle_mm_fault+0x3b7/0xa90 [ 3044.335061][T28348] __do_page_fault+0x5ef/0xda0 [ 3044.339875][T28348] do_page_fault+0x71/0x57d [ 3044.344387][T28348] ? page_fault+0x8/0x30 [ 3044.348644][T28348] page_fault+0x1e/0x30 [ 3044.352893][T28348] RIP: 0033:0x40c4f3 [ 3044.356792][T28348] Code: 48 18 8b 4c 24 5c 89 48 24 31 c0 48 8b 8c 04 20 01 00 00 48 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 e8 1d 71 ff ff <83> 05 0a 3b 55 00 01 80 7c 24 1e 00 74 0b f6 44 24 18 01 0f 84 89 [ 3044.376403][T28348] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010217 [ 3044.382469][T28348] RAX: 0000000000000000 RBX: 0000000000000064 RCX: 0000000000459279 [ 3044.390435][T28348] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 3044.398402][T28348] RBP: 00000000000006c1 R08: 00007f2a40cc0700 R09: ffffffffffffffff 04:17:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0xfffffffffffff000, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3044.406368][T28348] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 3044.414331][T28348] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c 04:17:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\fe\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3044.761495][T28348] memory: usage 307200kB, limit 307200kB, failcnt 1128 [ 3044.776847][T28348] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3044.785806][T28348] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3044.925873][T28348] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3044.977058][T28348] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28348,uid=0 [ 3044.993073][T28348] Memory cgroup out of memory: Killed process 28348 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 04:17:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3045.025784][ T1042] oom_reaper: reaped process 28348 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\re\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3045.317391][T28422] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3045.399049][T28422] CPU: 1 PID: 28422 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3045.407757][T28422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3045.417813][T28422] Call Trace: [ 3045.421127][T28422] dump_stack+0x172/0x1f0 [ 3045.425489][T28422] dump_header+0x10f/0xb6c [ 3045.429934][T28422] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3045.435748][T28422] ? ___ratelimit+0x60/0x595 [ 3045.440352][T28422] ? do_raw_spin_unlock+0x57/0x270 [ 3045.445483][T28422] oom_kill_process.cold+0x10/0x15 [ 3045.450615][T28422] out_of_memory+0x79a/0x1280 [ 3045.455303][T28422] ? lock_downgrade+0x880/0x880 [ 3045.455319][T28422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3045.455336][T28422] ? oom_killer_disable+0x280/0x280 [ 3045.455348][T28422] ? find_held_lock+0x35/0x130 [ 3045.455373][T28422] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3045.481940][T28422] ? memcg_event_wake+0x230/0x230 [ 3045.486981][T28422] ? do_raw_spin_unlock+0x57/0x270 [ 3045.492122][T28422] ? _raw_spin_unlock+0x2d/0x50 [ 3045.497013][T28422] try_charge+0x102c/0x15c0 [ 3045.501516][T28422] ? find_held_lock+0x35/0x130 [ 3045.506303][T28422] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3045.511867][T28422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3045.518130][T28422] ? kasan_check_read+0x11/0x20 [ 3045.523004][T28422] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3045.528562][T28422] mem_cgroup_try_charge+0x24d/0x5e0 [ 3045.533862][T28422] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3045.539506][T28422] __handle_mm_fault+0x1e1a/0x3eb0 [ 3045.544648][T28422] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3045.550212][T28422] ? find_held_lock+0x35/0x130 [ 3045.554991][T28422] ? handle_mm_fault+0x292/0xa90 [ 3045.559952][T28422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3045.566202][T28422] ? kasan_check_read+0x11/0x20 [ 3045.571074][T28422] handle_mm_fault+0x3b7/0xa90 [ 3045.575866][T28422] __do_page_fault+0x5ef/0xda0 [ 3045.580659][T28422] do_page_fault+0x71/0x57d [ 3045.585204][T28422] ? page_fault+0x8/0x30 [ 3045.589465][T28422] page_fault+0x1e/0x30 [ 3045.593636][T28422] RIP: 0033:0x40c4f3 [ 3045.597535][T28422] Code: 48 18 8b 4c 24 5c 89 48 24 31 c0 48 8b 8c 04 20 01 00 00 48 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 e8 1d 71 ff ff <83> 05 0a 3b 55 00 01 80 7c 24 1e 00 74 0b f6 44 24 18 01 0f 84 89 [ 3045.617142][T28422] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010207 [ 3045.623240][T28422] RAX: 0000000000000001 RBX: 0000000000000064 RCX: 0000000000459279 [ 3045.631225][T28422] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 3045.639203][T28422] RBP: 00000000000006c1 R08: 00007f2a40cc0700 R09: ffffffffffffffff 04:17:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:44 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3045.639219][T28422] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 3045.655145][T28422] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3045.660419][T28422] memory: usage 307200kB, limit 307200kB, failcnt 1162 [ 3045.670354][T28422] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3045.678112][T28422] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3045.685261][T28422] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3045.772214][T28422] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28422,uid=0 04:17:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3045.870964][T28422] Memory cgroup out of memory: Killed process 28422 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3045.951260][ T1042] oom_reaper: reaped process 28422 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x500000000000000}, 0x0) 04:17:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x0ee\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:44 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3046.273812][T28485] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3046.340114][T28485] CPU: 0 PID: 28485 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3046.348853][T28485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3046.358910][T28485] Call Trace: [ 3046.362224][T28485] dump_stack+0x172/0x1f0 [ 3046.366575][T28485] dump_header+0x10f/0xb6c [ 3046.371016][T28485] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3046.376847][T28485] ? ___ratelimit+0x60/0x595 [ 3046.381454][T28485] ? do_raw_spin_unlock+0x57/0x270 [ 3046.386578][T28485] oom_kill_process.cold+0x10/0x15 [ 3046.391742][T28485] out_of_memory+0x79a/0x1280 [ 3046.396467][T28485] ? lock_downgrade+0x880/0x880 [ 3046.401370][T28485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3046.407643][T28485] ? oom_killer_disable+0x280/0x280 [ 3046.412848][T28485] ? find_held_lock+0x35/0x130 [ 3046.417645][T28485] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3046.423212][T28485] ? memcg_event_wake+0x230/0x230 [ 3046.428283][T28485] ? do_raw_spin_unlock+0x57/0x270 [ 3046.433461][T28485] ? _raw_spin_unlock+0x2d/0x50 [ 3046.438359][T28485] try_charge+0x102c/0x15c0 [ 3046.442872][T28485] ? find_held_lock+0x35/0x130 [ 3046.447702][T28485] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3046.453270][T28485] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3046.458825][T28485] ? find_held_lock+0x35/0x130 [ 3046.463602][T28485] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3046.469175][T28485] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3046.474727][T28485] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3046.479942][T28485] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3046.485499][T28485] __memcg_kmem_charge+0x136/0x300 [ 3046.490624][T28485] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3046.496028][T28485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3046.502287][T28485] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3046.508421][T28485] ? copy_process.part.0+0x43f7/0x6790 [ 3046.513897][T28485] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3046.519197][T28485] ? trace_hardirqs_on+0x67/0x220 [ 3046.524243][T28485] copy_process.part.0+0x4a0/0x6790 [ 3046.529565][T28485] ? __lock_acquire+0x54f/0x5490 [ 3046.534525][T28485] ? __cleanup_sighand+0x60/0x60 [ 3046.539502][T28485] ? rcu_read_lock_sched_held+0x110/0x130 [ 3046.545232][T28485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3046.551501][T28485] _do_fork+0x25d/0xfe0 [ 3046.555676][T28485] ? copy_init_mm+0x20/0x20 [ 3046.560200][T28485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3046.565707][T28485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3046.571457][T28485] ? do_syscall_64+0x26/0x680 [ 3046.576149][T28485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3046.582233][T28485] ? do_syscall_64+0x26/0x680 04:17:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3046.586917][T28485] __x64_sys_clone+0xbf/0x150 [ 3046.591603][T28485] do_syscall_64+0xfd/0x680 [ 3046.596126][T28485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3046.602022][T28485] RIP: 0033:0x45bc49 [ 3046.605923][T28485] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3046.625704][T28485] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 04:17:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x0fe\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3046.634112][T28485] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3046.634127][T28485] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3046.634136][T28485] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3046.634144][T28485] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3046.634151][T28485] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3046.732660][T28485] memory: usage 307172kB, limit 307200kB, failcnt 1188 [ 3046.739843][T28485] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3046.784538][T28485] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3046.847788][T28485] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3047.028096][T28485] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28485,uid=0 04:17:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x10e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3047.100811][T28485] Memory cgroup out of memory: Killed process 28485 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3047.130049][ T1042] oom_reaper: reaped process 28485 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x600000000000000}, 0x0) 04:17:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3047.523572][T28558] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3047.636089][T28558] CPU: 0 PID: 28558 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3047.644153][T28558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3047.654212][T28558] Call Trace: [ 3047.657520][T28558] dump_stack+0x172/0x1f0 [ 3047.661863][T28558] dump_header+0x10f/0xb6c [ 3047.666288][T28558] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3047.672099][T28558] ? ___ratelimit+0x60/0x595 [ 3047.676729][T28558] ? do_raw_spin_unlock+0x57/0x270 [ 3047.681890][T28558] oom_kill_process.cold+0x10/0x15 [ 3047.687018][T28558] out_of_memory+0x79a/0x1280 [ 3047.691712][T28558] ? lock_downgrade+0x880/0x880 [ 3047.696596][T28558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3047.702872][T28558] ? oom_killer_disable+0x280/0x280 [ 3047.708070][T28558] ? find_held_lock+0x35/0x130 [ 3047.712887][T28558] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3047.719464][T28558] ? memcg_event_wake+0x230/0x230 [ 3047.724513][T28558] ? do_raw_spin_unlock+0x57/0x270 [ 3047.729633][T28558] ? _raw_spin_unlock+0x2d/0x50 [ 3047.734509][T28558] try_charge+0x102c/0x15c0 [ 3047.739023][T28558] ? find_held_lock+0x35/0x130 [ 3047.743807][T28558] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3047.749358][T28558] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3047.754913][T28558] ? find_held_lock+0x35/0x130 [ 3047.759690][T28558] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3047.765271][T28558] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3047.770824][T28558] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3047.776036][T28558] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3047.781617][T28558] __memcg_kmem_charge+0x136/0x300 04:17:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3047.786751][T28558] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3047.792136][T28558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3047.798389][T28558] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3047.804143][T28558] ? copy_process.part.0+0x43f7/0x6790 [ 3047.809627][T28558] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3047.814956][T28558] ? trace_hardirqs_on+0x67/0x220 [ 3047.820049][T28558] copy_process.part.0+0x4a0/0x6790 [ 3047.825269][T28558] ? __schedule+0x76c/0x1560 [ 3047.829888][T28558] ? __cleanup_sighand+0x60/0x60 04:17:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3047.834871][T28558] ? _raw_spin_unlock_irq+0x5e/0x90 [ 3047.840098][T28558] ? finish_task_switch+0x118/0x730 [ 3047.845320][T28558] _do_fork+0x25d/0xfe0 [ 3047.849516][T28558] ? copy_init_mm+0x20/0x20 [ 3047.854032][T28558] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3047.859511][T28558] ? retint_kernel+0x2b/0x2b [ 3047.864132][T28558] __x64_sys_clone+0xbf/0x150 [ 3047.868823][T28558] ? do_syscall_64+0x5b/0x680 [ 3047.873522][T28558] do_syscall_64+0xfd/0x680 [ 3047.878038][T28558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3047.883940][T28558] RIP: 0033:0x45bc49 [ 3047.887842][T28558] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3047.907443][T28558] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3047.907457][T28558] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3047.907466][T28558] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 04:17:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x11e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3047.907474][T28558] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3047.907482][T28558] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3047.907491][T28558] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3047.952255][T28558] memory: usage 307180kB, limit 307200kB, failcnt 1223 [ 3048.003218][T28558] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3048.096645][T28558] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3048.150621][T28558] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3048.205023][T28558] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28558,uid=0 [ 3048.300222][T28558] Memory cgroup out of memory: Killed process 28558 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3048.394729][ T1042] oom_reaper: reaped process 28558 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x700000000000000}, 0x0) 04:17:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x12e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3048.649043][T28623] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 04:17:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3048.740800][T28623] CPU: 1 PID: 28623 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3048.748826][T28623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3048.758904][T28623] Call Trace: [ 3048.762209][T28623] dump_stack+0x172/0x1f0 [ 3048.766584][T28623] dump_header+0x10f/0xb6c [ 3048.771064][T28623] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3048.776928][T28623] ? ___ratelimit+0x60/0x595 [ 3048.781524][T28623] ? do_raw_spin_unlock+0x57/0x270 [ 3048.786657][T28623] oom_kill_process.cold+0x10/0x15 [ 3048.791779][T28623] out_of_memory+0x79a/0x1280 [ 3048.796466][T28623] ? lock_downgrade+0x880/0x880 [ 3048.801322][T28623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3048.801343][T28623] ? oom_killer_disable+0x280/0x280 [ 3048.801355][T28623] ? find_held_lock+0x35/0x130 [ 3048.801387][T28623] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3048.812817][T28623] ? memcg_event_wake+0x230/0x230 [ 3048.812841][T28623] ? do_raw_spin_unlock+0x57/0x270 [ 3048.812858][T28623] ? _raw_spin_unlock+0x2d/0x50 [ 3048.812878][T28623] try_charge+0x102c/0x15c0 [ 3048.812896][T28623] ? find_held_lock+0x35/0x130 [ 3048.847425][T28623] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3048.852986][T28623] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3048.858550][T28623] ? find_held_lock+0x35/0x130 [ 3048.863415][T28623] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3048.868985][T28623] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3048.874543][T28623] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3048.879759][T28623] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3048.885316][T28623] __memcg_kmem_charge+0x136/0x300 04:17:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3048.890439][T28623] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3048.895843][T28623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3048.902120][T28623] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3048.907850][T28623] ? copy_process.part.0+0x43f7/0x6790 [ 3048.913325][T28623] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3048.918638][T28623] ? trace_hardirqs_on+0x67/0x220 [ 3048.923693][T28623] ? kasan_check_read+0x11/0x20 [ 3048.928559][T28623] copy_process.part.0+0x4a0/0x6790 [ 3048.933766][T28623] ? __lock_acquire+0x54f/0x5490 [ 3048.938721][T28623] ? __cleanup_sighand+0x60/0x60 [ 3048.943675][T28623] ? rcu_read_lock_sched_held+0x110/0x130 [ 3048.949408][T28623] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3048.955670][T28623] _do_fork+0x25d/0xfe0 [ 3048.959853][T28623] ? copy_init_mm+0x20/0x20 [ 3048.964387][T28623] ? blkcg_maybe_throttle_current+0x5e2/0xfb0 [ 3048.964401][T28623] ? lock_downgrade+0x880/0x880 [ 3048.964415][T28623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3048.964434][T28623] ? blkcg_exit_queue+0x30/0x30 [ 3048.964451][T28623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3048.964471][T28623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3048.997386][T28623] ? do_syscall_64+0x26/0x680 [ 3049.002068][T28623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3049.008151][T28623] ? do_syscall_64+0x26/0x680 [ 3049.012869][T28623] __x64_sys_clone+0xbf/0x150 [ 3049.017562][T28623] do_syscall_64+0xfd/0x680 [ 3049.022126][T28623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3049.028031][T28623] RIP: 0033:0x45bc49 04:17:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x848b, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3049.031938][T28623] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3049.051541][T28623] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3049.059952][T28623] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3049.067927][T28623] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3049.075902][T28623] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3049.083876][T28623] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 04:17:47 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3049.083886][T28623] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x20000180, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3049.357448][T28623] memory: usage 307172kB, limit 307200kB, failcnt 1255 [ 3049.366205][T28623] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3049.374023][T28623] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3049.381263][T28623] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3049.496645][T28623] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28623,uid=0 [ 3049.561756][T28623] Memory cgroup out of memory: Killed process 28623 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x800000000000000}, 0x0) 04:17:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x13e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3049.616948][ T1042] oom_reaper: reaped process 28623 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3049.809302][T28696] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3049.891227][T28696] CPU: 1 PID: 28696 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3049.899275][T28696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3049.909344][T28696] Call Trace: [ 3049.912658][T28696] dump_stack+0x172/0x1f0 [ 3049.917007][T28696] dump_header+0x10f/0xb6c [ 3049.921442][T28696] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3049.927257][T28696] ? ___ratelimit+0x60/0x595 [ 3049.931854][T28696] ? do_raw_spin_unlock+0x57/0x270 04:17:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3049.936979][T28696] oom_kill_process.cold+0x10/0x15 [ 3049.942101][T28696] out_of_memory+0x79a/0x1280 [ 3049.946916][T28696] ? lock_downgrade+0x880/0x880 [ 3049.951777][T28696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3049.958034][T28696] ? oom_killer_disable+0x280/0x280 [ 3049.963235][T28696] ? find_held_lock+0x35/0x130 [ 3049.968029][T28696] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3049.973580][T28696] ? memcg_event_wake+0x230/0x230 [ 3049.978625][T28696] ? do_raw_spin_unlock+0x57/0x270 [ 3049.983748][T28696] ? _raw_spin_unlock+0x2d/0x50 [ 3049.988636][T28696] try_charge+0x102c/0x15c0 [ 3049.993159][T28696] ? find_held_lock+0x35/0x130 [ 3049.997946][T28696] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3050.003507][T28696] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3050.009067][T28696] ? find_held_lock+0x35/0x130 [ 3050.013857][T28696] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3050.019422][T28696] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3050.024994][T28696] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3050.030202][T28696] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3050.035759][T28696] __memcg_kmem_charge+0x136/0x300 04:17:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3050.040948][T28696] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3050.046328][T28696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3050.052581][T28696] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3050.058317][T28696] ? copy_process.part.0+0x43f7/0x6790 [ 3050.063794][T28696] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3050.069090][T28696] ? trace_hardirqs_on+0x67/0x220 [ 3050.074146][T28696] ? kasan_check_read+0x11/0x20 [ 3050.079014][T28696] copy_process.part.0+0x4a0/0x6790 [ 3050.084224][T28696] ? __lock_acquire+0x54f/0x5490 [ 3050.084249][T28696] ? __cleanup_sighand+0x60/0x60 [ 3050.084274][T28696] ? rcu_read_lock_sched_held+0x110/0x130 [ 3050.084295][T28696] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3050.106386][T28696] _do_fork+0x25d/0xfe0 [ 3050.110591][T28696] ? copy_init_mm+0x20/0x20 [ 3050.115132][T28696] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3050.120628][T28696] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3050.126099][T28696] ? do_syscall_64+0x26/0x680 [ 3050.130801][T28696] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3050.136909][T28696] ? do_syscall_64+0x26/0x680 04:17:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3050.141607][T28696] __x64_sys_clone+0xbf/0x150 [ 3050.146319][T28696] do_syscall_64+0xfd/0x680 [ 3050.150840][T28696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3050.156744][T28696] RIP: 0033:0x45bc49 [ 3050.160659][T28696] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3050.180269][T28696] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 04:17:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3050.188688][T28696] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3050.196659][T28696] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3050.196668][T28696] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3050.196676][T28696] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3050.196684][T28696] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3050.223910][T28696] memory: usage 307172kB, limit 307200kB, failcnt 1288 04:17:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x14e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3050.271418][T28696] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3050.292787][T28696] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3050.337394][T28696] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3050.451488][T28696] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28696,uid=0 [ 3050.492956][T28696] Memory cgroup out of memory: Killed process 28696 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3050.570870][ T1042] oom_reaper: reaped process 28696 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x900000000000000}, 0x0) 04:17:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x15e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3050.860470][T28755] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3050.953773][T28755] CPU: 0 PID: 28755 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3050.961828][T28755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3050.971884][T28755] Call Trace: [ 3050.975189][T28755] dump_stack+0x172/0x1f0 [ 3050.979539][T28755] dump_header+0x10f/0xb6c [ 3050.983971][T28755] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3050.989795][T28755] ? ___ratelimit+0x60/0x595 [ 3050.994400][T28755] ? do_raw_spin_unlock+0x57/0x270 [ 3050.999540][T28755] oom_kill_process.cold+0x10/0x15 [ 3051.004664][T28755] out_of_memory+0x79a/0x1280 [ 3051.009365][T28755] ? lock_downgrade+0x880/0x880 [ 3051.014241][T28755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3051.020500][T28755] ? oom_killer_disable+0x280/0x280 [ 3051.025710][T28755] ? find_held_lock+0x35/0x130 [ 3051.030506][T28755] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3051.036064][T28755] ? memcg_event_wake+0x230/0x230 [ 3051.041104][T28755] ? do_raw_spin_unlock+0x57/0x270 [ 3051.046239][T28755] ? _raw_spin_unlock+0x2d/0x50 [ 3051.051109][T28755] try_charge+0x102c/0x15c0 [ 3051.055641][T28755] ? find_held_lock+0x35/0x130 [ 3051.060468][T28755] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3051.066025][T28755] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3051.071583][T28755] ? find_held_lock+0x35/0x130 [ 3051.076363][T28755] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3051.081932][T28755] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3051.087496][T28755] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3051.092711][T28755] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3051.098268][T28755] __memcg_kmem_charge+0x136/0x300 [ 3051.103394][T28755] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3051.108771][T28755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3051.115044][T28755] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3051.120773][T28755] ? copy_process.part.0+0x43f7/0x6790 [ 3051.126243][T28755] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3051.131546][T28755] ? trace_hardirqs_on+0x67/0x220 [ 3051.136623][T28755] copy_process.part.0+0x4a0/0x6790 [ 3051.141830][T28755] ? __lock_acquire+0x54f/0x5490 [ 3051.146779][T28755] ? __cleanup_sighand+0x60/0x60 [ 3051.151735][T28755] ? rcu_read_lock_sched_held+0x110/0x130 [ 3051.157463][T28755] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3051.163733][T28755] _do_fork+0x25d/0xfe0 [ 3051.167915][T28755] ? copy_init_mm+0x20/0x20 [ 3051.172443][T28755] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3051.177927][T28755] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3051.183395][T28755] ? do_syscall_64+0x26/0x680 [ 3051.188077][T28755] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3051.194160][T28755] ? do_syscall_64+0x26/0x680 [ 3051.198861][T28755] __x64_sys_clone+0xbf/0x150 [ 3051.203559][T28755] do_syscall_64+0xfd/0x680 [ 3051.208080][T28755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3051.213978][T28755] RIP: 0033:0x45bc49 [ 3051.217886][T28755] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3051.238401][T28755] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3051.246823][T28755] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 04:17:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3051.246840][T28755] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3051.262802][T28755] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3051.270783][T28755] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3051.278764][T28755] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x16e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3051.729276][T28755] memory: usage 307180kB, limit 307200kB, failcnt 1322 [ 3051.736962][T28755] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3051.750480][T28755] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3051.770529][T28755] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3051.801285][T28755] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28755,uid=0 [ 3051.835805][T28755] Memory cgroup out of memory: Killed process 28755 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3051.862135][ T1042] oom_reaper: reaped process 28755 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) 04:17:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x17e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3052.062976][T28820] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3052.098286][T28820] CPU: 0 PID: 28820 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3052.106312][T28820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3052.116363][T28820] Call Trace: [ 3052.119665][T28820] dump_stack+0x172/0x1f0 [ 3052.124018][T28820] dump_header+0x10f/0xb6c [ 3052.128445][T28820] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3052.134251][T28820] ? ___ratelimit+0x60/0x595 [ 3052.138873][T28820] ? do_raw_spin_unlock+0x57/0x270 [ 3052.143997][T28820] oom_kill_process.cold+0x10/0x15 [ 3052.149147][T28820] out_of_memory+0x79a/0x1280 [ 3052.153831][T28820] ? lock_downgrade+0x880/0x880 [ 3052.158678][T28820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3052.164914][T28820] ? oom_killer_disable+0x280/0x280 [ 3052.170114][T28820] ? find_held_lock+0x35/0x130 [ 3052.174892][T28820] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3052.180431][T28820] ? memcg_event_wake+0x230/0x230 [ 3052.185459][T28820] ? do_raw_spin_unlock+0x57/0x270 [ 3052.190568][T28820] ? _raw_spin_unlock+0x2d/0x50 [ 3052.195463][T28820] try_charge+0x102c/0x15c0 [ 3052.200008][T28820] ? find_held_lock+0x35/0x130 [ 3052.204788][T28820] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3052.210332][T28820] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3052.215876][T28820] ? find_held_lock+0x35/0x130 [ 3052.220638][T28820] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3052.226223][T28820] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3052.231765][T28820] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3052.236965][T28820] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3052.242526][T28820] __memcg_kmem_charge+0x136/0x300 [ 3052.247645][T28820] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3052.253014][T28820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3052.259267][T28820] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3052.264999][T28820] ? copy_process.part.0+0x43f7/0x6790 [ 3052.270492][T28820] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3052.275783][T28820] ? trace_hardirqs_on+0x67/0x220 [ 3052.280811][T28820] copy_process.part.0+0x4a0/0x6790 [ 3052.286012][T28820] ? __lock_acquire+0x54f/0x5490 [ 3052.290956][T28820] ? __cleanup_sighand+0x60/0x60 [ 3052.295901][T28820] ? rcu_read_lock_sched_held+0x110/0x130 [ 3052.301615][T28820] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3052.307864][T28820] _do_fork+0x25d/0xfe0 [ 3052.312025][T28820] ? copy_init_mm+0x20/0x20 [ 3052.316537][T28820] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3052.321993][T28820] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3052.327448][T28820] ? do_syscall_64+0x26/0x680 [ 3052.332140][T28820] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3052.338200][T28820] ? do_syscall_64+0x26/0x680 [ 3052.342879][T28820] __x64_sys_clone+0xbf/0x150 [ 3052.347556][T28820] do_syscall_64+0xfd/0x680 [ 3052.352069][T28820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3052.357963][T28820] RIP: 0033:0x45bc49 [ 3052.361857][T28820] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3052.384563][T28820] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3052.393061][T28820] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3052.401038][T28820] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 04:17:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3052.409010][T28820] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3052.416974][T28820] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3052.424936][T28820] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x18e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3053.073801][T28820] memory: usage 307188kB, limit 307200kB, failcnt 1360 [ 3053.080855][T28820] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3053.123387][T28820] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3053.130256][T28820] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3053.174073][T28820] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 3053.182330][T28820] ,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28820,uid=0 [ 3053.211413][T28820] Memory cgroup out of memory: Killed process 28820 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xb00000000000000}, 0x0) 04:17:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x19e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3053.228063][ T1042] oom_reaper: reaped process 28820 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3053.511995][T28900] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 04:17:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3053.646723][T28900] CPU: 1 PID: 28900 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3053.654751][T28900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3053.664811][T28900] Call Trace: [ 3053.668120][T28900] dump_stack+0x172/0x1f0 [ 3053.672478][T28900] dump_header+0x10f/0xb6c [ 3053.676913][T28900] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3053.682723][T28900] ? ___ratelimit+0x60/0x595 [ 3053.687324][T28900] ? do_raw_spin_unlock+0x57/0x270 [ 3053.692447][T28900] oom_kill_process.cold+0x10/0x15 [ 3053.697572][T28900] out_of_memory+0x79a/0x1280 [ 3053.702299][T28900] ? lock_downgrade+0x880/0x880 [ 3053.707158][T28900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3053.713412][T28900] ? oom_killer_disable+0x280/0x280 [ 3053.718612][T28900] ? find_held_lock+0x35/0x130 [ 3053.723394][T28900] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3053.723411][T28900] ? memcg_event_wake+0x230/0x230 [ 3053.723433][T28900] ? do_raw_spin_unlock+0x57/0x270 [ 3053.723452][T28900] ? _raw_spin_unlock+0x2d/0x50 [ 3053.744006][T28900] try_charge+0x102c/0x15c0 [ 3053.748517][T28900] ? find_held_lock+0x35/0x130 [ 3053.753302][T28900] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3053.758876][T28900] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3053.764430][T28900] ? find_held_lock+0x35/0x130 [ 3053.769203][T28900] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3053.774959][T28900] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3053.780518][T28900] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3053.785740][T28900] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3053.791295][T28900] __memcg_kmem_charge+0x136/0x300 04:17:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3053.796430][T28900] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3053.801808][T28900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3053.808063][T28900] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3053.813794][T28900] ? copy_process.part.0+0x43f7/0x6790 [ 3053.819261][T28900] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3053.824560][T28900] ? trace_hardirqs_on+0x67/0x220 [ 3053.829588][T28900] ? kasan_check_read+0x11/0x20 [ 3053.834453][T28900] copy_process.part.0+0x4a0/0x6790 [ 3053.834472][T28900] ? __lock_acquire+0x54f/0x5490 [ 3053.834508][T28900] ? __cleanup_sighand+0x60/0x60 [ 3053.849563][T28900] ? rcu_read_lock_sched_held+0x110/0x130 [ 3053.855288][T28900] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3053.861546][T28900] _do_fork+0x25d/0xfe0 [ 3053.865720][T28900] ? copy_init_mm+0x20/0x20 [ 3053.870250][T28900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3053.875722][T28900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3053.881198][T28900] ? do_syscall_64+0x26/0x680 [ 3053.885881][T28900] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3053.891956][T28900] ? do_syscall_64+0x26/0x680 04:17:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3053.896653][T28900] __x64_sys_clone+0xbf/0x150 [ 3053.901344][T28900] do_syscall_64+0xfd/0x680 [ 3053.905863][T28900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3053.911757][T28900] RIP: 0033:0x45bc49 [ 3053.915667][T28900] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3053.935274][T28900] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3053.935288][T28900] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3053.935297][T28900] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3053.935305][T28900] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3053.935320][T28900] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3053.967643][T28900] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3054.036343][T28900] memory: usage 307200kB, limit 307200kB, failcnt 1402 [ 3054.063794][T28900] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3054.084142][T28900] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3054.131122][T28900] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3054.181475][T28900] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28900,uid=0 [ 3054.257646][T28900] Memory cgroup out of memory: Killed process 28900 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3054.287794][ T1042] oom_reaper: reaped process 28900 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:17:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xc00000000000000}, 0x0) 04:17:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x1ae\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:52 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3054.532053][T28956] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3054.580982][T28956] CPU: 1 PID: 28956 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3054.589009][T28956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3054.599063][T28956] Call Trace: [ 3054.599089][T28956] dump_stack+0x172/0x1f0 [ 3054.599120][T28956] dump_header+0x10f/0xb6c [ 3054.599146][T28956] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3054.616971][T28956] ? ___ratelimit+0x60/0x595 [ 3054.621565][T28956] ? do_raw_spin_unlock+0x57/0x270 [ 3054.626685][T28956] oom_kill_process.cold+0x10/0x15 [ 3054.631800][T28956] out_of_memory+0x79a/0x1280 [ 3054.631819][T28956] ? lock_downgrade+0x880/0x880 [ 3054.631835][T28956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3054.631852][T28956] ? oom_killer_disable+0x280/0x280 [ 3054.631863][T28956] ? find_held_lock+0x35/0x130 [ 3054.631889][T28956] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3054.663088][T28956] ? memcg_event_wake+0x230/0x230 [ 3054.668145][T28956] ? do_raw_spin_unlock+0x57/0x270 [ 3054.673277][T28956] ? _raw_spin_unlock+0x2d/0x50 [ 3054.678155][T28956] try_charge+0x102c/0x15c0 [ 3054.682667][T28956] ? find_held_lock+0x35/0x130 [ 3054.687449][T28956] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3054.693010][T28956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3054.699353][T28956] ? kasan_check_read+0x11/0x20 [ 3054.704225][T28956] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3054.709781][T28956] mem_cgroup_try_charge+0x24d/0x5e0 [ 3054.715080][T28956] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3054.720738][T28956] __handle_mm_fault+0x1e1a/0x3eb0 [ 3054.725860][T28956] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3054.725876][T28956] ? find_held_lock+0x35/0x130 [ 3054.725895][T28956] ? handle_mm_fault+0x292/0xa90 [ 3054.741411][T28956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3054.747665][T28956] ? kasan_check_read+0x11/0x20 [ 3054.752532][T28956] handle_mm_fault+0x3b7/0xa90 [ 3054.757307][T28956] __do_page_fault+0x5ef/0xda0 [ 3054.757335][T28956] do_page_fault+0x71/0x57d [ 3054.766657][T28956] ? page_fault+0x8/0x30 [ 3054.770907][T28956] page_fault+0x1e/0x30 [ 3054.775063][T28956] RIP: 0033:0x45bc2d [ 3054.778965][T28956] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 30 8e fb ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 3054.798578][T28956] RSP: 002b:00007ffc60c47a88 EFLAGS: 00010202 [ 3054.804664][T28956] RAX: ffffffffffffffea RBX: 00007f2a40cc0700 RCX: 00007f2a40cc0700 [ 3054.804679][T28956] RDX: 00000000003d0f00 RSI: 00007f2a40cbfdb0 RDI: 000000000040ffb0 [ 3054.820616][T28956] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc09d0 R09: 00007f2a40cc0700 04:17:53 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3054.828596][T28956] R10: 00007f2a40cbfdc0 R11: 0000000000000246 R12: 0000000000000000 [ 3054.828612][T28956] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x1be\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3054.986728][T28956] memory: usage 307196kB, limit 307200kB, failcnt 1427 [ 3055.003772][T28956] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3055.062677][T28956] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3055.127777][T28956] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3055.279078][T28956] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset= [ 3055.299239][T28956] syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28956,uid=0 [ 3055.311315][T28956] Memory cgroup out of memory: Killed process 28956 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3055.382195][ T1042] oom_reaper: reaped process 28956 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xd00000000000000}, 0x0) 04:17:53 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x1ce\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3055.658664][T29022] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 04:17:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x1a0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3055.721155][T29022] CPU: 1 PID: 29022 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3055.729287][T29022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3055.739344][T29022] Call Trace: [ 3055.742656][T29022] dump_stack+0x172/0x1f0 [ 3055.747003][T29022] dump_header+0x10f/0xb6c [ 3055.751432][T29022] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3055.757255][T29022] ? ___ratelimit+0x60/0x595 [ 3055.761855][T29022] ? do_raw_spin_unlock+0x57/0x270 [ 3055.766975][T29022] oom_kill_process.cold+0x10/0x15 [ 3055.772091][T29022] out_of_memory+0x79a/0x1280 [ 3055.776790][T29022] ? lock_downgrade+0x880/0x880 [ 3055.781667][T29022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3055.787925][T29022] ? oom_killer_disable+0x280/0x280 [ 3055.793128][T29022] ? find_held_lock+0x35/0x130 [ 3055.797911][T29022] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3055.803470][T29022] ? memcg_event_wake+0x230/0x230 [ 3055.808516][T29022] ? do_raw_spin_unlock+0x57/0x270 [ 3055.813657][T29022] ? _raw_spin_unlock+0x2d/0x50 [ 3055.818546][T29022] try_charge+0x102c/0x15c0 [ 3055.823052][T29022] ? find_held_lock+0x35/0x130 [ 3055.827826][T29022] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3055.833386][T29022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3055.839651][T29022] ? kasan_check_read+0x11/0x20 [ 3055.844517][T29022] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3055.850072][T29022] mem_cgroup_try_charge+0x24d/0x5e0 [ 3055.855364][T29022] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3055.861037][T29022] __handle_mm_fault+0x1e1a/0x3eb0 [ 3055.866173][T29022] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3055.871722][T29022] ? find_held_lock+0x35/0x130 [ 3055.876496][T29022] ? handle_mm_fault+0x292/0xa90 [ 3055.881454][T29022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3055.887718][T29022] ? kasan_check_read+0x11/0x20 [ 3055.892577][T29022] handle_mm_fault+0x3b7/0xa90 [ 3055.897349][T29022] __do_page_fault+0x5ef/0xda0 [ 3055.902130][T29022] do_page_fault+0x71/0x57d [ 3055.906647][T29022] ? page_fault+0x8/0x30 [ 3055.910900][T29022] page_fault+0x1e/0x30 [ 3055.915055][T29022] RIP: 0033:0x45bc2d [ 3055.918953][T29022] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 30 8e fb ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 3055.938563][T29022] RSP: 002b:00007ffc60c47a88 EFLAGS: 00010202 [ 3055.944655][T29022] RAX: ffffffffffffffea RBX: 00007f2a40cc0700 RCX: 00007f2a40cc0700 [ 3055.952669][T29022] RDX: 00000000003d0f00 RSI: 00007f2a40cbfdb0 RDI: 000000000040ffb0 [ 3055.960644][T29022] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc09d0 R09: 00007f2a40cc0700 04:17:54 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3055.968656][T29022] R10: 00007f2a40cbfdc0 R11: 0000000000000246 R12: 0000000000000000 [ 3055.976646][T29022] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x1de\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x4000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3056.193630][T29022] memory: usage 307200kB, limit 307200kB, failcnt 1458 [ 3056.206517][T29022] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3056.248258][T29022] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3056.283140][T29022] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3056.390560][T29022] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29022,uid=0 [ 3056.496788][T29022] Memory cgroup out of memory: Killed process 29022 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x34000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) 04:17:55 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3056.568424][ T1042] oom_reaper: reaped process 29022 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x1ee\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x40000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:55 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x400300, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x1fe\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x8000a0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:55 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3057.328202][T29081] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3057.448025][T29081] CPU: 1 PID: 29081 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3057.456059][T29081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3057.466128][T29081] Call Trace: [ 3057.469473][T29081] dump_stack+0x172/0x1f0 [ 3057.473827][T29081] dump_header+0x10f/0xb6c [ 3057.478266][T29081] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3057.484086][T29081] ? ___ratelimit+0x60/0x595 [ 3057.488688][T29081] ? do_raw_spin_unlock+0x57/0x270 [ 3057.493817][T29081] oom_kill_process.cold+0x10/0x15 [ 3057.498949][T29081] out_of_memory+0x79a/0x1280 [ 3057.503655][T29081] ? lock_downgrade+0x880/0x880 [ 3057.508544][T29081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3057.514802][T29081] ? oom_killer_disable+0x280/0x280 [ 3057.520015][T29081] ? find_held_lock+0x35/0x130 [ 3057.524805][T29081] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3057.530363][T29081] ? memcg_event_wake+0x230/0x230 [ 3057.535403][T29081] ? do_raw_spin_unlock+0x57/0x270 [ 3057.540526][T29081] ? _raw_spin_unlock+0x2d/0x50 [ 3057.545398][T29081] try_charge+0x102c/0x15c0 [ 3057.549935][T29081] ? find_held_lock+0x35/0x130 [ 3057.554722][T29081] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3057.560299][T29081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3057.566567][T29081] ? kasan_check_read+0x11/0x20 [ 3057.571463][T29081] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3057.577019][T29081] mem_cgroup_try_charge+0x24d/0x5e0 [ 3057.582319][T29081] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3057.587961][T29081] __handle_mm_fault+0x1e1a/0x3eb0 [ 3057.593133][T29081] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3057.598744][T29081] ? find_held_lock+0x35/0x130 [ 3057.603514][T29081] ? handle_mm_fault+0x292/0xa90 [ 3057.608493][T29081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3057.614744][T29081] ? kasan_check_read+0x11/0x20 [ 3057.619610][T29081] handle_mm_fault+0x3b7/0xa90 [ 3057.624396][T29081] __do_page_fault+0x5ef/0xda0 [ 3057.629175][T29081] do_page_fault+0x71/0x57d [ 3057.633702][T29081] ? page_fault+0x8/0x30 [ 3057.637998][T29081] page_fault+0x1e/0x30 [ 3057.642161][T29081] RIP: 0033:0x40c4f3 [ 3057.646095][T29081] Code: 48 18 8b 4c 24 5c 89 48 24 31 c0 48 8b 8c 04 20 01 00 00 48 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 e8 1d 71 ff ff <83> 05 0a 3b 55 00 01 80 7c 24 1e 00 74 0b f6 44 24 18 01 0f 84 89 [ 3057.665694][T29081] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010217 [ 3057.665707][T29081] RAX: 0000000000000000 RBX: 0000000000000064 RCX: 0000000000459279 [ 3057.665714][T29081] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 3057.665723][T29081] RBP: 00000000000006c1 R08: 00007f2a40cc0700 R09: ffffffffffffffff [ 3057.665731][T29081] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 3057.665738][T29081] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3057.741823][T29081] memory: usage 307200kB, limit 307200kB, failcnt 1489 [ 3057.750725][T29081] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3057.774701][T29081] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3057.782135][T29081] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3057.825372][T29081] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29081,uid=0 04:17:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x8002a0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 04:17:56 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3057.869667][T29081] Memory cgroup out of memory: Killed process 29081 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3057.892771][ T1042] oom_reaper: reaped process 29081 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x40000000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3058.128314][T29158] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 04:17:56 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x20000000000) [ 3058.206964][T29158] CPU: 0 PID: 29158 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3058.214991][T29158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3058.225055][T29158] Call Trace: [ 3058.228362][T29158] dump_stack+0x172/0x1f0 [ 3058.232713][T29158] dump_header+0x10f/0xb6c [ 3058.237185][T29158] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3058.243008][T29158] ? ___ratelimit+0x60/0x595 [ 3058.247625][T29158] ? do_raw_spin_unlock+0x57/0x270 [ 3058.252797][T29158] oom_kill_process.cold+0x10/0x15 [ 3058.257925][T29158] out_of_memory+0x79a/0x1280 [ 3058.262611][T29158] ? lock_downgrade+0x880/0x880 [ 3058.267461][T29158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3058.273714][T29158] ? oom_killer_disable+0x280/0x280 [ 3058.279004][T29158] ? find_held_lock+0x35/0x130 [ 3058.283792][T29158] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3058.289371][T29158] ? memcg_event_wake+0x230/0x230 [ 3058.294419][T29158] ? do_raw_spin_unlock+0x57/0x270 [ 3058.299542][T29158] ? _raw_spin_unlock+0x2d/0x50 [ 3058.304412][T29158] try_charge+0x102c/0x15c0 [ 3058.308924][T29158] ? find_held_lock+0x35/0x130 [ 3058.313727][T29158] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3058.319288][T29158] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3058.324878][T29158] ? find_held_lock+0x35/0x130 [ 3058.329650][T29158] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3058.335213][T29158] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3058.335227][T29158] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3058.335247][T29158] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3058.335264][T29158] __memcg_kmem_charge+0x136/0x300 04:17:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3058.335284][T29158] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3058.335299][T29158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3058.335318][T29158] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3058.373980][T29158] ? copy_process.part.0+0x43f7/0x6790 [ 3058.379452][T29158] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3058.384757][T29158] ? trace_hardirqs_on+0x67/0x220 [ 3058.389813][T29158] copy_process.part.0+0x4a0/0x6790 [ 3058.395039][T29158] ? __lock_acquire+0x54f/0x5490 [ 3058.400471][T29158] ? __cleanup_sighand+0x60/0x60 04:17:56 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x20000000000) [ 3058.405430][T29158] ? rcu_read_lock_sched_held+0x110/0x130 [ 3058.411178][T29158] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3058.411204][T29158] _do_fork+0x25d/0xfe0 [ 3058.411227][T29158] ? copy_init_mm+0x20/0x20 [ 3058.411253][T29158] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3058.411274][T29158] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3058.437100][T29158] ? do_syscall_64+0x26/0x680 [ 3058.441832][T29158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3058.447901][T29158] ? do_syscall_64+0x26/0x680 [ 3058.452607][T29158] __x64_sys_clone+0xbf/0x150 04:17:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet!e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3058.457310][T29158] do_syscall_64+0xfd/0x680 [ 3058.461839][T29158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3058.467766][T29158] RIP: 0033:0x45bc49 [ 3058.471676][T29158] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3058.491285][T29158] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3058.499702][T29158] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 04:17:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0xa0008000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3058.508165][T29158] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3058.516144][T29158] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3058.524135][T29158] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3058.532109][T29158] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3058.856274][T29158] memory: usage 307172kB, limit 307200kB, failcnt 1515 [ 3058.899426][T29158] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3058.957375][T29158] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3058.981808][T29158] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:17:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:17:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:57 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x20000000000) 04:17:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0xa0010000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\"e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3059.003848][T29158] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29158,uid=0 [ 3059.026242][T29158] Memory cgroup out of memory: Killed process 29158 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3059.046614][ T1042] oom_reaper: reaped process 29158 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0xa0028000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:57 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000000000) [ 3059.366769][T29231] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3059.405274][T29231] CPU: 1 PID: 29231 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3059.413285][T29231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3059.423338][T29231] Call Trace: [ 3059.426652][T29231] dump_stack+0x172/0x1f0 [ 3059.430999][T29231] dump_header+0x10f/0xb6c [ 3059.435424][T29231] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3059.441252][T29231] ? ___ratelimit+0x60/0x595 [ 3059.445847][T29231] ? do_raw_spin_unlock+0x57/0x270 [ 3059.450968][T29231] oom_kill_process.cold+0x10/0x15 [ 3059.456085][T29231] out_of_memory+0x79a/0x1280 [ 3059.460785][T29231] ? oom_killer_disable+0x280/0x280 [ 3059.466030][T29231] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3059.471581][T29231] ? memcg_event_wake+0x230/0x230 [ 3059.476629][T29231] ? _raw_spin_unlock+0x41/0x50 [ 3059.481513][T29231] try_charge+0x102c/0x15c0 [ 3059.486030][T29231] ? find_held_lock+0x35/0x130 [ 3059.490807][T29231] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3059.496358][T29231] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3059.501912][T29231] ? find_held_lock+0x35/0x130 [ 3059.506682][T29231] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3059.512237][T29231] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3059.512252][T29231] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3059.512272][T29231] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3059.512291][T29231] __memcg_kmem_charge+0x136/0x300 [ 3059.533688][T29231] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3059.539071][T29231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3059.545341][T29231] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3059.551080][T29231] ? copy_process.part.0+0x43f7/0x6790 [ 3059.556552][T29231] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3059.561879][T29231] ? trace_hardirqs_on+0x67/0x220 [ 3059.566944][T29231] ? kasan_check_read+0x11/0x20 [ 3059.571835][T29231] copy_process.part.0+0x4a0/0x6790 [ 3059.577050][T29231] ? __lock_acquire+0x54f/0x5490 [ 3059.582007][T29231] ? __cleanup_sighand+0x60/0x60 [ 3059.586965][T29231] ? rcu_read_lock_sched_held+0x110/0x130 [ 3059.592691][T29231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3059.598938][T29231] _do_fork+0x25d/0xfe0 [ 3059.603116][T29231] ? copy_init_mm+0x20/0x20 [ 3059.607640][T29231] ? blkcg_maybe_throttle_current+0x5e2/0xfb0 [ 3059.613716][T29231] ? lock_downgrade+0x880/0x880 [ 3059.618593][T29231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3059.624851][T29231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3059.631098][T29231] ? debug_smp_processor_id+0x3c/0x280 [ 3059.636594][T29231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3059.642062][T29231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3059.647532][T29231] ? do_syscall_64+0x26/0x680 [ 3059.652219][T29231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3059.658312][T29231] ? do_syscall_64+0x26/0x680 [ 3059.663005][T29231] __x64_sys_clone+0xbf/0x150 [ 3059.667691][T29231] do_syscall_64+0xfd/0x680 [ 3059.667711][T29231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3059.667722][T29231] RIP: 0033:0x45bc49 [ 3059.667741][T29231] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3059.701599][T29231] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3059.710027][T29231] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 04:17:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet#e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3059.718011][T29231] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3059.725982][T29231] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3059.733975][T29231] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3059.741965][T29231] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:17:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x1a0ffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3059.871025][T29231] memory: usage 307172kB, limit 307200kB, failcnt 1547 [ 3059.923696][T29231] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3059.973706][T29231] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3060.009347][T29231] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3060.089255][T29231] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29231,uid=0 [ 3060.128210][T29231] Memory cgroup out of memory: Killed process 29231 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1100000000000000}, 0x0) 04:17:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:58 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000000000) 04:17:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x4000000000000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet$e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:17:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3060.201206][ T1042] oom_reaper: reaped process 29231 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:17:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x40030000000000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3060.539995][T29296] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 04:17:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x8000a0ffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:59 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000000000) [ 3060.651879][T29296] CPU: 1 PID: 29296 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3060.659893][T29296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3060.669936][T29296] Call Trace: [ 3060.673229][T29296] dump_stack+0x172/0x1f0 [ 3060.677558][T29296] dump_header+0x10f/0xb6c [ 3060.681970][T29296] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3060.687771][T29296] ? ___ratelimit+0x60/0x595 [ 3060.692369][T29296] ? do_raw_spin_unlock+0x57/0x270 [ 3060.697492][T29296] oom_kill_process.cold+0x10/0x15 [ 3060.702612][T29296] out_of_memory+0x79a/0x1280 [ 3060.707290][T29296] ? lock_downgrade+0x880/0x880 [ 3060.712142][T29296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3060.718379][T29296] ? oom_killer_disable+0x280/0x280 [ 3060.723570][T29296] ? find_held_lock+0x35/0x130 [ 3060.728345][T29296] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3060.733885][T29296] ? memcg_event_wake+0x230/0x230 [ 3060.738915][T29296] ? do_raw_spin_unlock+0x57/0x270 [ 3060.744027][T29296] ? _raw_spin_unlock+0x2d/0x50 [ 3060.748882][T29296] try_charge+0x102c/0x15c0 [ 3060.753380][T29296] ? find_held_lock+0x35/0x130 [ 3060.758156][T29296] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3060.763697][T29296] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3060.769238][T29296] ? find_held_lock+0x35/0x130 [ 3060.774002][T29296] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3060.779549][T29296] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3060.785090][T29296] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3060.790293][T29296] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3060.795838][T29296] __memcg_kmem_charge+0x136/0x300 [ 3060.800971][T29296] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3060.806341][T29296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3060.812583][T29296] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3060.818299][T29296] ? copy_process.part.0+0x43f7/0x6790 [ 3060.823759][T29296] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3060.829039][T29296] ? trace_hardirqs_on+0x67/0x220 [ 3060.834056][T29296] ? kasan_check_read+0x11/0x20 [ 3060.838914][T29296] copy_process.part.0+0x4a0/0x6790 [ 3060.844116][T29296] ? __lock_acquire+0x54f/0x5490 [ 3060.849057][T29296] ? __cleanup_sighand+0x60/0x60 [ 3060.854001][T29296] ? rcu_read_lock_sched_held+0x110/0x130 [ 3060.859712][T29296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3060.865957][T29296] _do_fork+0x25d/0xfe0 [ 3060.870124][T29296] ? copy_init_mm+0x20/0x20 [ 3060.874641][T29296] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3060.880092][T29296] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3060.885564][T29296] ? do_syscall_64+0x26/0x680 [ 3060.890237][T29296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3060.896298][T29296] ? do_syscall_64+0x26/0x680 [ 3060.900980][T29296] __x64_sys_clone+0xbf/0x150 [ 3060.905661][T29296] do_syscall_64+0xfd/0x680 [ 3060.910168][T29296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3060.916056][T29296] RIP: 0033:0x45bc49 [ 3060.919973][T29296] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3060.939570][T29296] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 04:17:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet%e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3060.947974][T29296] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3060.955940][T29296] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3060.963902][T29296] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3060.971865][T29296] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3060.979914][T29296] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3061.125138][T29296] memory: usage 307192kB, limit 307200kB, failcnt 1581 [ 3061.142755][T29296] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:17:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x8002a0ffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) [ 3061.177484][T29296] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3061.186713][T29296] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:220KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3061.248405][T29296] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29296,uid=0 [ 3061.325053][T29296] Memory cgroup out of memory: Killed process 29296 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:17:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1200000000000000}, 0x0) 04:17:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:17:59 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x20000000000) 04:17:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x4000000000000000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:17:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet&e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0xffffffffa0008000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:18:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:00 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x20000000000) 04:18:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\'e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0xffffffffa0010000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:18:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3062.409889][T29337] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3062.436930][T29337] CPU: 0 PID: 29337 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3062.444919][T29337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3062.454969][T29337] Call Trace: [ 3062.458266][T29337] dump_stack+0x172/0x1f0 [ 3062.462610][T29337] dump_header+0x10f/0xb6c [ 3062.467033][T29337] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3062.472845][T29337] ? ___ratelimit+0x60/0x595 [ 3062.477438][T29337] ? do_raw_spin_unlock+0x57/0x270 [ 3062.482554][T29337] oom_kill_process.cold+0x10/0x15 [ 3062.487663][T29337] out_of_memory+0x79a/0x1280 [ 3062.492347][T29337] ? lock_downgrade+0x880/0x880 [ 3062.498174][T29337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3062.504420][T29337] ? oom_killer_disable+0x280/0x280 [ 3062.510136][T29337] ? find_held_lock+0x35/0x130 [ 3062.514914][T29337] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3062.520468][T29337] ? memcg_event_wake+0x230/0x230 [ 3062.525496][T29337] ? do_raw_spin_unlock+0x57/0x270 [ 3062.530608][T29337] ? _raw_spin_unlock+0x2d/0x50 [ 3062.535463][T29337] try_charge+0x102c/0x15c0 [ 3062.539963][T29337] ? find_held_lock+0x35/0x130 [ 3062.544731][T29337] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3062.550277][T29337] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3062.555825][T29337] ? find_held_lock+0x35/0x130 [ 3062.560594][T29337] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3062.566159][T29337] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3062.571708][T29337] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3062.576925][T29337] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3062.582488][T29337] __memcg_kmem_charge+0x136/0x300 [ 3062.587602][T29337] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3062.592973][T29337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3062.599218][T29337] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3062.604939][T29337] ? copy_process.part.0+0x43f7/0x6790 [ 3062.610404][T29337] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3062.615734][T29337] ? trace_hardirqs_on+0x67/0x220 [ 3062.620782][T29337] ? kasan_check_read+0x11/0x20 [ 3062.625647][T29337] copy_process.part.0+0x4a0/0x6790 [ 3062.630853][T29337] ? __lock_acquire+0x54f/0x5490 [ 3062.635804][T29337] ? __cleanup_sighand+0x60/0x60 [ 3062.640751][T29337] ? rcu_read_lock_sched_held+0x110/0x130 [ 3062.646473][T29337] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3062.652723][T29337] _do_fork+0x25d/0xfe0 [ 3062.656890][T29337] ? copy_init_mm+0x20/0x20 [ 3062.661400][T29337] ? blkcg_maybe_throttle_current+0x5e2/0xfb0 [ 3062.667469][T29337] ? lock_downgrade+0x880/0x880 [ 3062.672324][T29337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3062.678565][T29337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3062.684805][T29337] ? debug_smp_processor_id+0x3c/0x280 [ 3062.690268][T29337] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3062.695724][T29337] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3062.701186][T29337] ? do_syscall_64+0x26/0x680 [ 3062.705858][T29337] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3062.711920][T29337] ? do_syscall_64+0x26/0x680 [ 3062.716600][T29337] __x64_sys_clone+0xbf/0x150 [ 3062.721283][T29337] do_syscall_64+0xfd/0x680 [ 3062.725786][T29337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3062.731671][T29337] RIP: 0033:0x45bc49 [ 3062.735564][T29337] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3062.755164][T29337] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3062.763575][T29337] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3062.771541][T29337] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3062.779506][T29337] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3062.787473][T29337] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3062.796741][T29337] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3062.814589][T29337] memory: usage 307188kB, limit 307200kB, failcnt 1614 [ 3062.827371][T29337] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3062.835755][T29337] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3062.844032][T29337] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:18:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1300000000000000}, 0x0) 04:18:01 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x20000000000) 04:18:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0xffffffffa0028000, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000100000008000000"], 0x10}, 0xfc) 04:18:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet(e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3062.865961][T29337] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29337,uid=0 [ 3062.881984][T29337] Memory cgroup out of memory: Killed process 29337 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3062.896846][ T1042] oom_reaper: reaped process 29337 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:18:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0f000000000000000100000008000000"], 0x10}, 0xfc) 04:18:01 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3063.188151][T29413] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3063.269188][T29413] CPU: 1 PID: 29413 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3063.277217][T29413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3063.287279][T29413] Call Trace: [ 3063.290592][T29413] dump_stack+0x172/0x1f0 [ 3063.294951][T29413] dump_header+0x10f/0xb6c [ 3063.299388][T29413] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3063.305242][T29413] ? ___ratelimit+0x60/0x595 [ 3063.309846][T29413] ? do_raw_spin_unlock+0x57/0x270 [ 3063.315071][T29413] oom_kill_process.cold+0x10/0x15 [ 3063.320212][T29413] out_of_memory+0x79a/0x1280 [ 3063.324945][T29413] ? lock_downgrade+0x880/0x880 [ 3063.329808][T29413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3063.336062][T29413] ? oom_killer_disable+0x280/0x280 [ 3063.341271][T29413] ? find_held_lock+0x35/0x130 [ 3063.346060][T29413] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3063.351630][T29413] ? memcg_event_wake+0x230/0x230 [ 3063.362421][T29413] ? do_raw_spin_unlock+0x57/0x270 04:18:01 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="10000000000000000100000008000000"], 0x10}, 0xfc) [ 3063.367735][T29413] ? _raw_spin_unlock+0x2d/0x50 [ 3063.372605][T29413] try_charge+0x102c/0x15c0 [ 3063.377128][T29413] ? find_held_lock+0x35/0x130 [ 3063.381915][T29413] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3063.387464][T29413] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3063.393021][T29413] ? find_held_lock+0x35/0x130 [ 3063.397792][T29413] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3063.403856][T29413] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3063.409422][T29413] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3063.414645][T29413] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3063.420204][T29413] __memcg_kmem_charge+0x136/0x300 [ 3063.425335][T29413] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3063.430709][T29413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3063.436960][T29413] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3063.442693][T29413] ? copy_process.part.0+0x43f7/0x6790 [ 3063.448168][T29413] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3063.453462][T29413] ? trace_hardirqs_on+0x67/0x220 [ 3063.458498][T29413] ? kasan_check_read+0x11/0x20 [ 3063.463373][T29413] copy_process.part.0+0x4a0/0x6790 [ 3063.468595][T29413] ? __lock_acquire+0x54f/0x5490 [ 3063.473560][T29413] ? __cleanup_sighand+0x60/0x60 [ 3063.478518][T29413] ? rcu_read_lock_sched_held+0x110/0x130 [ 3063.484248][T29413] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3063.490512][T29413] _do_fork+0x25d/0xfe0 [ 3063.494693][T29413] ? copy_init_mm+0x20/0x20 [ 3063.499222][T29413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3063.504692][T29413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3063.510158][T29413] ? do_syscall_64+0x26/0x680 04:18:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20040000000000000100000008000000"], 0x10}, 0xfc) [ 3063.514847][T29413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3063.520918][T29413] ? do_syscall_64+0x26/0x680 [ 3063.525618][T29413] __x64_sys_clone+0xbf/0x150 [ 3063.530318][T29413] do_syscall_64+0xfd/0x680 [ 3063.534837][T29413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3063.540732][T29413] RIP: 0033:0x45bc49 [ 3063.544634][T29413] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 04:18:02 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x20000000000) [ 3063.564416][T29413] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3063.572837][T29413] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3063.580899][T29413] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3063.588872][T29413] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3063.588881][T29413] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3063.588889][T29413] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3063.737857][T29413] memory: usage 307188kB, limit 307200kB, failcnt 1647 [ 3063.751298][T29413] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3063.822902][T29413] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3063.867246][T29413] Memory cgroup stats for /syz4: cache:96KB rss:160KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3063.910629][T29413] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29413,uid=0 [ 3063.932738][T29413] Memory cgroup out of memory: Killed process 29413 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:18:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1400000000000000}, 0x0) 04:18:02 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet)e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3063.954057][ T1042] oom_reaper: reaped process 29413 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:18:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20a00100000000000100000008000000"], 0x10}, 0xfc) 04:18:02 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x20000000000) 04:18:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20004000000000000100000008000000"], 0x10}, 0xfc) 04:18:02 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3064.197993][T29463] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 04:18:02 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x20000000000) [ 3064.298674][T29463] CPU: 1 PID: 29463 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3064.306698][T29463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3064.316751][T29463] Call Trace: [ 3064.316776][T29463] dump_stack+0x172/0x1f0 [ 3064.316797][T29463] dump_header+0x10f/0xb6c [ 3064.316814][T29463] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3064.316829][T29463] ? ___ratelimit+0x60/0x595 [ 3064.316844][T29463] ? do_raw_spin_unlock+0x57/0x270 [ 3064.316864][T29463] oom_kill_process.cold+0x10/0x15 [ 3064.349465][T29463] out_of_memory+0x79a/0x1280 [ 3064.354267][T29463] ? lock_downgrade+0x880/0x880 [ 3064.359130][T29463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3064.365394][T29463] ? oom_killer_disable+0x280/0x280 [ 3064.370601][T29463] ? find_held_lock+0x35/0x130 [ 3064.375400][T29463] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3064.380958][T29463] ? memcg_event_wake+0x230/0x230 [ 3064.386004][T29463] ? do_raw_spin_unlock+0x57/0x270 [ 3064.391141][T29463] ? _raw_spin_unlock+0x2d/0x50 [ 3064.396030][T29463] try_charge+0x102c/0x15c0 [ 3064.400547][T29463] ? find_held_lock+0x35/0x130 [ 3064.405332][T29463] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3064.410891][T29463] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3064.416445][T29463] ? find_held_lock+0x35/0x130 [ 3064.421483][T29463] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3064.427049][T29463] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3064.432609][T29463] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3064.437847][T29463] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3064.443400][T29463] __memcg_kmem_charge+0x136/0x300 [ 3064.448782][T29463] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3064.454163][T29463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3064.460421][T29463] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3064.466159][T29463] ? copy_process.part.0+0x43f7/0x6790 [ 3064.471640][T29463] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3064.476940][T29463] ? trace_hardirqs_on+0x67/0x220 [ 3064.481979][T29463] ? kasan_check_read+0x11/0x20 [ 3064.486874][T29463] copy_process.part.0+0x4a0/0x6790 [ 3064.492096][T29463] ? __lock_acquire+0x54f/0x5490 [ 3064.497065][T29463] ? __cleanup_sighand+0x60/0x60 [ 3064.502019][T29463] ? rcu_read_lock_sched_held+0x110/0x130 [ 3064.508727][T29463] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3064.514978][T29463] _do_fork+0x25d/0xfe0 [ 3064.519178][T29463] ? copy_init_mm+0x20/0x20 [ 3064.523714][T29463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3064.529186][T29463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3064.534660][T29463] ? do_syscall_64+0x26/0x680 [ 3064.539346][T29463] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3064.545411][T29463] ? do_syscall_64+0x26/0x680 [ 3064.545435][T29463] __x64_sys_clone+0xbf/0x150 [ 3064.545461][T29463] do_syscall_64+0xfd/0x680 [ 3064.559316][T29463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3064.565207][T29463] RIP: 0033:0x45bc49 [ 3064.569108][T29463] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3064.588739][T29463] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 04:18:03 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)}], 0x1}, 0x20000000000) 04:18:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet*e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:03 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3064.597158][T29463] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3064.605141][T29463] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3064.613124][T29463] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3064.621100][T29463] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3064.629092][T29463] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3064.875820][T29463] memory: usage 307192kB, limit 307200kB, failcnt 1688 [ 3064.883759][T29463] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3064.893257][T29463] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3064.900249][T29463] Memory cgroup stats for /syz4: cache:96KB rss:160KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3064.922271][T29463] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29463,uid=0 [ 3064.948394][T29463] Memory cgroup out of memory: Killed process 29463 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3064.963763][ T1042] oom_reaper: reaped process 29463 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:18:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1500000000000000}, 0x0) 04:18:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20004003000000000100000008000000"], 0x10}, 0xfc) 04:18:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:03 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet+e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:03 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)}], 0x1}, 0x20000000000) 04:18:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000004000000000100000008000000"], 0x10}, 0xfc) [ 3065.225397][T29528] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3065.284018][T29528] CPU: 1 PID: 29528 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3065.292027][T29528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3065.302085][T29528] Call Trace: [ 3065.305372][T29528] dump_stack+0x172/0x1f0 [ 3065.309713][T29528] dump_header+0x10f/0xb6c [ 3065.314173][T29528] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3065.319971][T29528] ? ___ratelimit+0x60/0x595 [ 3065.324568][T29528] ? do_raw_spin_unlock+0x57/0x270 04:18:03 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)}], 0x1}, 0x20000000000) [ 3065.329687][T29528] oom_kill_process.cold+0x10/0x15 [ 3065.334825][T29528] out_of_memory+0x79a/0x1280 [ 3065.339539][T29528] ? lock_downgrade+0x880/0x880 [ 3065.344394][T29528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3065.350655][T29528] ? oom_killer_disable+0x280/0x280 [ 3065.355854][T29528] ? find_held_lock+0x35/0x130 [ 3065.360646][T29528] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3065.366204][T29528] ? memcg_event_wake+0x230/0x230 [ 3065.371236][T29528] ? do_raw_spin_unlock+0x57/0x270 [ 3065.376368][T29528] ? _raw_spin_unlock+0x2d/0x50 [ 3065.381240][T29528] try_charge+0x102c/0x15c0 [ 3065.385746][T29528] ? find_held_lock+0x35/0x130 [ 3065.390531][T29528] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3065.396090][T29528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3065.402885][T29528] ? kasan_check_read+0x11/0x20 [ 3065.407749][T29528] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3065.413308][T29528] mem_cgroup_try_charge+0x24d/0x5e0 [ 3065.418605][T29528] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3065.424251][T29528] wp_page_copy+0x416/0x1770 [ 3065.428845][T29528] ? do_wp_page+0x486/0x1500 04:18:03 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000", 0x17}], 0x1}, 0x20000000000) [ 3065.433447][T29528] ? pmd_pfn+0x1d0/0x1d0 [ 3065.437719][T29528] ? lock_downgrade+0x880/0x880 [ 3065.442575][T29528] ? swp_swapcount+0x540/0x540 [ 3065.447342][T29528] ? kasan_check_read+0x11/0x20 [ 3065.452200][T29528] ? do_raw_spin_unlock+0x57/0x270 [ 3065.457318][T29528] do_wp_page+0x48e/0x1500 [ 3065.461743][T29528] ? finish_mkwrite_fault+0x540/0x540 [ 3065.461771][T29528] __handle_mm_fault+0x22e3/0x3eb0 [ 3065.461792][T29528] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3065.461805][T29528] ? find_held_lock+0x35/0x130 [ 3065.461823][T29528] ? handle_mm_fault+0x292/0xa90 [ 3065.461849][T29528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3065.461866][T29528] ? kasan_check_read+0x11/0x20 [ 3065.461901][T29528] handle_mm_fault+0x3b7/0xa90 [ 3065.461921][T29528] __do_page_fault+0x5ef/0xda0 [ 3065.461944][T29528] do_page_fault+0x71/0x57d [ 3065.461978][T29528] ? page_fault+0x8/0x30 [ 3065.517049][T29528] page_fault+0x1e/0x30 [ 3065.521221][T29528] RIP: 0033:0x40c34a [ 3065.525126][T29528] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a0 00 00 00 41 83 fe 10 75 d7 bf 1d e9 4b 00 31 c0 e8 46 58 ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 3065.544739][T29528] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010246 [ 3065.550805][T29528] RAX: 0000000000000001 RBX: 000000000075bf2c RCX: 00007ffc60c47c78 [ 3065.558871][T29528] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 3065.566844][T29528] RBP: 000000000075bf2c