0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3516.068382][ T1061] oom_reaper: reaped process 24041 (syz-executor.1), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB 23:33:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) 23:33:35 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 23:33:35 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3516.588178][T24165] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3516.639477][T24165] CPU: 0 PID: 24165 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3516.647440][T24165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3516.657521][T24165] Call Trace: [ 3516.660842][T24165] dump_stack+0xf5/0x159 [ 3516.665124][T24165] dump_header+0xaa/0x449 [ 3516.669534][T24165] oom_kill_process.cold+0x10/0x15 [ 3516.674696][T24165] out_of_memory+0x231/0xa00 [ 3516.679318][T24165] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3516.684999][T24165] mem_cgroup_out_of_memory+0x128/0x150 [ 3516.690590][T24165] try_charge+0xb3a/0xbc0 [ 3516.695029][T24165] ? get_page_from_freelist+0x8c0/0x1650 [ 3516.700744][T24165] ? __tsan_write4+0x32/0x40 [ 3516.705367][T24165] ? __rcu_read_unlock+0x66/0x3c0 [ 3516.710487][T24165] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3516.716017][T24165] __memcg_kmem_charge+0xde/0x240 [ 3516.721086][T24165] __alloc_pages_nodemask+0x26c/0x310 [ 3516.726498][T24165] alloc_pages_current+0xd1/0x170 [ 3516.731546][T24165] pte_alloc_one+0x30/0xa0 [ 3516.735998][T24165] __pte_alloc+0x2d/0x220 [ 3516.740468][T24165] copy_page_range+0x151a/0x1a80 [ 3516.745506][T24165] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3516.751197][T24165] ? __vma_link_rb+0x3f4/0x440 [ 3516.755990][T24165] dup_mm+0x74a/0xba0 [ 3516.760095][T24165] copy_process+0x36f3/0x3b50 [ 3516.764798][T24165] ? apic_timer_interrupt+0xa/0x20 [ 3516.769957][T24165] _do_fork+0xfe/0x6e0 [ 3516.774051][T24165] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3516.779747][T24165] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3516.785399][T24165] ? __tsan_read8+0x2c/0x30 [ 3516.789979][T24165] __x64_sys_clone+0x12b/0x160 [ 3516.794989][T24165] do_syscall_64+0xcc/0x370 [ 3516.799575][T24165] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3516.805472][T24165] RIP: 0033:0x459f49 [ 3516.809396][T24165] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3516.829127][T24165] RSP: 002b:00007f46fbab6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3516.837564][T24165] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3516.845555][T24165] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3516.853555][T24165] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3516.861549][T24165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46fbab76d4 [ 3516.869578][T24165] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3517.031075][T24165] memory: usage 307200kB, limit 307200kB, failcnt 21967 [ 3517.038755][T24165] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3517.045930][T24165] Memory cgroup stats for /syz4: [ 3517.049556][T24165] anon 242884608 [ 3517.049556][T24165] file 651264 [ 3517.049556][T24165] kernel_stack 6193152 [ 3517.049556][T24165] slab 13692928 [ 3517.049556][T24165] sock 0 [ 3517.049556][T24165] shmem 696320 [ 3517.049556][T24165] file_mapped 0 [ 3517.049556][T24165] file_dirty 0 23:33:36 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 3517.049556][T24165] file_writeback 0 [ 3517.049556][T24165] anon_thp 186646528 [ 3517.049556][T24165] inactive_anon 0 [ 3517.049556][T24165] active_anon 243494912 [ 3517.049556][T24165] inactive_file 61440 [ 3517.049556][T24165] active_file 0 [ 3517.049556][T24165] unevictable 0 [ 3517.049556][T24165] slab_reclaimable 1892352 [ 3517.049556][T24165] slab_unreclaimable 11800576 [ 3517.049556][T24165] pgfault 237039 [ 3517.049556][T24165] pgmajfault 0 [ 3517.049556][T24165] workingset_refault 429 [ 3517.049556][T24165] workingset_activate 165 23:33:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3517.049556][T24165] workingset_nodereclaim 0 [ 3517.049556][T24165] pgrefill 8128 [ 3517.049556][T24165] pgscan 35562 [ 3517.049556][T24165] pgsteal 14304 [ 3517.145607][T24165] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24164,uid=0 [ 3517.163805][T24165] Memory cgroup out of memory: Killed process 24164 (syz-executor.4) total-vm:72716kB, anon-rss:4212kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 3517.204403][T24174] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3517.227519][T24174] CPU: 0 PID: 24174 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3517.235454][T24174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3517.245520][T24174] Call Trace: [ 3517.248879][T24174] dump_stack+0xf5/0x159 23:33:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3517.253152][T24174] dump_header+0xaa/0x449 [ 3517.257540][T24174] oom_kill_process.cold+0x10/0x15 [ 3517.262677][T24174] out_of_memory+0x231/0xa00 [ 3517.267295][T24174] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3517.272966][T24174] mem_cgroup_out_of_memory+0x128/0x150 [ 3517.278547][T24174] try_charge+0xb3a/0xbc0 [ 3517.282902][T24174] ? __tsan_write4+0x32/0x40 [ 3517.287533][T24174] ? __rcu_read_unlock+0x66/0x3c0 [ 3517.292636][T24174] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3517.298115][T24174] __memcg_kmem_charge+0xde/0x240 [ 3517.303189][T24174] copy_process+0x11d2/0x3b50 [ 3517.307912][T24174] ? record_times+0x16/0x90 [ 3517.312429][T24174] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3517.318096][T24174] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3517.323772][T24174] _do_fork+0xfe/0x6e0 [ 3517.327909][T24174] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3517.333554][T24174] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3517.339266][T24174] ? blkcg_maybe_throttle_current+0x472/0x610 [ 3517.345475][T24174] __x64_sys_clone+0x12b/0x160 [ 3517.350279][T24174] do_syscall_64+0xcc/0x370 [ 3517.354886][T24174] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3517.360791][T24174] RIP: 0033:0x45c919 [ 3517.364722][T24174] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3517.384351][T24174] RSP: 002b:00007fff25964908 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3517.392794][T24174] RAX: ffffffffffffffda RBX: 00007fa9090b7700 RCX: 000000000045c919 [ 3517.400823][T24174] RDX: 00007fa9090b79d0 RSI: 00007fa9090b6db0 RDI: 00000000003d0f00 [ 3517.408815][T24174] RBP: 00007fff25964b20 R08: 00007fa9090b7700 R09: 00007fa9090b7700 [ 3517.416801][T24174] R10: 00007fa9090b79d0 R11: 0000000000000202 R12: 0000000000000000 [ 3517.424801][T24174] R13: 00007fff259649bf R14: 00007fa9090b79c0 R15: 000000000075bfd4 [ 3517.440010][ T1061] oom_reaper: reaped process 24164 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 23:33:37 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 3517.707707][T24174] memory: usage 307180kB, limit 307200kB, failcnt 9528 [ 3517.758270][T24174] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3517.901800][T24174] Memory cgroup stats for /syz0: [ 3517.902111][T24174] anon 266137600 [ 3517.902111][T24174] file 0 [ 3517.902111][T24174] kernel_stack 4276224 [ 3517.902111][T24174] slab 9998336 [ 3517.902111][T24174] sock 0 [ 3517.902111][T24174] shmem 73728 [ 3517.902111][T24174] file_mapped 135168 [ 3517.902111][T24174] file_dirty 0 [ 3517.902111][T24174] file_writeback 0 [ 3517.902111][T24174] anon_thp 234881024 [ 3517.902111][T24174] inactive_anon 0 [ 3517.902111][T24174] active_anon 266145792 [ 3517.902111][T24174] inactive_file 0 [ 3517.902111][T24174] active_file 28672 [ 3517.902111][T24174] unevictable 0 [ 3517.902111][T24174] slab_reclaimable 1216512 [ 3517.902111][T24174] slab_unreclaimable 8781824 [ 3517.902111][T24174] pgfault 235917 [ 3517.902111][T24174] pgmajfault 0 [ 3517.902111][T24174] workingset_refault 165 [ 3517.902111][T24174] workingset_activate 66 [ 3517.902111][T24174] workingset_nodereclaim 0 [ 3517.902111][T24174] pgrefill 3667 [ 3517.902111][T24174] pgscan 15617 [ 3517.902111][T24174] pgsteal 11708 23:33:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) 23:33:37 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 23:33:37 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3518.098474][T24174] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=23721,uid=0 23:33:37 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 3518.173804][T24174] Memory cgroup out of memory: Killed process 23721 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 23:33:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) 23:33:37 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3518.643752][T24217] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3518.702911][T24217] CPU: 