R08: 00007ffc60c47c80 R09: 0000000000760888 [ 3065.574820][T29528] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000075bf20 04:18:04 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet,e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3065.582797][T29528] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3065.622340][T29528] memory: usage 307192kB, limit 307200kB, failcnt 1721 [ 3065.630433][T29528] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:18:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3065.697665][T29528] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3065.782408][T29528] Memory cgroup stats for /syz4: cache:96KB rss:160KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3065.853922][T29528] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29528,uid=0 [ 3065.947249][T29528] Memory cgroup out of memory: Killed process 29528 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3065.999707][ T1042] oom_reaper: reaped process 29528 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:18:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000340000000000100000008000000"], 0x10}, 0xfc) 04:18:04 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1600000000000000}, 0x0) 04:18:04 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000", 0x17}], 0x1}, 0x20000000000) 04:18:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet-e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20a00080000000000100000008000000"], 0x10}, 0xfc) 04:18:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:04 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3066.294444][T29583] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 3066.397751][T29583] CPU: 0 PID: 29583 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3066.405780][T29583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3066.415835][T29583] Call Trace: [ 3066.419152][T29583] dump_stack+0x172/0x1f0 [ 3066.423493][T29583] dump_header+0x10f/0xb6c [ 3066.427929][T29583] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3066.433740][T29583] ? ___ratelimit+0x60/0x595 [ 3066.438333][T29583] ? do_raw_spin_unlock+0x57/0x270 [ 3066.443460][T29583] oom_kill_process.cold+0x10/0x15 [ 3066.448574][T29583] out_of_memory+0x79a/0x1280 [ 3066.453279][T29583] ? lock_downgrade+0x880/0x880 [ 3066.458164][T29583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3066.464409][T29583] ? oom_killer_disable+0x280/0x280 [ 3066.469613][T29583] ? find_held_lock+0x35/0x130 [ 3066.474397][T29583] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3066.479949][T29583] ? memcg_event_wake+0x230/0x230 [ 3066.484989][T29583] ? do_raw_spin_unlock+0x57/0x270 [ 3066.490123][T29583] ? _raw_spin_unlock+0x2d/0x50 [ 3066.495004][T29583] try_charge+0x102c/0x15c0 [ 3066.499514][T29583] ? find_held_lock+0x35/0x130 [ 3066.504297][T29583] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3066.510358][T29583] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3066.515910][T29583] ? find_held_lock+0x35/0x130 [ 3066.520687][T29583] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3066.526256][T29583] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3066.531813][T29583] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3066.537062][T29583] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3066.542675][T29583] __memcg_kmem_charge+0x136/0x300 [ 3066.548662][T29583] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3066.554044][T29583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3066.560301][T29583] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3066.566042][T29583] ? copy_process.part.0+0x43f7/0x6790 [ 3066.571519][T29583] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3066.576812][T29583] ? trace_hardirqs_on+0x67/0x220 [ 3066.581844][T29583] ? kasan_check_read+0x11/0x20 [ 3066.586715][T29583] copy_process.part.0+0x4a0/0x6790 [ 3066.591953][T29583] ? __lock_acquire+0x54f/0x5490 [ 3066.596924][T29583] ? __cleanup_sighand+0x60/0x60 [ 3066.601880][T29583] ? rcu_read_lock_sched_held+0x110/0x130 [ 3066.607607][T29583] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3066.613870][T29583] _do_fork+0x25d/0xfe0 [ 3066.618048][T29583] ? copy_init_mm+0x20/0x20 [ 3066.622589][T29583] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3066.628068][T29583] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3066.633570][T29583] ? do_syscall_64+0x26/0x680 [ 3066.638253][T29583] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3066.644335][T29583] ? do_syscall_64+0x26/0x680 04:18:05 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3066.649031][T29583] __x64_sys_clone+0xbf/0x150 [ 3066.653720][T29583] do_syscall_64+0xfd/0x680 [ 3066.658243][T29583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3066.664172][T29583] RIP: 0033:0x45bc49 [ 3066.668073][T29583] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3066.688237][T29583] RSP: 002b:00007ffc60c47a88 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 04:18:05 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000", 0x17}], 0x1}, 0x20000000000) [ 3066.696659][T29583] RAX: ffffffffffffffda RBX: 00007f2a40cc0700 RCX: 000000000045bc49 [ 3066.704632][T29583] RDX: 00007f2a40cc09d0 RSI: 00007f2a40cbfdb0 RDI: 00000000003d0f00 [ 3066.712604][T29583] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc0700 R09: 00007f2a40cc0700 [ 3066.712613][T29583] R10: 00007f2a40cc09d0 R11: 0000000000000202 R12: 0000000000000000 [ 3066.712622][T29583] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:18:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20a00280000000000100000008000000"], 0x10}, 0xfc) 04:18:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet.e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:05 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3067.131644][T29583] memory: usage 307200kB, limit 307200kB, failcnt 1753 [ 3067.138644][T29583] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3067.178203][T29583] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3067.224412][T29583] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3067.259058][T29583] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29583,uid=0 04:18:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1700000000000000}, 0x0) 04:18:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000400000000100000008000000"], 0x10}, 0xfc) 04:18:05 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb70", 0x23}], 0x1}, 0x20000000000) 04:18:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:05 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet/e\r\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3067.290787][T29583] Memory cgroup out of memory: Killed process 29583 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3067.305935][ T1042] oom_reaper: reaped process 29583 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:18:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20008000a00000000100000008000000"], 0x10}, 0xfc) [ 3067.526180][T29642] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3067.625075][T29642] CPU: 0 PID: 29642 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3067.633153][T29642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3067.643220][T29642] Call Trace: [ 3067.646523][T29642] dump_stack+0x172/0x1f0 [ 3067.650870][T29642] dump_header+0x10f/0xb6c [ 3067.655295][T29642] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3067.661107][T29642] ? ___ratelimit+0x60/0x595 [ 3067.665727][T29642] ? do_raw_spin_unlock+0x57/0x270 [ 3067.670855][T29642] oom_kill_process.cold+0x10/0x15 [ 3067.675985][T29642] out_of_memory+0x79a/0x1280 [ 3067.680679][T29642] ? lock_downgrade+0x880/0x880 [ 3067.685540][T29642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3067.691801][T29642] ? oom_killer_disable+0x280/0x280 [ 3067.697008][T29642] ? find_held_lock+0x35/0x130 [ 3067.701802][T29642] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3067.707354][T29642] ? memcg_event_wake+0x230/0x230 [ 3067.712397][T29642] ? do_raw_spin_unlock+0x57/0x270 [ 3067.717523][T29642] ? _raw_spin_unlock+0x2d/0x50 [ 3067.722999][T29642] try_charge+0x102c/0x15c0 [ 3067.727532][T29642] ? find_held_lock+0x35/0x130 [ 3067.732314][T29642] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3067.737873][T29642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3067.744140][T29642] ? kasan_check_read+0x11/0x20 [ 3067.749005][T29642] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3067.754561][T29642] mem_cgroup_try_charge+0x24d/0x5e0 [ 3067.759884][T29642] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3067.765534][T29642] __handle_mm_fault+0x1e1a/0x3eb0 [ 3067.770668][T29642] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3067.776222][T29642] ? find_held_lock+0x35/0x130 [ 3067.780998][T29642] ? handle_mm_fault+0x292/0xa90 [ 3067.785957][T29642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3067.792211][T29642] ? kasan_check_read+0x11/0x20 [ 3067.797079][T29642] handle_mm_fault+0x3b7/0xa90 [ 3067.801876][T29642] __do_page_fault+0x5ef/0xda0 [ 3067.806656][T29642] do_page_fault+0x71/0x57d [ 3067.811177][T29642] ? page_fault+0x8/0x30 [ 3067.815434][T29642] page_fault+0x1e/0x30 [ 3067.819598][T29642] RIP: 0033:0x45bc2d [ 3067.823499][T29642] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 30 8e fb ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 3067.843121][T29642] RSP: 002b:00007ffc60c47a88 EFLAGS: 00010202 [ 3067.849197][T29642] RAX: ffffffffffffffea RBX: 00007f2a40cc0700 RCX: 00007f2a40cc0700 [ 3067.857168][T29642] RDX: 00000000003d0f00 RSI: 00007f2a40cbfdb0 RDI: 000000000040ffb0 [ 3067.865152][T29642] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc09d0 R09: 00007f2a40cc0700 04:18:06 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb70", 0x23}], 0x1}, 0x20000000000) 04:18:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3067.873137][T29642] R10: 00007f2a40cbfdc0 R11: 0000000000000246 R12: 0000000000000000 [ 3067.881133][T29642] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:18:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x10\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000001a00000000100000008000000"], 0x10}, 0xfc) 04:18:06 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3068.192464][T29642] memory: usage 307200kB, limit 307200kB, failcnt 1784 [ 3068.199375][T29642] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3068.199385][T29642] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3068.199392][T29642] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3068.312910][T29642] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29642,uid=0 [ 3068.400954][T29642] Memory cgroup out of memory: Killed process 29642 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:18:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1800000000000000}, 0x0) 04:18:06 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb70", 0x23}], 0x1}, 0x20000000000) 04:18:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20008002a00000000100000008000000"], 0x10}, 0xfc) 04:18:06 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3068.469621][ T1042] oom_reaper: reaped process 29642 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 04:18:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\re\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000200000008000000"], 0x10}, 0xfc) [ 3068.666701][T29713] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3068.732601][T29713] CPU: 1 PID: 29713 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3068.740641][T29713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3068.740655][T29713] Call Trace: [ 3068.754007][T29713] dump_stack+0x172/0x1f0 [ 3068.758359][T29713] dump_header+0x10f/0xb6c [ 3068.762785][T29713] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3068.768599][T29713] ? ___ratelimit+0x60/0x595 [ 3068.773201][T29713] ? do_raw_spin_unlock+0x57/0x270 [ 3068.773225][T29713] oom_kill_process.cold+0x10/0x15 [ 3068.773244][T29713] out_of_memory+0x79a/0x1280 [ 3068.773262][T29713] ? lock_downgrade+0x880/0x880 [ 3068.773276][T29713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3068.773296][T29713] ? oom_killer_disable+0x280/0x280 [ 3068.804596][T29713] ? find_held_lock+0x35/0x130 [ 3068.809394][T29713] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3068.814951][T29713] ? memcg_event_wake+0x230/0x230 [ 3068.819996][T29713] ? do_raw_spin_unlock+0x57/0x270 [ 3068.825666][T29713] ? _raw_spin_unlock+0x2d/0x50 [ 3068.830541][T29713] try_charge+0x102c/0x15c0 [ 3068.835054][T29713] ? find_held_lock+0x35/0x130 [ 3068.839838][T29713] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3068.845404][T29713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3068.851666][T29713] ? kasan_check_read+0x11/0x20 [ 3068.856535][T29713] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3068.862120][T29713] mem_cgroup_try_charge+0x24d/0x5e0 [ 3068.862143][T29713] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3068.862164][T29713] __handle_mm_fault+0x1e1a/0x3eb0 [ 3068.862185][T29713] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3068.883747][T29713] ? find_held_lock+0x35/0x130 [ 3068.888557][T29713] ? handle_mm_fault+0x292/0xa90 [ 3068.893516][T29713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3068.899768][T29713] ? kasan_check_read+0x11/0x20 [ 3068.904642][T29713] handle_mm_fault+0x3b7/0xa90 [ 3068.909422][T29713] __do_page_fault+0x5ef/0xda0 [ 3068.914206][T29713] do_page_fault+0x71/0x57d [ 3068.918720][T29713] ? page_fault+0x8/0x30 [ 3068.922974][T29713] page_fault+0x1e/0x30 [ 3068.927135][T29713] RIP: 0033:0x45bc2d 04:18:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\b\x00\x00\x00'], 0x10}, 0xfc) 04:18:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000400000000000100000008000000"], 0x10}, 0xfc) [ 3068.931032][T29713] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 30 8e fb ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 3068.950656][T29713] RSP: 002b:00007ffc60c47a88 EFLAGS: 00010202 [ 3068.956721][T29713] RAX: ffffffffffffffea RBX: 00007f2a40cc0700 RCX: 00007f2a40cc0700 [ 3068.964696][T29713] RDX: 00000000003d0f00 RSI: 00007f2a40cbfdb0 RDI: 000000000040ffb0 [ 3068.972705][T29713] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc09d0 R09: 00007f2a40cc0700 [ 3068.972713][T29713] R10: 00007f2a40cbfdc0 R11: 0000000000000246 R12: 0000000000000000 [ 3068.972721][T29713] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c 04:18:07 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:07 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c", 0x29}], 0x1}, 0x20000000000) 04:18:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000a001000000000100000008000000"], 0x10}, 0xfc) [ 3069.195875][T29713] memory: usage 307200kB, limit 307200kB, failcnt 1825 [ 3069.215892][T29713] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3069.260616][T29713] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3069.423678][T29713] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3069.469385][T29713] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29713,uid=0 [ 3069.495366][T29713] Memory cgroup out of memory: Killed process 29713 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:18:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1900000000000000}, 0x0) 04:18:08 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000040000000000100000008000000"], 0x10}, 0xfc) 04:18:08 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c", 0x29}], 0x1}, 0x20000000000) 04:18:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xa0\x00\x80\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 3069.542651][ T1042] oom_reaper: reaped process 29713 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:18:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000040030000000100000008000000"], 0x10}, 0xfc) 04:18:08 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3069.798170][T29774] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3069.828194][T29774] CPU: 1 PID: 29774 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3069.828209][T29774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3069.846684][T29774] Call Trace: [ 3069.849977][T29774] dump_stack+0x172/0x1f0 [ 3069.854313][T29774] dump_header+0x10f/0xb6c [ 3069.858729][T29774] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3069.864535][T29774] ? ___ratelimit+0x60/0x595 [ 3069.869125][T29774] ? do_raw_spin_unlock+0x57/0x270 [ 3069.874254][T29774] oom_kill_process.cold+0x10/0x15 [ 3069.879361][T29774] out_of_memory+0x79a/0x1280 [ 3069.884041][T29774] ? lock_downgrade+0x880/0x880 [ 3069.888886][T29774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3069.895131][T29774] ? oom_killer_disable+0x280/0x280 [ 3069.900328][T29774] ? find_held_lock+0x35/0x130 [ 3069.905100][T29774] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3069.910649][T29774] ? memcg_event_wake+0x230/0x230 [ 3069.915677][T29774] ? do_raw_spin_unlock+0x57/0x270 [ 