1 PID: 24217 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3518.710864][T24217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3518.720932][T24217] Call Trace: [ 3518.724266][T24217] dump_stack+0xf5/0x159 [ 3518.728539][T24217] dump_header+0xaa/0x449 [ 3518.733002][T24217] oom_kill_process.cold+0x10/0x15 [ 3518.738160][T24217] out_of_memory+0x231/0xa00 [ 3518.742776][T24217] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3518.748449][T24217] mem_cgroup_out_of_memory+0x128/0x150 [ 3518.754037][T24217] try_charge+0xb3a/0xbc0 [ 3518.758436][T24217] ? get_page_from_freelist+0x8c0/0x1650 [ 3518.764167][T24217] ? __tsan_write4+0x32/0x40 [ 3518.768786][T24217] ? __rcu_read_unlock+0x66/0x3c0 [ 3518.773886][T24217] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3518.779415][T24217] __memcg_kmem_charge+0xde/0x240 [ 3518.784474][T24217] __alloc_pages_nodemask+0x26c/0x310 [ 3518.789946][T24217] alloc_pages_current+0xd1/0x170 [ 3518.795056][T24217] pte_alloc_one+0x30/0xa0 [ 3518.799505][T24217] __pte_alloc+0x2d/0x220 [ 3518.803941][T24217] copy_page_range+0x151a/0x1a80 [ 3518.808986][T24217] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3518.814691][T24217] ? __vma_link_rb+0x3f4/0x440 [ 3518.819487][T24217] dup_mm+0x74a/0xba0 [ 3518.823533][T24217] copy_process+0x36f3/0x3b50 [ 3518.828288][T24217] _do_fork+0xfe/0x6e0 [ 3518.832413][T24217] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3518.838060][T24217] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3518.843728][T24217] ? __tsan_read8+0x2c/0x30 [ 3518.848284][T24217] __x64_sys_clone+0x12b/0x160 [ 3518.853166][T24217] do_syscall_64+0xcc/0x370 [ 3518.857696][T24217] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3518.863597][T24217] RIP: 0033:0x459f49 [ 3518.867558][T24217] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3518.887166][T24217] RSP: 002b:00007fc56dd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3518.895685][T24217] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3518.903748][T24217] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3518.911725][T24217] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3518.919701][T24217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc56dd116d4 [ 3518.927704][T24217] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3519.009910][T24217] memory: usage 307200kB, limit 307200kB, failcnt 18353 [ 3519.021189][T24217] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3519.032115][T24217] Memory cgroup stats for /syz2: [ 3519.032767][T24217] anon 250535936 [ 3519.032767][T24217] file 139264 [ 3519.032767][T24217] kernel_stack 5787648 [ 3519.032767][T24217] slab 12312576 [ 3519.032767][T24217] sock 28672 [ 3519.032767][T24217] shmem 151552 [ 3519.032767][T24217] file_mapped 0 [ 3519.032767][T24217] file_dirty 0 [ 3519.032767][T24217] file_writeback 0 [ 3519.032767][T24217] anon_thp 207618048 [ 3519.032767][T24217] inactive_anon 196608 [ 3519.032767][T24217] active_anon 250519552 [ 3519.032767][T24217] inactive_file 131072 [ 3519.032767][T24217] active_file 0 [ 3519.032767][T24217] unevictable 135168 [ 3519.032767][T24217] slab_reclaimable 1622016 [ 3519.032767][T24217] slab_unreclaimable 10690560 [ 3519.032767][T24217] pgfault 266409 [ 3519.032767][T24217] pgmajfault 0 [ 3519.032767][T24217] workingset_refault 297 [ 3519.032767][T24217] workingset_activate 99 [ 3519.032767][T24217] workingset_nodereclaim 0 [ 3519.032767][T24217] pgrefill 4304 [ 3519.032767][T24217] pgscan 34756 [ 3519.032767][T24217] pgsteal 30898 [ 3519.129477][T24217] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=21287,uid=0 [ 3519.145936][T24217] Memory cgroup out of memory: Killed process 21287 (syz-executor.2) total-vm:72716kB, anon-rss:2208kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 3519.203935][T24225] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3519.216935][T24225] CPU: 0 PID: 24225 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3519.224859][T24225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3519.234928][T24225] Call Trace: [ 3519.238259][T24225] dump_stack+0xf5/0x159 [ 3519.242530][T24225] dump_header+0xaa/0x449 [ 3519.246959][T24225] oom_kill_process.cold+0x10/0x15 [ 3519.252134][T24225] out_of_memory+0x231/0xa00 [ 3519.256770][T24225] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.262453][T24225] mem_cgroup_out_of_memory+0x128/0x150 [ 3519.268090][T24225] try_charge+0xb3a/0xbc0 [ 3519.272443][T24225] ? __tsan_write4+0x32/0x40 [ 3519.277061][T24225] ? __rcu_read_unlock+0x66/0x3c0 [ 3519.282157][T24225] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3519.287634][T24225] __memcg_kmem_charge+0xde/0x240 [ 3519.292742][T24225] copy_process+0x11d2/0x3b50 [ 3519.297462][T24225] ? record_times+0x16/0x90 23:33:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3519.302065][T24225] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.307741][T24225] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.313409][T24225] _do_fork+0xfe/0x6e0 [ 3519.317493][T24225] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.323164][T24225] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.328830][T24225] ? blkcg_maybe_throttle_current+0x472/0x610 [ 3519.334936][T24225] __x64_sys_clone+0x12b/0x160 [ 3519.339814][T24225] do_syscall_64+0xcc/0x370 [ 3519.344397][T24225] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3519.350294][T24225] RIP: 0033:0x45c919 [ 3519.354257][T24225] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3519.373884][T24225] RSP: 002b:00007fff25964908 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3519.382347][T24225] RAX: ffffffffffffffda RBX: 00007fa909075700 RCX: 000000000045c919 [ 3519.390342][T24225] RDX: 00007fa9090759d0 RSI: 00007fa909074db0 RDI: 00000000003d0f00 [ 3519.398364][T24225] RBP: 00007fff25964b20 R08: 00007fa909075700 R09: 00007fa909075700 [ 3519.406448][T24225] R10: 00007fa9090759d0 R11: 0000000000000202 R12: 0000000000000000 [ 3519.414447][T24225] R13: 00007fff259649bf R14: 00007fa9090759c0 R15: 000000000075c124 23:33:38 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r1 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r1}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r2, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:38 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 3519.457744][T24225] memory: usage 307168kB, limit 307200kB, failcnt 9545 [ 3519.464694][T24225] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3519.487060][T24225] Memory cgroup stats for /syz0: [ 3519.487344][T24225] anon 266108928 [ 3519.487344][T24225] file 0 [ 3519.487344][T24225] kernel_stack 4313088 [ 3519.487344][T24225] slab 9998336 [ 3519.487344][T24225] sock 0 [ 3519.487344][T24225] shmem 73728 [ 3519.487344][T24225] file_mapped 135168 [ 3519.487344][T24225] file_dirty 0 [ 3519.487344][T24225] file_writeback 0 [ 3519.487344][T24225] anon_thp 234881024 [ 3519.487344][T24225] inactive_anon 0 [ 3519.487344][T24225] active_anon 266113024 [ 3519.487344][T24225] inactive_file 0 [ 3519.487344][T24225] active_file 28672 [ 3519.487344][T24225] unevictable 0 [ 3519.487344][T24225] slab_reclaimable 1216512 [ 3519.487344][T24225] slab_unreclaimable 8781824 [ 3519.487344][T24225] pgfault 236016 [ 3519.487344][T24225] pgmajfault 0 [ 3519.487344][T24225] workingset_refault 165 [ 3519.487344][T24225] workingset_activate 66 [ 3519.487344][T24225] workingset_nodereclaim 0 [ 3519.487344][T24225] pgrefill 3667 [ 3519.487344][T24225] pgscan 15617 [ 3519.487344][T24225] pgsteal 11708 [ 3519.595802][T24225] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4505,uid=0 23:33:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3519.656571][T24225] Memory cgroup out of memory: Killed process 4505 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3519.789965][T24209] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3519.847256][T24209] CPU: 1 PID: 24209 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3519.855191][T24209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3519.865264][T24209] Call Trace: [ 3519.868659][T24209] dump_stack+0xf5/0x159 [ 3519.872978][T24209] dump_header+0xaa/0x449 [ 3519.877336][T24209] oom_kill_process.cold+0x10/0x15 [ 3519.882486][T24209] out_of_memory+0x231/0xa00 [ 3519.887095][T24209] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.892818][T24209] mem_cgroup_out_of_memory+0x128/0x150 [ 3519.898409][T24209] try_charge+0xb3a/0xbc0 [ 3519.902800][T24209] ? rcu_note_context_switch+0x700/0x760 [ 3519.908532][T24209] mem_cgroup_try_charge+0xd2/0x260 [ 3519.913825][T24209] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3519.919557][T24209] wp_page_copy+0x322/0x1160 [ 3519.924182][T24209] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.929843][T24209] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.935508][T24209] do_wp_page+0x192/0x11f0 [ 3519.939946][T24209] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3519.945666][T24209] __handle_mm_fault+0x1c07/0x2cb0 [ 3519.950820][T24209] handle_mm_fault+0x21b/0x530 [ 3519.955695][T24209] __do_page_fault+0x3fb/0x9e0 [ 3519.960493][T24209] do_page_fault+0x54/0x233 [ 3519.965039][T24209] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3519.970831][T24209] page_fault+0x34/0x40 [ 3519.975003][T24209] RIP: 0033:0x40d15f [ 3519.979029][T24209] Code: 00 00 48 63 eb 74 0f 81 fb e7 03 00 00 b8 e8 03 00 00 48 0f 4e e8 e8 70 54 ff ff bb e8 03 00 00 49 89 c5 4c 8d 74 05 00 eb 10 5c 54 ff ff 48 89 c2 4c 29 ea 48 39 d5 72 52 4c 89 f1 31 d2 4c [ 3519.998654][T24209] RSP: 002b:00007ffdf09f9100 EFLAGS: 00010246 [ 3520.004737][T24209] RAX: 0000000000000000 RBX: 00000000000003e8 RCX: 0000000000459f49 [ 3520.012779][T24209] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf2c [ 3520.020770][T24209] RBP: 000000000000002d R08: ffffffffffffffff R09: ffffffffffffffff [ 3520.028858][T24209] R10: 00007ffdf09f91d0 R11: 0000000000000246 R12: 000000000075bf20 [ 3520.036900][T24209] R13: 000000000035b004 R14: 000000000035b031 R15: 000000000075bf2c 23:33:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[0x0]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3520.112983][T24209] memory: usage 307200kB, limit 307200kB, failcnt 22015 [ 3520.132530][T24209] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3520.141589][T24209] Memory cgroup stats for /syz4: [ 3520.141869][T24209] anon 242835456 [ 3520.141869][T24209] file 651264 [ 3520.141869][T24209] kernel_stack 6156288 [ 3520.141869][T24209] slab 13692928 [ 3520.141869][T24209] sock 0 [ 3520.141869][T24209] shmem 696320 [ 3520.141869][T24209] file_mapped 0 [ 3520.141869][T24209] file_dirty 0 [ 3520.141869][T24209] file_writeback 0 [ 3520.141869][T24209] anon_thp 186646528 [ 3520.141869][T24209] inactive_anon 0 [ 3520.141869][T24209] active_anon 243445760 [ 3520.141869][T24209] inactive_file 61440 [ 3520.141869][T24209] active_file 0 [ 3520.141869][T24209] unevictable 0 [ 3520.141869][T24209] slab_reclaimable 1892352 [ 3520.141869][T24209] slab_unreclaimable 11800576 [ 3520.141869][T24209] pgfault 237105 [ 3520.141869][T24209] pgmajfault 0 [ 3520.141869][T24209] workingset_refault 429 [ 3520.141869][T24209] workingset_activate 165 [ 3520.141869][T24209] workingset_nodereclaim 0 [ 3520.141869][T24209] pgrefill 8128 [ 3520.141869][T24209] pgscan 35562 [ 3520.141869][T24209] pgsteal 14304 [ 3520.238928][T24209] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24338,uid=0 [ 3520.256908][T24209] Memory cgroup out of memory: Killed process 24338 (syz-executor.4) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3520.280141][ T1061] oom_reaper: reaped process 24338 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 3520.366527][T24218] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3520.427190][T24218] CPU: 0 PID: 24218 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3520.435130][T24218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3520.445286][T24218] Call Trace: [ 3520.448609][T24218] dump_stack+0xf5/0x159 [ 3520.452882][T24218] dump_header+0xaa/0x449 [ 3520.457343][T24218] oom_kill_process.cold+0x10/0x15 [ 3520.462542][T24218] out_of_memory+0x231/0xa00 [ 3520.467149][T24218] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3520.472818][T24218] mem_cgroup_out_of_memory+0x128/0x150 [ 3520.478401][T24218] try_charge+0x8c1/0xbc0 [ 3520.482784][T24218] ? rcu_note_context_switch+0x700/0x760 [ 3520.488468][T24218] mem_cgroup_try_charge+0xd2/0x260 [ 3520.493716][T24218] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3520.499386][T24218] wp_page_copy+0x322/0x1160 [ 3520.504064][T24218] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3520.509767][T24218] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3520.515587][T24218] do_wp_page+0x192/0x11f0 [ 3520.520022][T24218] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3520.525679][T24218] __handle_mm_fault+0x1c07/0x2cb0 [ 3520.530859][T24218] handle_mm_fault+0x21b/0x530 [ 3520.535683][T24218] __do_page_fault+0x3fb/0x9e0 [ 3520.540487][T24218] do_page_fault+0x54/0x233 [ 3520.545031][T24218] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3520.550824][T24218] page_fault+0x34/0x40 [ 3520.554998][T24218] RIP: 0033:0x40529e 23:33:39 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3520.558932][T24218] Code: 48 8b 55 40 48 8b 75 38 48 8b 7d 30 ff 75 70 ff 75 68 ff 75 60 4c 8b 4d 58 4c 8b 45 50 ff d0 48 83 c4 20 48 89 c3 48 83 fb ff <48> 89 5d 78 41 8b 04 24 0f 85 d4 00 00 00 85 c0 0f 85 cc 00 00 00 [ 3520.578556][T24218] RSP: 002b:00007f46fbab6c90 EFLAGS: 00010217 [ 3520.584737][T24218] RAX: 0000000000000000 RBX: 000000000000203b RCX: 0000000000459f49 [ 3520.592727][T24218] RDX: 0000000000405256 RSI: 0000000000000000 RDI: 0000000000000000 [ 3520.600746][T24218] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3520.608732][T24218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46fbab76d4 [ 3520.616700][T24218] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3520.648141][T24218] memory: usage 307056kB, limit 307200kB, failcnt 22016 [ 3520.655165][T24218] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3520.662102][T24218] Memory cgroup stats for /syz4: [ 3520.663627][T24218] anon 242835456 [ 3520.663627][T24218] file 651264 [ 3520.663627][T24218] kernel_stack 6156288 [ 3520.663627][T24218] slab 13692928 [ 3520.663627][T24218] sock 0 [ 3520.663627][T24218] shmem 696320 [ 3520.663627][T24218] file_mapped 0 [ 3520.663627][T24218] file_dirty 0 [ 3520.663627][T24218] file_writeback 0 [ 3520.663627][T24218] anon_thp 186646528 [ 3520.663627][T24218] inactive_anon 0 [ 3520.663627][T24218] active_anon 243445760 [ 3520.663627][T24218] inactive_file 61440 [ 3520.663627][T24218] active_file 0 [ 3520.663627][T24218] unevictable 0 [ 3520.663627][T24218] slab_reclaimable 1892352 [ 3520.663627][T24218] slab_unreclaimable 11800576 [ 3520.663627][T24218] pgfault 237105 [ 3520.663627][T24218] pgmajfault 0 [ 3520.663627][T24218] workingset_refault 429 [ 3520.663627][T24218] workingset_activate 165 [ 3520.663627][T24218] workingset_nodereclaim 0 [ 3520.663627][T24218] pgrefill 8128 [ 3520.663627][T24218] pgscan 35562 [ 3520.663627][T24218] pgsteal 14304 [ 3520.759043][T24218] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24209,uid=0 [ 3520.775562][T24218] Memory cgroup out of memory: Killed process 24209 (syz-executor.4) total-vm:72584kB, anon-rss:4212kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 3520.803306][ T1061] oom_reaper: reaped process 24209 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3520.811013][T24414] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3520.887732][T24414] CPU: 0 PID: 24414 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 3520.895709][T24414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3520.905769][T24414] Call Trace: [ 3520.909075][T24414] dump_stack+0xf5/0x159 [ 3520.913377][T24414] dump_header+0xaa/0x449 [ 3520.917723][T24414] oom_kill_process.cold+0x10/0x15 [ 3520.922880][T24414] out_of_memory+0x231/0xa00 [ 3520.927534][T24414] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3520.933285][T24414] mem_cgroup_out_of_memory+0x128/0x150 [ 3520.938875][T24414] try_charge+0xb3a/0xbc0 [ 3520.943262][T24414] ? get_page_from_freelist+0x8c0/0x1650 [ 3520.948916][T24414] ? __tsan_write4+0x32/0x40 [ 3520.953503][T24414] ? __rcu_read_unlock+0x66/0x3c0 [ 3520.958582][T24414] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3520.964101][T24414] __memcg_kmem_charge+0xde/0x240 [ 3520.969202][T24414] __alloc_pages_nodemask+0x26c/0x310 [ 3520.974725][T24414] alloc_pages_current+0xd1/0x170 [ 3520.979759][T24414] pte_alloc_one+0x30/0xa0 [ 3520.984258][T24414] __pte_alloc+0x2d/0x220 [ 3520.988652][T24414] copy_page_range+0x151a/0x1a80 [ 3520.993734][T24414] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3520.999389][T24414] ? __vma_link_rb+0x3f4/0x440 [ 3521.004178][T24414] dup_mm+0x74a/0xba0 [ 3521.008274][T24414] copy_process+0x36f3/0x3b50 [ 3521.013008][T24414] _do_fork+0xfe/0x6e0 [ 3521.019956][T24414] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3521.025600][T24414] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3521.031241][T24414] ? __tsan_read8+0x2c/0x30 [ 3521.035770][T24414] __x64_sys_clone+0x12b/0x160 [ 3521.040570][T24414] do_syscall_64+0xcc/0x370 [ 3521.045091][T24414] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3521.051000][T24414] RIP: 0033:0x459f49 [ 3521.054921][T24414] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3521.074576][T24414] RSP: 002b:00007f28db6a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3521.083003][T24414] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3521.090981][T24414] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3521.098943][T24414] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3521.106906][T24414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28db6a86d4 [ 3521.114877][T24414] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:33:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3521.246150][T24414] memory: usage 307200kB, limit 307200kB, failcnt 13920 [ 3521.254028][T24414] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3521.261073][T24414] Memory cgroup stats for /syz1: [ 3521.262821][T24414] anon 248655872 [ 3521.262821][T24414] file 1146880 [ 3521.262821][T24414] kernel_stack 5566464 [ 3521.262821][T24414] slab 12333056 [ 3521.262821][T24414] sock 0 [ 3521.262821][T24414] shmem 1351680 [ 3521.262821][T24414] file_mapped 0 [ 3521.262821][T24414] file_dirty 0 [ 3521.262821][T24414] file_writeback 0 [ 3521.262821][T24414] anon_thp 205520896 [ 3521.262821][T24414] inactive_anon 135168 [ 3521.262821][T24414] active_anon 249704448 [ 3521.262821][T24414] inactive_file 0 [ 3521.262821][T24414] active_file 40960 [ 3521.262821][T24414] unevictable 0 [ 3521.262821][T24414] slab_reclaimable 1351680 [ 3521.262821][T24414] slab_unreclaimable 10981376 [ 3521.262821][T24414] pgfault 202059 [ 3521.262821][T24414] pgmajfault 0 [ 3521.262821][T24414] workingset_refault 2277 [ 3521.262821][T24414] workingset_activate 165 [ 3521.262821][T24414] workingset_nodereclaim 0 [ 3521.262821][T24414] pgrefill 3919 [ 3521.262821][T24414] pgscan 63516 [ 3521.262821][T24414] pgsteal 12901 [ 3521.358862][T24414] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=23930,uid=0 [ 3521.376038][T24414] Memory cgroup out of memory: Killed process 23930 (syz-executor.1) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 23:33:40 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 23:33:40 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3521.624174][T24471] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3521.648407][T24471] CPU: 0 PID: 24471 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3521.656343][T24471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3521.666397][T24471] Call Trace: [ 3521.669703][T24471] dump_stack+0xf5/0x159 [ 3521.674009][T24471] dump_header+0xaa/0x449 [ 3521.678355][T24471] oom_kill_process.cold+0x10/0x15 [ 3521.683478][T24471] out_of_memory+0x231/0xa00 [ 3521.688079][T24471] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3521.693740][T24471] mem_cgroup_out_of_memory+0x128/0x150 [ 3521.699305][T24471] try_charge+0xb3a/0xbc0 [ 3521.703735][T24471] ? rcu_note_context_switch+0x700/0x760 [ 3521.709408][T24471] mem_cgroup_try_charge+0xd2/0x260 [ 3521.714702][T24471] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3521.720364][T24471] wp_page_copy+0x322/0x1160 [ 3521.724982][T24471] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3521.730766][T24471] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3521.736539][T24471] do_wp_page+0x192/0x11f0 [ 3521.740978][T24471] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3521.746678][T24471] __handle_mm_fault+0x1c07/0x2cb0 [ 3521.751886][T24471] handle_mm_fault+0x21b/0x530 [ 3521.756670][T24471] __do_page_fault+0x3fb/0x9e0 [ 3521.761518][T24471] do_page_fault+0x54/0x233 [ 3521.766071][T24471] ? do_syscall_64+0x270/0x370 [ 3521.770845][T24471] page_fault+0x34/0x40 [ 3521.775043][T24471] RIP: 0033:0x40c9b8 [ 3521.778972][T24471] Code: d9 48 8b 47 78 48 83 f8 ff 0f 84 0b 01 00 00 48 8b 73 18 48 83 fe ff 74 29 48 81 fe e7 03 00 00 0f 87 67 01 00 00 48 c1 e6 04 86 80 80 75 00 01 48 89 86 88 80 75 00 66 2e 0f 1f 84 00 00 00 [ 3521.798594][T24471] RSP: 002b:00007fff25964a10 EFLAGS: 00010246 [ 3521.804662][T24471] RAX: 0000000000000006 RBX: 000000000075bf20 RCX: 0000000000000001 [ 3521.812647][T24471] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 000000000075bf20 [ 3521.820708][T24471] RBP: 000000000000002d R08: ffffffffffffffff R09: ffffffffffffffff [ 3521.828683][T24471] R10: 00007fff25964b10 R11: 0000000000000246 R12: 000000000075bf20 [ 3521.836657][T24471] R13: 000000000035bc37 R14: 000000000035bc64 R15: 000000000075bf2c [ 3521.847763][T24471] memory: usage 307200kB, limit 307200kB, failcnt 9572 [ 3521.854760][T24471] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3521.867439][T24471] Memory cgroup stats for /syz0: [ 3521.867735][T24471] anon 266293248 [ 3521.867735][T24471] file 0 [ 3521.867735][T24471] kernel_stack 4239360 [ 3521.867735][T24471] slab 9998336 [ 3521.867735][T24471] sock 0 [ 3521.867735][T24471] shmem 73728 [ 3521.867735][T24471] file_mapped 135168 [ 3521.867735][T24471] file_dirty 0 [ 3521.867735][T24471] file_writeback 0 [ 3521.867735][T24471] anon_thp 234881024 [ 3521.867735][T24471] inactive_anon 0 [ 3521.867735][T24471] active_anon 266240000 [ 3521.867735][T24471] inactive_file 0 [ 3521.867735][T24471] active_file 28672 [ 3521.867735][T24471] unevictable 0 23:33:41 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3521.867735][T24471] slab_reclaimable 1216512 [ 3521.867735][T24471] slab_unreclaimable 8781824 [ 3521.867735][T24471] pgfault 236115 [ 3521.867735][T24471] pgmajfault 0 [ 3521.867735][T24471] workingset_refault 165 [ 3521.867735][T24471] workingset_activate 66 [ 3521.867735][T24471] workingset_nodereclaim 0 [ 3521.867735][T24471] pgrefill 3700 [ 3521.867735][T24471] pgscan 15617 [ 3521.867735][T24471] pgsteal 11708 [ 3521.973947][T24471] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24466,uid=0 [ 3522.023830][T24471] Memory cgroup out of memory: Killed process 24466 (syz-executor.0) total-vm:72980kB, anon-rss:4272kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3522.089106][ T1061] oom_reaper: reaped process 24466 (syz-executor.0), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB 23:33:41 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r1 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r1}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r2, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3522.420370][T24608] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3522.433084][T24608] CPU: 0 PID: 24608 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 3522.440990][T24608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3522.451132][T24608] Call Trace: [ 3522.454469][T24608] dump_stack+0xf5/0x159 [ 3522.460691][T24608] dump_header+0xaa/0x449 [ 3522.465055][T24608] oom_kill_process.cold+0x10/0x15 [ 3522.470205][T24608] out_of_memory+0x231/0xa00 [ 3522.474819][T24608] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3522.480584][T24608] mem_cgroup_out_of_memory+0x128/0x150 [ 3522.486233][T24608] try_charge+0xb3a/0xbc0 [ 3522.490607][T24608] ? get_page_from_freelist+0x8c0/0x1650 [ 3522.496371][T24608] ? __tsan_write4+0x32/0x40 [ 3522.501019][T24608] ? apic_timer_interrupt+0xa/0x20 [ 3522.506145][T24608] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3522.511636][T24608] __memcg_kmem_charge+0xde/0x240 [ 3522.516764][T24608] __alloc_pages_nodemask+0x26c/0x310 [ 3522.522172][T24608] alloc_pages_current+0xd1/0x170 [ 3522.527257][T24608] pte_alloc_one+0x30/0xa0 [ 3522.531729][T24608] __pte_alloc+0x2d/0x220 [ 3522.536074][T24608] copy_page_range+0x151a/0x1a80 [ 3522.541037][T24608] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3522.546692][T24608] ? __vma_link_rb+0x3f4/0x440 [ 3522.551470][T24608] dup_mm+0x74a/0xba0 [ 3522.555464][T24608] copy_process+0x36f3/0x3b50 [ 3522.560215][T24608] _do_fork+0xfe/0x6e0 [ 3522.564355][T24608] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3522.570032][T24608] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3522.575971][T24608] ? __tsan_read8+0x2c/0x30 [ 3522.580520][T24608] __x64_sys_clone+0x12b/0x160 [ 3522.585325][T24608] do_syscall_64+0xcc/0x370 [ 3522.589866][T24608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3522.595772][T24608] RIP: 0033:0x459f49 [ 3522.599701][T24608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3522.619473][T24608] RSP: 002b:00007f28db6a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3522.627980][T24608] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3522.635968][T24608] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3522.643954][T24608] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3522.651939][T24608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28db6a86d4 [ 3522.659916][T24608] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3522.701992][T24608] memory: usage 307200kB, limit 307200kB, failcnt 13932 [ 3522.709704][T24608] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3522.716682][T24608] Memory cgroup stats for /syz1: [ 3522.718504][T24608] anon 248762368 [ 3522.718504][T24608] file 1146880 [ 3522.718504][T24608] kernel_stack 5566464 [ 3522.718504][T24608] slab 12333056 [ 3522.718504][T24608] sock 0 [ 3522.718504][T24608] shmem 1351680 [ 3522.718504][T24608] file_mapped 0 [ 3522.718504][T24608] file_dirty 0 [ 3522.718504][T24608] file_writeback 0 [ 3522.718504][T24608] anon_thp 205520896 [ 3522.718504][T24608] inactive_anon 135168 [ 3522.718504][T24608] active_anon 249757696 [ 3522.718504][T24608] inactive_file 0 [ 3522.718504][T24608] active_file 40960 [ 3522.718504][T24608] unevictable 0 [ 3522.718504][T24608] slab_reclaimable 1351680 [ 3522.718504][T24608] slab_unreclaimable 10981376 [ 3522.718504][T24608] pgfault 202158 [ 3522.718504][T24608] pgmajfault 0 [ 3522.718504][T24608] workingset_refault 2277 [ 3522.718504][T24608] workingset_activate 165 23:33:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3522.718504][T24608] workingset_nodereclaim 0 [ 3522.718504][T24608] pgrefill 3919 [ 3522.718504][T24608] pgscan 63516 [ 3522.718504][T24608] pgsteal 12901 [ 3522.815496][T24608] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=24468,uid=0 [ 3522.832057][T24608] Memory cgroup out of memory: Killed process 24468 (syz-executor.1) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 3522.912466][T24551] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3522.944703][T24551] CPU: 0 PID: 24551 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3522.952645][T24551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3522.962720][T24551] Call Trace: [ 3522.966116][T24551] dump_stack+0xf5/0x159 [ 3522.970501][T24551] dump_header+0xaa/0x449 [ 3522.974945][T24551] oom_kill_process.cold+0x10/0x15 [ 3522.980112][T24551] out_of_memory+0x231/0xa00 [ 3522.984710][T24551] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3522.990402][T24551] mem_cgroup_out_of_memory+0x128/0x150 [ 3522.995970][T24551] try_charge+0xb3a/0xbc0 [ 3523.000376][T24551] ? get_page_from_freelist+0x8c0/0x1650 [ 3523.006017][T24551] ? __tsan_write4+0x32/0x40 [ 3523.010617][T24551] ? __rcu_read_unlock+0x66/0x3c0 [ 3523.015680][T24551] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3523.021173][T24551] __memcg_kmem_charge+0xde/0x240 [ 3523.026332][T24551] __alloc_pages_nodemask+0x26c/0x310 [ 3523.031838][T24551] alloc_pages_current+0xd1/0x170 [ 3523.036962][T24551] pte_alloc_one+0x30/0xa0 [ 3523.041681][T24551] __pte_alloc+0x2d/0x220 [ 3523.046049][T24551] copy_page_range+0x151a/0x1a80 [ 3523.050999][T24551] ? __kcsan_setup_watchpoint+0x268/0x4a0 [ 3523.056796][T24551] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3523.062432][T24551] ? __vma_link_rb+0x3f4/0x440 [ 3523.067265][T24551] dup_mm+0x74a/0xba0 [ 3523.071263][T24551] copy_process+0x36f3/0x3b50 [ 3523.076045][T24551] _do_fork+0xfe/0x6e0 [ 3523.080159][T24551] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3523.085809][T24551] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3523.091433][T24551] ? __tsan_read8+0x2c/0x30 [ 3523.096044][T24551] __x64_sys_clone+0x12b/0x160 [ 3523.100887][T24551] do_syscall_64+0xcc/0x370 [ 3523.105406][T24551] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3523.111297][T24551] RIP: 0033:0x459f49 [ 3523.115234][T24551] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3523.134841][T24551] RSP: 002b:00007f46fbab6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3523.143282][T24551] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3523.151259][T24551] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3523.159345][T24551] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3523.167350][T24551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46fbab76d4 [ 3523.175312][T24551] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:33:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3523.448262][T24551] memory: usage 307200kB, limit 307200kB, failcnt 22064 [ 3523.455349][T24551] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3523.463187][T24551] Memory cgroup stats for /syz4: [ 3523.465168][T24551] anon 242851840 [ 3523.465168][T24551] file 651264 [ 3523.465168][T24551] kernel_stack 6193152 [ 3523.465168][T24551] slab 13692928 [ 3523.465168][T24551] sock 0 [ 3523.465168][T24551] shmem 696320 [ 3523.465168][T24551] file_mapped 0 [ 3523.465168][T24551] file_dirty 0 [ 3523.465168][T24551] file_writeback 0 [ 3523.465168][T24551] anon_thp 186646528 [ 3523.465168][T24551] inactive_anon 0 [ 3523.465168][T24551] active_anon 243462144 [ 3523.465168][T24551] inactive_file 61440 [ 3523.465168][T24551] active_file 0 [ 3523.465168][T24551] unevictable 0 [ 3523.465168][T24551] slab_reclaimable 1892352 [ 3523.465168][T24551] slab_unreclaimable 11800576 [ 3523.465168][T24551] pgfault 237171 [ 3523.465168][T24551] pgmajfault 0 [ 3523.465168][T24551] workingset_refault 429 [ 3523.465168][T24551] workingset_activate 165 [ 3523.465168][T24551] workingset_nodereclaim 0 [ 3523.465168][T24551] pgrefill 8128 [ 3523.465168][T24551] pgscan 35562 [ 3523.465168][T24551] pgsteal 14304 [ 3523.560058][T24551] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24485,uid=0 [ 3523.575818][T24551] Memory cgroup out of memory: Killed process 24485 (syz-executor.4) total-vm:72716kB, anon-rss:4212kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 23:33:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[0x0]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3523.708821][ T1061] oom_reaper: reaped process 24485 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 23:33:43 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3524.025801][T24619] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3524.076249][T24619] CPU: 1 PID: 24619 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3524.084240][T24619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3524.094307][T24619] Call Trace: [ 3524.097661][T24619] dump_stack+0xf5/0x159 [ 3524.101935][T24619] dump_header+0xaa/0x449 [ 3524.106297][T24619] oom_kill_process.cold+0x10/0x15 [ 3524.111444][T24619] out_of_memory+0x231/0xa00 [ 3524.116055][T24619] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3524.121807][T24619] mem_cgroup_out_of_memory+0x128/0x150 [ 3524.127457][T24619] try_charge+0xb3a/0xbc0 [ 3524.131942][T24619] ? get_page_from_freelist+0x8c0/0x1650 [ 3524.137604][T24619] ? __tsan_write4+0x32/0x40 [ 3524.142217][T24619] ? __rcu_read_unlock+0x66/0x3c0 [ 3524.147291][T24619] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3524.152779][T24619] __memcg_kmem_charge+0xde/0x240 [ 3524.157891][T24619] __alloc_pages_nodemask+0x26c/0x310 [ 3524.163305][T24619] alloc_pages_current+0xd1/0x170 [ 3524.168394][T24619] pte_alloc_one+0x30/0xa0 [ 3524.172841][T24619] __pte_alloc+0x2d/0x220 [ 3524.177194][T24619] copy_page_range+0x151a/0x1a80 [ 3524.182185][T24619] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3524.187839][T24619] ? __vma_link_rb+0x3f4/0x440 [ 3524.192677][T24619] dup_mm+0x74a/0xba0 [ 3524.196748][T24619] copy_process+0x36f3/0x3b50 [ 3524.201547][T24619] _do_fork+0xfe/0x6e0 [ 3524.205635][T24619] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3524.211288][T24619] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3524.216985][T24619] ? __tsan_read8+0x2c/0x30 [ 3524.221528][T24619] __x64_sys_clone+0x12b/0x160 [ 3524.226402][T24619] do_syscall_64+0xcc/0x370 [ 3524.230935][T24619] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3524.236840][T24619] RIP: 0033:0x459f49 [ 3524.240766][T24619] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3524.260399][T24619] RSP: 002b:00007fc56dd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3524.268826][T24619] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3524.276811][T24619] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3524.284860][T24619] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3524.292945][T24619] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc56dd116d4 [ 3524.301087][T24619] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:33:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[0x0]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) 23:33:43 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:43 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x0, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3524.762680][T24619] memory: usage 307200kB, limit 307200kB, failcnt 18409 [ 