3069.920786][T29774] ? _raw_spin_unlock+0x2d/0x50 [ 3069.925656][T29774] try_charge+0x102c/0x15c0 [ 3069.930153][T29774] ? find_held_lock+0x35/0x130 [ 3069.934926][T29774] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3069.940466][T29774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3069.946708][T29774] ? kasan_check_read+0x11/0x20 [ 3069.951568][T29774] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3069.957109][T29774] mem_cgroup_try_charge+0x24d/0x5e0 [ 3069.962404][T29774] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3069.968039][T29774] __handle_mm_fault+0x1e1a/0x3eb0 [ 3069.973161][T29774] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3069.978700][T29774] ? find_held_lock+0x35/0x130 [ 3069.983483][T29774] ? handle_mm_fault+0x292/0xa90 [ 3069.988424][T29774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3069.994666][T29774] ? kasan_check_read+0x11/0x20 [ 3069.999518][T29774] handle_mm_fault+0x3b7/0xa90 [ 3070.004286][T29774] __do_page_fault+0x5ef/0xda0 [ 3070.009052][T29774] do_page_fault+0x71/0x57d [ 3070.013551][T29774] ? page_fault+0x8/0x30 [ 3070.017793][T29774] page_fault+0x1e/0x30 [ 3070.021947][T29774] RIP: 0033:0x45bc2d [ 3070.025839][T29774] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 30 8e fb ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 3070.045527][T29774] RSP: 002b:00007ffc60c47a88 EFLAGS: 00010202 [ 3070.051592][T29774] RAX: ffffffffffffffea RBX: 00007f2a40cc0700 RCX: 00007f2a40cc0700 [ 3070.059557][T29774] RDX: 00000000003d0f00 RSI: 00007f2a40cbfdb0 RDI: 000000000040ffb0 [ 3070.067533][T29774] RBP: 00007ffc60c47ca0 R08: 00007f2a40cc09d0 R09: 00007f2a40cc0700 [ 3070.075513][T29774] R10: 00007f2a40cbfdc0 R11: 0000000000000246 R12: 0000000000000000 [ 3070.083489][T29774] R13: 00007ffc60c47b3f R14: 00007f2a40cc09c0 R15: 000000000075bf2c [ 3070.171296][T29774] memory: usage 307200kB, limit 307200kB, failcnt 1842 [ 3070.178342][T29774] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:18:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\xa0\x02\x80\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:08 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c", 0x29}], 0x1}, 0x20000000000) [ 3070.221983][T29774] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3070.253838][T29774] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:220KB inactive_file:0KB active_file:0KB unevictable:0KB 04:18:08 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3070.331802][T29774] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29774,uid=0 04:18:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000040000000100000008000000"], 0x10}, 0xfc) [ 3070.425810][T29774] Memory cgroup out of memory: Killed process 29774 (syz-executor.4) total-vm:72576kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3070.592510][ T1042] oom_reaper: reaped process 29774 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:18:09 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x01\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1a00000000000000}, 0x0) 04:18:09 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00", 0x2c}], 0x1}, 0x20000000000) 04:18:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000003400000000100000008000000"], 0x10}, 0xfc) 04:18:09 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1a0ffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3070.839425][T29824] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3070.921250][T29824] CPU: 1 PID: 29824 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3070.929276][T29824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3070.939337][T29824] Call Trace: [ 3070.942672][T29824] dump_stack+0x172/0x1f0 [ 3070.947025][T29824] dump_header+0x10f/0xb6c [ 3070.951456][T29824] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3070.957273][T29824] ? ___ratelimit+0x60/0x595 [ 3070.961873][T29824] ? do_raw_spin_unlock+0x57/0x270 [ 3070.967001][T29824] oom_kill_process.cold+0x10/0x15 [ 3070.972137][T29824] out_of_memory+0x79a/0x1280 [ 3070.976828][T29824] ? lock_downgrade+0x880/0x880 [ 3070.981685][T29824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3070.987948][T29824] ? oom_killer_disable+0x280/0x280 [ 3070.993156][T29824] ? find_held_lock+0x35/0x130 [ 3070.997968][T29824] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3071.003537][T29824] ? memcg_event_wake+0x230/0x230 [ 3071.008575][T29824] ? do_raw_spin_unlock+0x57/0x270 [ 3071.013698][T29824] ? _raw_spin_unlock+0x2d/0x50 [ 3071.018565][T29824] try_charge+0x102c/0x15c0 [ 3071.023085][T29824] ? find_held_lock+0x35/0x130 [ 3071.027875][T29824] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3071.033432][T29824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3071.039678][T29824] ? kasan_check_read+0x11/0x20 [ 3071.044551][T29824] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3071.050108][T29824] mem_cgroup_try_charge+0x24d/0x5e0 [ 3071.055417][T29824] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3071.061075][T29824] wp_page_copy+0x416/0x1770 [ 3071.065683][T29824] ? do_wp_page+0x486/0x1500 [ 3071.070291][T29824] ? pmd_pfn+0x1d0/0x1d0 [ 3071.074549][T29824] ? lock_downgrade+0x880/0x880 [ 3071.079405][T29824] ? swp_swapcount+0x540/0x540 [ 3071.084180][T29824] ? kasan_check_read+0x11/0x20 [ 3071.089065][T29824] ? do_raw_spin_unlock+0x57/0x270 [ 3071.094207][T29824] do_wp_page+0x48e/0x1500 [ 3071.098659][T29824] ? finish_mkwrite_fault+0x540/0x540 [ 3071.104054][T29824] __handle_mm_fault+0x22e3/0x3eb0 [ 3071.109177][T29824] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3071.114737][T29824] ? find_held_lock+0x35/0x130 [ 3071.119534][T29824] ? handle_mm_fault+0x292/0xa90 [ 3071.124497][T29824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3071.130750][T29824] ? kasan_check_read+0x11/0x20 [ 3071.135614][T29824] handle_mm_fault+0x3b7/0xa90 [ 3071.140399][T29824] __do_page_fault+0x5ef/0xda0 [ 3071.145185][T29824] do_page_fault+0x71/0x57d [ 3071.149697][T29824] ? page_fault+0x8/0x30 [ 3071.153944][T29824] page_fault+0x1e/0x30 [ 3071.158140][T29824] RIP: 0033:0x40c34a 04:18:09 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x20000000000) 04:18:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000a000800000000100000008000000"], 0x10}, 0xfc) [ 3071.162043][T29824] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a0 00 00 00 41 83 fe 10 75 d7 bf 1d e9 4b 00 31 c0 e8 46 58 ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 3071.181645][T29824] RSP: 002b:00007ffc60c47bc0 EFLAGS: 00010246 [ 3071.181658][T29824] RAX: 0000000000000001 RBX: 000000000075bf2c RCX: 00007ffc60c47c78 [ 3071.181666][T29824] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 3071.181674][T29824] RBP: 000000000075bf2c R08: 00007ffc60c47c80 R09: 0000000000760888 [ 3071.181703][T29824] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000075bf20 04:18:09 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00", 0x2c}], 0x1}, 0x20000000000) 04:18:09 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x20000000000) [ 3071.211954][T29824] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3071.246123][T29824] memory: usage 307200kB, limit 307200kB, failcnt 1874 [ 3071.259249][T29824] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3071.286875][T29824] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3071.306848][T29824] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB 04:18:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000a002800000000100000008000000"], 0x10}, 0xfc) [ 3071.458722][T29824] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29824,uid=0 04:18:10 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x20000000000) [ 3071.554260][T29824] Memory cgroup out of memory: Killed process 29824 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB [ 3071.645449][ T1042] oom_reaper: reaped process 29824 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:18:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1b00000000000000}, 0x0) 04:18:10 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00", 0x2c}], 0x1}, 0x20000000000) 04:18:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\re\x01\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:10 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000000000) 04:18:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000004000000100000008000000"], 0x10}, 0xfc) 04:18:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000008000a000000100000008000000"], 0x10}, 0xfc) [ 3071.994906][T29886] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 04:18:10 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff", 0x2d}], 0x1}, 0x20000000000) 04:18:10 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000000000) [ 3072.138190][T29886] CPU: 0 PID: 29886 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3072.146229][T29886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3072.156291][T29886] Call Trace: [ 3072.159593][T29886] dump_stack+0x172/0x1f0 [ 3072.163947][T29886] dump_header+0x10f/0xb6c [ 3072.168419][T29886] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3072.174274][T29886] ? ___ratelimit+0x60/0x595 [ 3072.178896][T29886] ? do_raw_spin_unlock+0x57/0x270 [ 3072.184027][T29886] oom_kill_process.cold+0x10/0x15 [ 3072.184048][T29886] out_of_memory+0x79a/0x1280 [ 3072.184065][T29886] ? lock_downgrade+0x880/0x880 [ 3072.184088][T29886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3072.193915][T29886] ? oom_killer_disable+0x280/0x280 [ 3072.193929][T29886] ? find_held_lock+0x35/0x130 [ 3072.193962][T29886] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3072.205035][T29886] ? memcg_event_wake+0x230/0x230 [ 3072.205058][T29886] ? do_raw_spin_unlock+0x57/0x270 [ 3072.205079][T29886] ? _raw_spin_unlock+0x2d/0x50 [ 3072.235557][T29886] try_charge+0x102c/0x15c0 [ 3072.235572][T29886] ? find_held_lock+0x35/0x130 [ 3072.235626][T29886] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3072.250429][T29886] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3072.250446][T29886] ? find_held_lock+0x35/0x130 [ 3072.250463][T29886] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 3072.250488][T29886] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3072.271841][T29886] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3072.277075][T29886] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 3072.282683][T29886] __memcg_kmem_charge+0x136/0x300 [ 3072.287818][T29886] __alloc_pages_nodemask+0x4bd/0x8d0 [ 3072.293204][T29886] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 3072.298944][T29886] ? __lock_acquire+0x54f/0x5490 [ 3072.304274][T29886] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3072.310524][T29886] alloc_pages_current+0x107/0x210 [ 3072.310547][T29886] __pmd_alloc+0x41/0x460 [ 3072.310562][T29886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3072.310580][T29886] __handle_mm_fault+0x1925/0x3eb0 [ 3072.310607][T29886] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3072.336916][T29886] ? find_held_lock+0x35/0x130 [ 3072.343280][T29886] ? handle_mm_fault+0x292/0xa90 [ 3072.348238][T29886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3072.348264][T29886] ? kasan_check_read+0x11/0x20 [ 3072.348286][T29886] handle_mm_fault+0x3b7/0xa90 [ 3072.348307][T29886] __do_page_fault+0x5ef/0xda0 [ 3072.348331][T29886] do_page_fault+0x71/0x57d [ 3072.368911][T29886] ? page_fault+0x8/0x30 [ 3072.368933][T29886] page_fault+0x1e/0x30 [ 3072.368945][T29886] RIP: 0033:0x4019f7 [ 3072.368961][T29886] Code: 00 00 00 48 83 ec 08 48 8b 15 bd ea 66 00 48 8b 05 ae ea 66 00 48 39 d0 48 8d 8a 00 00 00 01 72 17 48 39 c8 73 12 48 8d 50 04 <89> 38 48 89 15 90 ea 66 00 48 83 c4 08 c3 48 89 c6 bf b8 90 4c 00 [ 3072.368973][T29886] RSP: 002b:00007ffc60c47bb0 EFLAGS: 00010287 [ 3072.368992][T29886] RAX: 0000001b2e520000 RBX: 0000000000000000 RCX: 0000001b2f520000 [ 3072.405338][T29886] RDX: 0000001b2e520004 RSI: 00007ffc60c47970 RDI: 0000000000000000 [ 3072.405347][T29886] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000004 [ 3072.405357][T29886] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000001 [ 3072.405364][T29886] R13: 00007ffc60c47da0 R14: 0000000000000000 R15: 00007ffc60c47db0 04:18:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000000001a000000100000008000000"], 0x10}, 0xfc) 04:18:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) 04:18:11 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000000000) [ 3072.563473][T29886] memory: usage 307200kB, limit 307200kB, failcnt 1906 [ 3072.576066][T29886] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3072.632034][T29886] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3072.701531][T29886] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3072.789324][T29886] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29886,uid=0 [ 3072.816984][T29886] Memory cgroup out of memory: Killed process 29886 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:34816kB, shmem-rss:0kB 04:18:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1c00000000000000}, 0x0) 04:18:11 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff", 0x2d}], 0x1}, 0x20000000000) [ 3072.851774][ T1042] oom_reaper: reaped process 29886 (syz-executor.4), now anon-rss:0kB, file-rss:34112kB, shmem-rss:0kB 04:18:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x02\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 04:18:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2000008002a000000100000008000000"], 0x10}, 0xfc) 04:18:11 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x20000000000) 04:18:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000000000000003000008000000"], 0x10}, 0xfc) 04:18:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4fe, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x730b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xfffffffffffffff9, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0xec, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x3}, r1, 0x0, 0xffffffffffffff9c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b18700", 0x21}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x20000000000) [ 3073.100951][T29950] syz-executor.4 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 3073.225090][T29950] CPU: 0 PID: 29950 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #11 [ 3073.233121][T29950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3073.243182][T29950] Call Trace: [ 3073.246480][T29950] dump_stack+0x172/0x1f0 [ 3073.250826][T29950] dump_header+0x10f/0xb6c [ 3073.255335][T29950] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 3073.261172][T29950] ? ___ratelimit+0x60/0x595 [ 3073.265773][T29950] ? do_raw_spin_unlock+0x57/0x270 [ 3073.270893][T29950] oom_kill_process.cold+0x10/0x15 [ 3073.276009][T29950] out_of_memory+0x79a/0x1280 [ 3073.280693][T29950] ? lock_downgrade+0x880/0x880 [ 3073.285547][T29950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3073.291790][T29950] ? oom_killer_disable+0x280/0x280 [ 3073.291899][T29950] ? find_held_lock+0x35/0x130 [ 3073.301857][T29950] mem_cgroup_out_of_memory+0x1ca/0x230 [ 3073.301873][T29950] ? memcg_event_wake+0x230/0x230 [ 3073.301893][T29950] ? do_raw_spin_unlock+0x57/0x270 [ 3073.301909][T29950] ? _raw_spin_unlock+0x2d/0x50 [ 3073.301928][T29950] try_charge+0x102c/0x15c0 [ 3073.326896][T29950] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3073.333153][T29950] ? should_fail+0x1de/0x852 [ 3073.337760][T29950] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3073.343324][T29950] ? rcu_read_lock_sched_held+0x110/0x130 [ 3073.349057][T29950] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 3073.354624][T29950] __memcg_kmem_charge_memcg+0x7c/0x130 [ 3073.366427][T29950] ? memcg_kmem_put_cache+0xb0/0xb0 [ 3073.371627][T29950] ? cache_grow_begin+0x3d6/0x650 [ 3073.376655][T29950] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3073.381940][T29950] ? trace_hardirqs_on+0x67/0x220 [ 3073.381959][T29950] cache_grow_begin+0x402/0x650 [ 3073.381974][T29950] ? __cpuset_node_allowed+0x136/0x540 [ 3073.381991][T29950] fallback_alloc+0x1fd/0x2d0 [ 3073.382012][T29950] ____cache_alloc_node+0x1be/0x1e0 [ 3073.382028][T29950] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3073.382046][T29950] kmem_cache_alloc+0x1e8/0x6f0 [ 3073.382059][T29950] ? get_pid_task+0xc9/0x190 [ 3073.382080][T29950] ? proc_free_inode+0x20/0x20 [ 3073.382102][T29950] proc_alloc_inode+0x1c/0x1a0 [ 3073.433900][T29950] alloc_inode+0x68/0x1e0 [ 3073.438243][T29950] new_inode_pseudo+0x19/0xf0 [ 3073.442935][T29950] new_inode+0x1f/0x40 [ 3073.447011][T29950] proc_pid_make_inode+0x22/0x230 [ 3073.452052][T29950] proc_pident_instantiate+0x82/0x2a0 [ 3073.457437][T29950] proc_pident_lookup+0x1ad/0x210 [ 3073.462479][T29950] proc_tgid_base_lookup+0x2c/0x40 [ 3073.467597][T29950] ? proc_tid_base_lookup+0x40/0x40 [ 3073.472817][T29950] lookup_open+0x6cd/0x1a90 [ 3073.477337][T29950] ? vfs_link+0xb90/0xb90 [ 3073.481720][T29950] ? kasan_check_write+0x14/0x20 [ 3073.486663][T29950] path_openat+0x1eb2/0x46d0 [ 3073.491290][T29950] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 3073.496680][T29950] ? cache_grow_end+0xa4/0x190 [ 3073.501451][T29950] ? __alloc_fd+0x44d/0x560 [ 3073.506011][T29950] do_filp_open+0x1a1/0x280 [ 3073.510520][T29950] ? may_open_dev+0x100/0x100 [ 3073.515218][T29950] ? simple_attr_release+0x50/0x50 [ 3073.520341][T29950] ? do_raw_spin_unlock+0x57/0x270 04:18:11 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x20000000000) 04:18:11 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff", 0x2d}], 0x1}, 0x20000000000) 04:18:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000004000000000100000008000000"], 0x10}, 0xfc) [ 3073.525471][T29950] ? _raw_spin_unlock+0x2d/0x50 [ 3073.530463][T29950] do_sys_open+0x3fe/0x5d0 [ 3073.534926][T29950] ? filp_open+0x80/0x80 [ 3073.539186][T29950] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3073.544655][T29950] ? do_syscall_64+0x26/0x680 [ 3073.549338][T29950] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3073.555411][T29950] ? do_syscall_64+0x26/0x680 [ 3073.560114][T29950] __x64_sys_open+0x7e/0xc0 [ 3073.564652][T29950] do_syscall_64+0xfd/0x680 [ 3073.569176][T29950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3073.575080][T29950] RIP: 0033:0x413140 [ 3073.575102][T29950] Code: 05 48 3d 01 f0 ff ff 0f 83 2d 19 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 83 3d 4d 31 66 00 00 75 14 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff [ 3073.575111][T29950] RSP: 002b:00007ffc60c47858 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 3073.575155][T29950] RAX: ffffffffffffffda RBX: 00007ffc60c47884 RCX: 0000000000413140 [ 3073.575164][T29950] RDX: 00007ffc60c4788a RSI: 0000000000080001 RDI: 00000000004bea78 04:18:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="200000a0010000000100000008000000"], 0x10}, 0xfc) [ 3073.575180][T29950] RBP: 00007ffc60c47880 R08: 0000000000000000 R09: 0000000000000004 [ 3073.575200][T29950] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000004bea78 [ 3073.575209][T29950] R13: 00007ffc60c47da0 R14: 0000000000000000 R15: 00007ffc60c47db0 [ 3073.643617][T29950] memory: usage 307200kB, limit 307200kB, failcnt 1941 [ 3073.660141][T29950] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3073.675797][T29950] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3073.682904][T29950] Memory cgroup stats for /syz4: cache:96KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:0KB active_file:0KB unevictable:0KB [ 3073.712926][T29950] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9261,uid=0 [ 3073.766520][T29950] Memory cgroup out of memory: Killed process 9261 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB 04:18:12 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0xa, 0x0, 0x11) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e00000023008163e45ae08700000000060f0000000000bc4cc91b4dd65b2f0580cb7023f52a556d1c958c00ff00", 0x2e}], 0x1}, 0x0) 04:18:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x1d00000000000000}, 0x0) 04:18:12 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x20000000000) [ 3232.701261][ T1041] INFO: task syz-executor.1:29961 blocked for more than 143 seconds. [ 3232.709366][ T1041] Not tainted 5.2.0-rc1+ #11 [ 3232.715307][ T7507] kobject: 'wlan2557' (0000000081c2138f): kobject_cleanup, parent 00000000b27e9945 [ 3232.715324][ T1041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3232.730755][ T7507] kobject: 'wlan2557' (0000000081c2138f): calling ktype release [ 3232.733446][ T1041] syz-executor.1 D28512 29961 29778 0x00004004 [ 3232.752378][ T1041] Call Trace: [ 3232.752471][ T7507] kobject: 'wlan2557': free name [ 3232.755697][ T1041] __schedule+0x7cb/0x1560 [ 3232.765212][ T1041] ? __sched_text_start+0x8/0x8 [ 3232.767422][ T7507] kobject: 'rfkill2678' (00000000035ce02a): kobject_uevent_env [ 3232.770075][ T1041] ? _raw_spin_unlock_irq+0x28/0x90 [ 3232.782924][ T1041] ? _raw_spin_unlock_irq+0x28/0x90 [ 3232.783609][ T7507] kobject: 'rfkill2678' (00000000035ce02a): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim2676/ieee80211/phy2676/rfkill2678' [ 3232.788136][ T1041] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3232.807685][ T1041] schedule+0xa8/0x260 [ 3232.811815][ T1041] rwsem_down_write_failed+0x7a1/0xc60 [ 3232.817327][ T1041] ? rwsem_down_read_failed_killable+0x5d0/0x5d0 [ 3232.823739][ T1041] ? rwsem_downgrade_wake+0x120/0x120 [ 3232.829124][ T1041] ? register_netdev+0x50/0x50 [ 3232.833980][ T1041] ? lock_acquire+0x16f/0x3f0 [ 3232.838667][ T1041] ? unregister_netdevice_notifier+0x7e/0x390 [ 3232.844783][ T1041] down_write+0x93/0xa0 [ 3232.848947][ T1041] ? down_write+0x93/0xa0 [ 3232.853341][ T1041] unregister_netdevice_notifier+0x7e/0x390 [ 3232.859244][ T1041] ? register_netdevice_notifier+0x630/0x630 [ 3232.865341][ T1041] ? refcount_dec_and_test_checked+0x1b/0x20 [ 3232.871379][ T1041] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3232.877623][ T1041] ? apparmor_socket_post_create+0x480/0x10bb [ 3232.883865][ T1041] bcm_release+0x93/0x5d0 [ 3232.888211][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3232.894514][ T1041] __sock_release+0x1f4/0x2a0 [ 3232.899212][ T1041] __sys_socketpair+0x534/0x5d0 [ 3232.904131][ T1041] ? __ia32_sys_socket+0xb0/0xb0 [ 3232.909092][ T1041] ? retint_kernel+0x2b/0x2b [ 3232.913745][ T1041] __x64_sys_socketpair+0x97/0xf0 [ 3232.918790][ T1041] ? do_syscall_64+0x5b/0x680 [ 3232.923535][ T1041] do_syscall_64+0xfd/0x680 [ 3232.928191][ T1041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3232.934132][ T1041] RIP: 0033:0x459279 [ 3232.938049][ T1041] Code: Bad RIP value. [ 3232.942171][ T1041] RSP: 002b:00007f46c710ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3232.950604][ T1041] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 3232.958776][ T1041] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 3232.966804][ T1041] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 3232.974839][ T1041] R10: 0000000020000000 R11: 0000000000000246 R12: 00007f46c710b6d4 [ 3232.982856][ T1041] R13: 00000000004c7c91 R14: 00000000004ddfb0 R15: 00000000ffffffff [ 3232.990854][ T1041] [ 3232.990854][ T1041] Showing all locks held in the system: [ 3232.998617][ T1041] 1 lock held by khungtaskd/1041: [ 3233.003653][ T1041] #0: 00000000a1ee7ce2 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 3233.013064][ T1041] 2 locks held by kworker/1:2/3484: [ 3233.018261][ T1041] #0: 0000000071e8bb71 ((wq_completion)events){+.+.}, at: process_one_work+0x87e/0x1790 [ 3233.028126][ T1041] #1: 000000004145aaa4 ((work_completion)(&pwq->unbound_release_work)){+.+.}, at: process_one_work+0x8b4/0x1790 [ 3233.040099][ T1041] 1 lock held by rsyslogd/9118: [ 3233.044996][ T1041] 2 locks held by getty/9208: [ 3233.049667][ T1041] #0: 00000000e9d2bebf (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3233.058750][ T1041] #1: 00000000e8eebb18 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3233.068365][ T1041] 2 locks held by getty/9209: [ 3233.073078][ T1041] #0: 00000000b46a3010 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3233.082300][ T1041] #1: 00000000690ae277 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3233.091982][ T1041] 2 locks held by getty/9210: [ 3233.096717][ T1041] #0: 000000006f116c09 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3233.105724][ T1041] #1: 00000000a85c576e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3233.115515][ T1041] 2 locks held by getty/9211: [ 3233.120173][ T1041] #0: 0000000080c7c05c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3233.129176][ T1041] #1: 000000009401f11a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3233.138847][ T1041] 2 locks held by getty/9212: [ 3233.143588][ T1041] #0: 0000000093da0736 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3233.152635][ T1041] #1: 000000000ad40cee (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3233.162274][ T1041] 2 locks held by getty/9213: [ 3233.166957][ T1041] #0: 00000000c9eec13c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3233.175956][ T1041] #1: 00000000a8ea35cb (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3233.185571][ T1041] 2 locks held by getty/9214: [ 3233.190232][ T1041] #0: 00000000be9f3f5c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3233.199259][ T1041] #1: 00000000a9bb63cc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 3233.209036][ T1041] 4 locks held by kworker/u4:5/7507: [ 3233.214368][ T1041] #0: 0000000026ea2803 ((wq_completion)netns){+.+.}, at: process_one_work+0x87e/0x1790 [ 3233.224177][ T1041] #1: 00000000eac49a85 (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 3233.233651][ T1041] #2: 00000000c1bc32c2 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 3233.242499][ T1041] #3: 00000000278df34b (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 3233.250579][ T1041] 1 lock held by syz-executor.1/29961: [ 3233.256091][ T1041] #0: 00000000c1bc32c2 (pernet_ops_rwsem){++++}, at: unregister_netdevice_notifier+0x7e/0x390 [ 3233.266485][ T1041] [ 3233.268825][ T1041] ============================================= [ 3233.268825][ T1041] [ 3233.272851][ T7507] kobject: 'phy2676' (000000000cbbad5d): kobject_uevent_env [ 3233.277280][ T1041] NMI backtrace for cpu 0 [ 3233.288878][ T1041] CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.2.0-rc1+ #11 [ 3233.295610][ T7507] kobject: 'phy2676' (000000000cbbad5d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim2676/ieee80211/phy2676' [ 3233.296418][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3233.310174][ T7507] kobject: 'ieee80211' (00000000334db86b): kobject_cleanup, parent 00000000b27e9945 [ 3233.319489][ T1041] Call Trace: [ 3233.319521][ T1041] dump_stack+0x172/0x1f0 [ 3233.319547][ T1041] nmi_cpu_backtrace.cold+0x63/0xa4 [ 3233.319568][ T1041] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 3233.319591][ T1041] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 3233.319607][ T1041] arch_trigger_cpumask_backtrace+0x14/0x20 [ 3233.319619][ T1041] watchdog+0x9b7/0xec0 [ 3233.319646][ T1041] kthread+0x354/0x420 [ 3233.330188][ T7507] kobject: 'ieee80211' (00000000334db86b): calling ktype release [ 3233.332616][ T1041] ? reset_hung_task_detector+0x30/0x30 [ 3233.332633][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3233.332652][ T1041] ret_from_fork+0x24/0x30 [ 3233.332747][ T1041] Sending NMI from CPU 0 to CPUs 1: [ 3233.338174][ T7507] kobject: 'ieee80211': free name [ 3233.343284][ T1041] NMI backtrace for cpu 1 [ 3233.343291][ T1041] CPU: 1 PID: 7507 Comm: kworker/u4:5 Not tainted 5.2.0-rc1+ #11 [ 3233.343298][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3233.343302][ T1041] Workqueue: netns cleanup_net [ 3233.343310][ T1041] RIP: 0010:call_timer_fn+0x561/0x720 [ 3233.343323][ T1041] Code: 84 db 0f 84 a2 fc ff ff e8 7c 0f 10 00 e8 f8 cf 9f ff e9 93 fc ff ff e8 6d 0f 10 00 65 ff 05 2e 67 a1 7e 48 8b 05 87 6b 1c 08 4a f5 fc ff 31 ff 41 89 c6 89 c6 e8 ce 10 10 00 45 85 f6 74 20 [ 3233.343328][ T1041] RSP: 0018:ffff8880ae909d08 EFLAGS: 00000002 [ 3233.343337][ T1041] RAX: 0000000000000000 RBX: ffff88802988e9c0 RCX: ffffffff81609279 [ 3233.343343][ T1041] RDX: 0000000000000100 RSI: ffffffff81609653 RDI: 0000000000000001 [ 3233.343349][ T1041] RBP: ffff8880ae909dd0 R08: ffff888067f086c0 R09: ffff888067f09028 [ 3233.343355][ T1041] R10: ffff888067f09008 R11: ffff888067f086c0 R12: 0000000000000101 [ 3233.343361][ T1041] R13: ffff8880ae909da8 R14: 0000000000000001 R15: dffffc0000000000 [ 3233.343367][ T1041] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 3233.343372][ T1041] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3233.343378][ T1041] CR2: 00007f392ae4e000 CR3: 000000009f3a2000 CR4: 00000000001406e0 [ 3233.343384][ T1041] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3233.343390][ T1041] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 3233.343393][ T1041] Call Trace: [ 3233.343396][ T1041] [ 3233.343400][ T1041] ? queue_work_node+0x360/0x360 [ 3233.343404][ T1041] ? process_timeout+0x40/0x40 [ 3233.343408][ T1041] ? lock_downgrade+0x880/0x880 [ 3233.343413][ T1041] ? queue_work_node+0x360/0x360 [ 3233.343417][ T1041] ? kasan_check_read+0x11/0x20 [ 3233.343421][ T1041] ? do_raw_spin_unlock+0x57/0x270 [ 3233.343425][ T1041] ? queue_work_node+0x360/0x360 [ 3233.343429][ T1041] run_timer_softirq+0x462/0x1740 [ 3233.343433][ T1041] ? add_timer+0x930/0x930 [ 3233.343437][ T1041] __do_softirq+0x25c/0x94c [ 3233.343441][ T1041] ? sched_clock_cpu+0x1b/0x1b0 [ 3233.343445][ T1041] irq_exit+0x180/0x1d0 [ 3233.343449][ T1041] smp_apic_timer_interrupt+0x13b/0x550 [ 3233.343453][ T1041] apic_timer_interrupt+0xf/0x20 [ 3233.343456][ T1041] [ 3233.343460][ T1041] RIP: 0010:vprintk_emit+0x5df/0x700 [ 3233.343473][ T1041] Code: 00 48 b8 00 00 00 00 00 fc ff df 41 80 3c 06 00 0f 85 f8 00 00 00 48 83 3d 3d cc 57 07 00 74 6a e8 86 01 16 00 48 89 df 57 9d <0f> 1f 44 00 00 e9 06 ff ff ff e8 72 01 16 00 49 c1 ee 03 e8 69 7a [ 3233.343477][ T1041] RSP: 0018:ffff888044fa7688 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 3233.343488][ T1041] RAX: ffff888067f086c0 RBX: 0000000000000293 RCX: 1ffff1100cfe1200 [ 3233.343494][ T1041] RDX: 0000000000000000 RSI: ffffffff815aa43a RDI: 0000000000000293 [ 3233.343499][ T1041] RBP: ffff888044fa76d0 R08: ffff888067f086c0 R09: ffff888067f09000 [ 3233.343505][ T1041] R10: 0000000000000000 R11: 0000000000000000 R12: 000000000000001f [ 3233.343511][ T1041] R13: 0000000000000200 R14: 1ffffffff1164e0e R15: ffff8880a7c8c6c0 [ 3233.343515][ T1041] ? vprintk_emit+0x5da/0x700 [ 3233.343519][ T1041] vprintk_default+0x28/0x30 [ 3233.343523][ T1041] vprintk_func+0x7e/0x189 [ 3233.343526][ T1041] printk+0xba/0xed [ 3233.343531][ T1041] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 3233.343543][ T1041] ? trace_hardirqs_on+0x67/0x220 [ 3233.343547][ T1041] ? class_dir_release+0x16/0x20 [ 3233.343551][ T1041] kobject_put.cold+0x2ab/0x2e6 [ 3233.343555][ T1041] cleanup_glue_dir.part.0+0xe1/0x130 [ 3233.343559][ T1041] device_del+0x88d/0xc30 [ 3233.343564][ T1041] ? __device_links_no_driver+0x250/0x250 [ 3233.343568][ T1041] ? wiphy_idx_to_wiphy+0x49/0xa0 [ 3233.343572][ T1041] wiphy_unregister+0x2f7/0xfd0 [ 3233.343576][ T1041] ? cfg80211_rfkill_poll+0x5f0/0x5f0 [ 3233.343581][ T1041] ? _raw_spin_unlock_irq+0x74/0x90 [ 3233.343585][ T1041] ? put_pwq_unlocked.part.0+0x53/0x70 [ 3233.343589][ T1041] ? destroy_workqueue+0x137/0x700 [ 3233.343594][ T1041] ieee80211_unregister_hw+0x1bf/0x230 [ 3233.343598][ T1041] mac80211_hwsim_del_radio+0x289/0x3b0 [ 3233.343603][ T1041] ? hwsim_mcast_config_msg+0x110/0x110 [ 3233.343606][ T1041] ? put_device+0x25/0x30 [ 3233.343610][ T1041] hwsim_exit_net+0x553/0xc4b [ 3233.343615][ T1041] ? hwsim_del_radio_nl+0x7e0/0x7e0 [ 3233.343619][ T1041] ? wait_for_completion+0x440/0x440 [ 3233.343624][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3233.343628][ T1041] ? mutex_unlock+0xd/0x10 [ 3233.343632][ T1041] ? ip_vs_sync_net_cleanup+0xa1/0xa8 [ 3233.343637][ T1041] ? hwsim_del_radio_nl+0x7e0/0x7e0 [ 3233.343641][ T1041] ops_exit_list.isra.0+0xaa/0x150 [ 3233.343645][ T1041] cleanup_net+0x3fb/0x960 [ 3233.343649][ T1041] ? netns_install+0x1d0/0x1d0 [ 3233.343653][ T1041] process_one_work+0x989/0x1790 [ 3233.343658][ T1041] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3233.343662][ T1041] ? lock_acquire+0x16f/0x3f0 [ 3233.343666][ T1041] worker_thread+0x98/0xe40 [ 3233.343669][ T1041] kthread+0x354/0x420 [ 3233.343674][ T1041] ? process_one_work+0x1790/0x1790 [ 3233.343679][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3233.343683][ T1041] ret_from_fork+0x24/0x30 [ 3233.343692][ T1041] Kernel panic - not syncing: hung_task: blocked tasks [ 3233.343707][ T1041] CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.2.0-rc1+ #11 [ 3233.343713][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3233.343716][ T1041] Call Trace: [ 3233.343737][ T1041] dump_stack+0x172/0x1f0 [ 3233.343759][ T1041] panic+0x2cb/0x744 [ 3233.343773][ T1041] ? __warn_printk+0xf3/0xf3 [ 3233.343790][ T1041] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3233.343804][ T1041] ? printk_safe_flush+0xf2/0x140 [ 3233.343816][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3233.343835][ T1041] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 3233.343848][ T1041] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 3233.343862][ T1041] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 3233.343881][ T1041] watchdog+0x9c8/0xec0 [ 3233.361170][ T7507] kobject: 'hwsim2676' (00000000e1c0564b): kobject_uevent_env [ 3233.366457][ T1041] kthread+0x354/0x420 [ 3233.366474][ T1041] ? reset_hung_task_detector+0x30/0x30 [ 3233.366486][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3233.366501][ T1041] ret_from_fork+0x24/0x30 [ 3233.372396][ T1041] Kernel Offset: disabled [ 3234.002643][ T1041] Rebooting in 86400 seconds..