3524.775532][T24619] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3524.784424][T24619] Memory cgroup stats for /syz2: [ 3524.784784][T24619] anon 250523648 [ 3524.784784][T24619] file 139264 [ 3524.784784][T24619] kernel_stack 5787648 [ 3524.784784][T24619] slab 12312576 [ 3524.784784][T24619] sock 28672 [ 3524.784784][T24619] shmem 151552 [ 3524.784784][T24619] file_mapped 0 [ 3524.784784][T24619] file_dirty 0 [ 3524.784784][T24619] file_writeback 0 [ 3524.784784][T24619] anon_thp 207618048 [ 3524.784784][T24619] inactive_anon 196608 [ 3524.784784][T24619] active_anon 250507264 [ 3524.784784][T24619] inactive_file 131072 [ 3524.784784][T24619] active_file 0 [ 3524.784784][T24619] unevictable 135168 [ 3524.784784][T24619] slab_reclaimable 1622016 [ 3524.784784][T24619] slab_unreclaimable 10690560 [ 3524.784784][T24619] pgfault 266673 [ 3524.784784][T24619] pgmajfault 0 [ 3524.784784][T24619] workingset_refault 297 23:33:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3524.784784][T24619] workingset_activate 99 [ 3524.784784][T24619] workingset_nodereclaim 0 [ 3524.784784][T24619] pgrefill 4304 [ 3524.784784][T24619] pgscan 34789 [ 3524.784784][T24619] pgsteal 30898 23:33:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, &(0x7f00000006c0)) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3525.036286][T24619] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=21260,uid=0 [ 3525.072998][T24619] Memory cgroup out of memory: Killed process 21260 (syz-executor.2) total-vm:72716kB, anon-rss:2208kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 3525.182995][T24744] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3525.197190][T24744] CPU: 1 PID: 24744 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3525.205118][T24744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3525.215261][T24744] Call Trace: [ 3525.218577][T24744] dump_stack+0xf5/0x159 [ 3525.222853][T24744] dump_header+0xaa/0x449 [ 3525.227345][T24744] oom_kill_process.cold+0x10/0x15 [ 3525.232482][T24744] out_of_memory+0x231/0xa00 [ 3525.237157][T24744] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3525.242828][T24744] mem_cgroup_out_of_memory+0x128/0x150 [ 3525.248415][T24744] try_charge+0xb3a/0xbc0 [ 3525.252779][T24744] ? rcu_note_context_switch+0x700/0x760 [ 3525.258440][T24744] mem_cgroup_try_charge+0xd2/0x260 [ 3525.263669][T24744] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3525.269327][T24744] wp_page_copy+0x322/0x1160 [ 3525.274001][T24744] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3525.279674][T24744] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3525.285375][T24744] do_wp_page+0x192/0x11f0 [ 3525.289814][T24744] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3525.295532][T24744] __handle_mm_fault+0x1c07/0x2cb0 [ 3525.300749][T24744] handle_mm_fault+0x21b/0x530 [ 3525.305543][T24744] __do_page_fault+0x3fb/0x9e0 [ 3525.310347][T24744] do_page_fault+0x54/0x233 [ 3525.314877][T24744] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3525.320676][T24744] page_fault+0x34/0x40 [ 3525.324840][T24744] RIP: 0033:0x40d15f [ 3525.328897][T24744] Code: 00 00 48 63 eb 74 0f 81 fb e7 03 00 00 b8 e8 03 00 00 48 0f 4e e8 e8 70 54 ff ff bb e8 03 00 00 49 89 c5 4c 8d 74 05 00 eb 10 5c 54 ff ff 48 89 c2 4c 29 ea 48 39 d5 72 52 4c 89 f1 31 d2 4c [ 3525.348522][T24744] RSP: 002b:00007ffdf09f9100 EFLAGS: 00010246 [ 3525.354601][T24744] RAX: 0000000000000000 RBX: 00000000000003e8 RCX: 0000000000459f49 [ 3525.362602][T24744] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf2c [ 3525.370605][T24744] RBP: 000000000000002d R08: ffffffffffffffff R09: ffffffffffffffff [ 3525.378676][T24744] R10: 00007ffdf09f91d0 R11: 0000000000000246 R12: 000000000075bf20 [ 3525.386681][T24744] R13: 000000000035c846 R14: 000000000035c873 R15: 000000000075bf2c 23:33:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, &(0x7f00000006c0)) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3525.539834][T24744] memory: usage 307168kB, limit 307200kB, failcnt 22112 [ 3525.556446][T24744] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3525.573483][T24744] Memory cgroup stats for /syz4: [ 3525.573785][T24744] anon 242884608 [ 3525.573785][T24744] file 651264 [ 3525.573785][T24744] kernel_stack 6193152 [ 3525.573785][T24744] slab 13692928 [ 3525.573785][T24744] sock 0 [ 3525.573785][T24744] shmem 696320 [ 3525.573785][T24744] file_mapped 0 [ 3525.573785][T24744] file_dirty 0 [ 3525.573785][T24744] file_writeback 0 [ 3525.573785][T24744] anon_thp 186646528 [ 3525.573785][T24744] inactive_anon 0 [ 3525.573785][T24744] active_anon 243494912 [ 3525.573785][T24744] inactive_file 61440 [ 3525.573785][T24744] active_file 0 [ 3525.573785][T24744] unevictable 0 [ 3525.573785][T24744] slab_reclaimable 1892352 [ 3525.573785][T24744] slab_unreclaimable 11800576 [ 3525.573785][T24744] pgfault 237270 [ 3525.573785][T24744] pgmajfault 0 [ 3525.573785][T24744] workingset_refault 429 [ 3525.573785][T24744] workingset_activate 165 [ 3525.573785][T24744] workingset_nodereclaim 0 [ 3525.573785][T24744] pgrefill 8128 [ 3525.573785][T24744] pgscan 35562 [ 3525.573785][T24744] pgsteal 14304 23:33:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, &(0x7f00000006c0)) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3525.837267][T24744] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24755,uid=0 23:33:45 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x0, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) 23:33:45 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3526.000750][T24744] Memory cgroup out of memory: Killed process 24755 (syz-executor.4) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 23:33:45 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:45 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3526.192328][T24745] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 23:33:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, &(0x7f00000006c0)) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3526.422414][T24745] CPU: 0 PID: 24745 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3526.431887][T24745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3526.441988][T24745] Call Trace: [ 3526.445388][T24745] dump_stack+0xf5/0x159 [ 3526.449665][T24745] dump_header+0xaa/0x449 [ 3526.454033][T24745] oom_kill_process.cold+0x10/0x15 [ 3526.459206][T24745] out_of_memory+0x231/0xa00 [ 3526.463846][T24745] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3526.469563][T24745] mem_cgroup_out_of_memory+0x128/0x150 [ 3526.475186][T24745] try_charge+0x8c1/0xbc0 [ 3526.479563][T24745] ? rcu_note_context_switch+0x700/0x760 [ 3526.485241][T24745] mem_cgroup_try_charge+0xd2/0x260 [ 3526.490478][T24745] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3526.496158][T24745] wp_page_copy+0x322/0x1160 [ 3526.500853][T24745] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3526.506589][T24745] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3526.512265][T24745] do_wp_page+0x192/0x11f0 [ 3526.516703][T24745] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3526.522362][T24745] __handle_mm_fault+0x1c07/0x2cb0 [ 3526.527588][T24745] handle_mm_fault+0x21b/0x530 [ 3526.532417][T24745] __do_page_fault+0x3fb/0x9e0 [ 3526.537297][T24745] do_page_fault+0x54/0x233 [ 3526.541843][T24745] ? do_syscall_64+0x270/0x370 [ 3526.546639][T24745] page_fault+0x34/0x40 [ 3526.550806][T24745] RIP: 0033:0x40529e [ 3526.554753][T24745] Code: 48 8b 55 40 48 8b 75 38 48 8b 7d 30 ff 75 70 ff 75 68 ff 75 60 4c 8b 4d 58 4c 8b 45 50 ff d0 48 83 c4 20 48 89 c3 48 83 fb ff <48> 89 5d 78 41 8b 04 24 0f 85 d4 00 00 00 85 c0 0f 85 cc 00 00 00 [ 3526.574387][T24745] RSP: 002b:00007f46fbab6c90 EFLAGS: 00010217 [ 3526.580476][T24745] RAX: 0000000000000000 RBX: 0000000000002041 RCX: 0000000000459f49 [ 3526.588518][T24745] RDX: 0000000000405256 RSI: 0000000000000000 RDI: 0000000000000000 [ 3526.596517][T24745] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3526.604505][T24745] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46fbab76d4 [ 3526.612506][T24745] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3526.823513][T24745] memory: usage 307024kB, limit 307200kB, failcnt 22112 [ 3526.831123][T24745] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3526.838371][T24745] Memory cgroup stats for /syz4: [ 3526.840138][T24745] anon 242884608 [ 3526.840138][T24745] file 651264 [ 3526.840138][T24745] kernel_stack 6193152 [ 3526.840138][T24745] slab 13692928 [ 3526.840138][T24745] sock 0 [ 3526.840138][T24745] shmem 696320 [ 3526.840138][T24745] file_mapped 0 [ 3526.840138][T24745] file_dirty 0 [ 3526.840138][T24745] file_writeback 0 [ 3526.840138][T24745] anon_thp 186646528 [ 3526.840138][T24745] inactive_anon 0 [ 3526.840138][T24745] active_anon 243494912 [ 3526.840138][T24745] inactive_file 61440 [ 3526.840138][T24745] active_file 0 [ 3526.840138][T24745] unevictable 0 [ 3526.840138][T24745] slab_reclaimable 1892352 [ 3526.840138][T24745] slab_unreclaimable 11800576 [ 3526.840138][T24745] pgfault 237270 [ 3526.840138][T24745] pgmajfault 0 [ 3526.840138][T24745] workingset_refault 429 [ 3526.840138][T24745] workingset_activate 165 [ 3526.840138][T24745] workingset_nodereclaim 0 [ 3526.840138][T24745] pgrefill 8128 [ 3526.840138][T24745] pgscan 35562 [ 3526.840138][T24745] pgsteal 14304 [ 3526.935977][T24745] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24744,uid=0 [ 3526.952737][T24745] Memory cgroup out of memory: Killed process 24744 (syz-executor.4) total-vm:72584kB, anon-rss:4212kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 3526.991355][ T1061] oom_reaper: reaped process 24744 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3527.005090][T24982] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3527.043475][T24982] CPU: 1 PID: 24982 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3527.051570][T24982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3527.061735][T24982] Call Trace: [ 3527.065045][T24982] dump_stack+0xf5/0x159 [ 3527.069341][T24982] dump_header+0xaa/0x449 [ 3527.073770][T24982] oom_kill_process.cold+0x10/0x15 [ 3527.078934][T24982] out_of_memory+0x231/0xa00 [ 3527.083534][T24982] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3527.089260][T24982] mem_cgroup_out_of_memory+0x128/0x150 [ 3527.094884][T24982] try_charge+0xb3a/0xbc0 [ 3527.099297][T24982] ? get_page_from_freelist+0x8c0/0x1650 [ 3527.104982][T24982] ? __tsan_write4+0x32/0x40 [ 3527.109584][T24982] ? __rcu_read_unlock+0x66/0x3c0 [ 3527.114716][T24982] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3527.120474][T24982] __memcg_kmem_charge+0xde/0x240 [ 3527.125535][T24982] __alloc_pages_nodemask+0x26c/0x310 [ 3527.130955][T24982] alloc_pages_current+0xd1/0x170 [ 3527.136008][T24982] pte_alloc_one+0x30/0xa0 [ 3527.140458][T24982] __pte_alloc+0x2d/0x220 [ 3527.144828][T24982] copy_page_range+0x151a/0x1a80 [ 3527.149858][T24982] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3527.155513][T24982] ? __vma_link_rb+0x3f4/0x440 [ 3527.160361][T24982] dup_mm+0x74a/0xba0 [ 3527.164403][T24982] copy_process+0x36f3/0x3b50 [ 3527.169134][T24982] _do_fork+0xfe/0x6e0 [ 3527.173276][T24982] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3527.178905][T24982] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3527.184557][T24982] ? __tsan_read8+0x2c/0x30 [ 3527.189076][T24982] __x64_sys_clone+0x12b/0x160 [ 3527.193921][T24982] do_syscall_64+0xcc/0x370 [ 3527.198531][T24982] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3527.204432][T24982] RIP: 0033:0x459f49 [ 3527.208339][T24982] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3527.228021][T24982] RSP: 002b:00007fc56dd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3527.236436][T24982] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3527.244412][T24982] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3527.252409][T24982] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3527.260384][T24982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc56dd116d4 [ 3527.268367][T24982] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3527.287503][T24982] memory: usage 307200kB, limit 307200kB, failcnt 18453 23:33:46 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:46 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3527.307492][T24982] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3527.318360][T24982] Memory cgroup stats for /syz2: [ 3527.318672][T24982] anon 250523648 [ 3527.318672][T24982] file 139264 [ 3527.318672][T24982] kernel_stack 5787648 [ 3527.318672][T24982] slab 12447744 [ 3527.318672][T24982] sock 28672 [ 3527.318672][T24982] shmem 151552 [ 3527.318672][T24982] file_mapped 0 [ 3527.318672][T24982] file_dirty 0 [ 3527.318672][T24982] file_writeback 0 [ 3527.318672][T24982] anon_thp 207618048 [ 3527.318672][T24982] inactive_anon 196608 [ 3527.318672][T24982] active_anon 250507264 [ 3527.318672][T24982] inactive_file 131072 [ 3527.318672][T24982] active_file 0 [ 3527.318672][T24982] unevictable 135168 [ 3527.318672][T24982] slab_reclaimable 1622016 [ 3527.318672][T24982] slab_unreclaimable 10825728 [ 3527.318672][T24982] pgfault 266871 [ 3527.318672][T24982] pgmajfault 0 [ 3527.318672][T24982] workingset_refault 297 [ 3527.318672][T24982] workingset_activate 99 23:33:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, 0x0) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3527.318672][T24982] workingset_nodereclaim 0 [ 3527.318672][T24982] pgrefill 4304 [ 3527.318672][T24982] pgscan 34789 [ 3527.318672][T24982] pgsteal 30898 23:33:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x0, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3527.476314][T24982] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=15878,uid=0 [ 3527.517098][T24982] Memory cgroup out of memory: Killed process 15878 (syz-executor.2) total-vm:72716kB, anon-rss:2208kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 3527.773602][T24980] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3527.827126][T24980] CPU: 0 PID: 24980 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 3527.835069][T24980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3527.845135][T24980] Call Trace: [ 3527.848480][T24980] dump_stack+0xf5/0x159 [ 3527.852759][T24980] dump_header+0xaa/0x449 [ 3527.857132][T24980] oom_kill_process.cold+0x10/0x15 [ 3527.862315][T24980] out_of_memory+0x231/0xa00 [ 3527.866960][T24980] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3527.872651][T24980] mem_cgroup_out_of_memory+0x128/0x150 [ 3527.878280][T24980] try_charge+0xb3a/0xbc0 [ 3527.882640][T24980] ? __tsan_write4+0x32/0x40 [ 3527.887257][T24980] ? apic_timer_interrupt+0xa/0x20 [ 3527.892409][T24980] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3527.897898][T24980] __memcg_kmem_charge+0xde/0x240 [ 3527.902978][T24980] __alloc_pages_nodemask+0x26c/0x310 [ 3527.908421][T24980] alloc_pages_current+0xd1/0x170 [ 3527.913470][T24980] pte_alloc_one+0x30/0xa0 [ 3527.917974][T24980] __pte_alloc+0x2d/0x220 [ 3527.922338][T24980] copy_page_range+0x151a/0x1a80 [ 3527.927367][T24980] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3527.933074][T24980] ? __vma_link_rb+0x3f4/0x440 [ 3527.938050][T24980] dup_mm+0x74a/0xba0 [ 3527.942137][T24980] copy_process+0x36f3/0x3b50 [ 3527.946943][T24980] _do_fork+0xfe/0x6e0 [ 3527.951068][T24980] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3527.956730][T24980] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3527.962395][T24980] ? apic_timer_interrupt+0xa/0x20 [ 3527.967601][T24980] __x64_sys_clone+0x12b/0x160 [ 3527.972417][T24980] do_syscall_64+0xcc/0x370 [ 3527.976960][T24980] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3527.982902][T24980] RIP: 0033:0x459f49 [ 3527.986865][T24980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3528.006502][T24980] RSP: 002b:00007f28db6a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3528.015007][T24980] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 23:33:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r2 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3528.022999][T24980] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3528.031045][T24980] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3528.039133][T24980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28db6a86d4 [ 3528.047116][T24980] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3528.096842][T24980] memory: usage 307200kB, limit 307200kB, failcnt 13967 [ 3528.106026][T24980] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3528.114080][T24980] Memory cgroup stats for /syz1: [ 3528.115944][T24980] anon 248643584 [ 3528.115944][T24980] file 1146880 [ 3528.115944][T24980] kernel_stack 5603328 [ 3528.115944][T24980] slab 12333056 [ 3528.115944][T24980] sock 0 [ 3528.115944][T24980] shmem 1351680 [ 3528.115944][T24980] file_mapped 0 [ 3528.115944][T24980] file_dirty 0 [ 3528.115944][T24980] file_writeback 0 [ 3528.115944][T24980] anon_thp 205520896 [ 3528.115944][T24980] inactive_anon 135168 [ 3528.115944][T24980] active_anon 249692160 [ 3528.115944][T24980] inactive_file 0 [ 3528.115944][T24980] active_file 40960 [ 3528.115944][T24980] unevictable 0 [ 3528.115944][T24980] slab_reclaimable 1351680 [ 3528.115944][T24980] slab_unreclaimable 10981376 [ 3528.115944][T24980] pgfault 202455 [ 3528.115944][T24980] pgmajfault 0 [ 3528.115944][T24980] workingset_refault 2277 [ 3528.115944][T24980] workingset_activate 165 23:33:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3528.115944][T24980] workingset_nodereclaim 0 [ 3528.115944][T24980] pgrefill 3919 [ 3528.115944][T24980] pgscan 63516 [ 3528.115944][T24980] pgsteal 12901 [ 3528.222372][T24980] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=24610,uid=0 23:33:47 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3528.238943][T24980] Memory cgroup out of memory: Killed process 24610 (syz-executor.1) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 23:33:47 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r1 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r1}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r2, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3528.398526][T25089] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3528.450269][T25089] CPU: 1 PID: 25089 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3528.458226][T25089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3528.468289][T25089] Call Trace: [ 3528.471646][T25089] dump_stack+0xf5/0x159 [ 3528.475924][T25089] dump_header+0xaa/0x449 [ 3528.480441][T25089] oom_kill_process.cold+0x10/0x15 [ 3528.485594][T25089] out_of_memory+0x231/0xa00 [ 3528.490248][T25089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3528.496004][T25089] mem_cgroup_out_of_memory+0x128/0x150 [ 3528.501607][T25089] try_charge+0xb3a/0xbc0 [ 3528.505969][T25089] ? rcu_note_context_switch+0x700/0x760 [ 3528.511640][T25089] mem_cgroup_try_charge+0xd2/0x260 [ 3528.516870][T25089] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3528.522561][T25089] wp_page_copy+0x322/0x1160 [ 3528.527174][T25089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3528.532833][T25089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3528.538500][T25089] do_wp_page+0x192/0x11f0 [ 3528.542976][T25089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3528.548750][T25089] __handle_mm_fault+0x1c07/0x2cb0 [ 3528.553948][T25089] handle_mm_fault+0x21b/0x530 [ 3528.558768][T25089] __do_page_fault+0x3fb/0x9e0 [ 3528.563576][T25089] do_page_fault+0x54/0x233 [ 3528.568161][T25089] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3528.573911][T25089] page_fault+0x34/0x40 [ 3528.578081][T25089] RIP: 0033:0x43362e [ 3528.582003][T25089] Code: 15 eb 36 64 00 4c 89 c0 85 d2 0f 85 74 01 00 00 48 83 c4 08 5b 5d 41 5c 41 5d c3 90 be 01 00 00 00 83 3d 9c 4e 64 00 00 74 08 0f b1 33 75 07 eb 1b 0f b1 33 74 16 48 8d 3b 48 81 ec 80 00 00 [ 3528.601634][T25089] RSP: 002b:00007ffdf09f8fc0 EFLAGS: 00010202 [ 3528.607718][T25089] RAX: 0000000000000000 RBX: 0000000000716640 RCX: 0000000000459f9a [ 3528.615699][T25089] RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000011 [ 3528.623687][T25089] RBP: 0000000000000110 R08: ffffffffffffffff R09: 0000000000000000 [ 3528.631677][T25089] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdf09f91e0 [ 3528.639710][T25089] R13: 00007f46fba96700 R14: 0000000000000001 R15: 000000000075bfd4 [ 3528.694654][T25089] memory: usage 307200kB, limit 307200kB, failcnt 22149 [ 3528.703038][T25089] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3528.726561][T25089] Memory cgroup stats for /syz4: [ 3528.726871][T25089] anon 242880512 [ 3528.726871][T25089] file 651264 [ 3528.726871][T25089] kernel_stack 6156288 [ 3528.726871][T25089] slab 13692928 [ 3528.726871][T25089] sock 0 [ 3528.726871][T25089] shmem 696320 [ 3528.726871][T25089] file_mapped 0 [ 3528.726871][T25089] file_dirty 0 [ 3528.726871][T25089] file_writeback 0 [ 3528.726871][T25089] anon_thp 186646528 [ 3528.726871][T25089] inactive_anon 0 [ 3528.726871][T25089] active_anon 243490816 [ 3528.726871][T25089] inactive_file 61440 [ 3528.726871][T25089] active_file 0 [ 3528.726871][T25089] unevictable 0 [ 3528.726871][T25089] slab_reclaimable 1892352 [ 3528.726871][T25089] slab_unreclaimable 11800576 [ 3528.726871][T25089] pgfault 237336 [ 3528.726871][T25089] pgmajfault 0 [ 3528.726871][T25089] workingset_refault 429 [ 3528.726871][T25089] workingset_activate 165 [ 3528.726871][T25089] workingset_nodereclaim 0 [ 3528.726871][T25089] pgrefill 8128 [ 3528.726871][T25089] pgscan 35562 [ 3528.726871][T25089] pgsteal 14304 23:33:48 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, 0x0) 23:33:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x0, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map={0x7}}) [ 3528.987093][T25089] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25199,uid=0 23:33:48 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r1 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r1}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r2, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3529.093738][T25089] Memory cgroup out of memory: Killed process 25199 (syz-executor.4) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 3529.125074][ T1061] oom_reaper: reaped process 25199 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 23:33:49 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:49 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:49 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:49 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r1 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r1}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r2, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:49 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, 0x0) 23:33:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x140) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x3895) dup3(r1, r0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffc64}, 0x2) [ 3530.359314][T25555] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3530.475132][T25555] CPU: 1 PID: 25555 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3530.483135][T25555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3530.493193][T25555] Call Trace: [ 3530.496576][T25555] dump_stack+0xf5/0x159 [ 3530.500867][T25555] dump_header+0xaa/0x449 [ 3530.505229][T25555] oom_kill_process.cold+0x10/0x15 [ 3530.510398][T25555] out_of_memory+0x231/0xa00 [ 3530.515078][T25555] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3530.520812][T25555] mem_cgroup_out_of_memory+0x128/0x150 [ 3530.526435][T25555] try_charge+0xb3a/0xbc0 [ 3530.530821][T25555] ? rcu_note_context_switch+0x700/0x760 [ 3530.536490][T25555] mem_cgroup_try_charge+0xd2/0x260 [ 3530.541750][T25555] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3530.547477][T25555] wp_page_copy+0x322/0x1160 [ 3530.552093][T25555] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3530.557754][T25555] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3530.563439][T25555] do_wp_page+0x192/0x11f0 [ 3530.567877][T25555] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3530.573550][T25555] __handle_mm_fault+0x1c07/0x2cb0 [ 3530.578704][T25555] handle_mm_fault+0x21b/0x530 [ 3530.583523][T25555] __do_page_fault+0x3fb/0x9e0 [ 3530.588319][T25555] do_page_fault+0x54/0x233 [ 3530.592932][T25555] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3530.598742][T25555] page_fault+0x34/0x40 [ 3530.602909][T25555] RIP: 0033:0x43362e 23:33:50 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3530.606840][T25555] Code: 15 eb 36 64 00 4c 89 c0 85 d2 0f 85 74 01 00 00 48 83 c4 08 5b 5d 41 5c 41 5d c3 90 be 01 00 00 00 83 3d 9c 4e 64 00 00 74 08 0f b1 33 75 07 eb 1b 0f b1 33 74 16 48 8d 3b 48 81 ec 80 00 00 [ 3530.626469][T25555] RSP: 002b:00007ffdf09f8fc0 EFLAGS: 00010202 [ 3530.632557][T25555] RAX: 0000000000000000 RBX: 0000000000716640 RCX: 0000000000459f9a [ 3530.640552][T25555] RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000011 [ 3530.648611][T25555] RBP: 0000000000000110 R08: ffffffffffffffff R09: 0000000000000000 [ 3530.656609][T25555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdf09f91e0 [ 3530.664639][T25555] R13: 00007f46fba96700 R14: 0000000000000001 R15: 000000000075bfd4 [ 3530.689402][T25555] memory: usage 307200kB, limit 307200kB, failcnt 22225 [ 3530.696807][T25555] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3530.704540][T25555] Memory cgroup stats for /syz4: [ 3530.704810][T25555] anon 242851840 [ 3530.704810][T25555] file 651264 [ 3530.704810][T25555] kernel_stack 6193152 [ 3530.704810][T25555] slab 13692928 [ 3530.704810][T25555] sock 0 [ 3530.704810][T25555] shmem 696320 [ 3530.704810][T25555] file_mapped 0 [ 3530.704810][T25555] file_dirty 0 [ 3530.704810][T25555] file_writeback 0 [ 3530.704810][T25555] anon_thp 186646528 [ 3530.704810][T25555] inactive_anon 0 [ 3530.704810][T25555] active_anon 243462144 [ 3530.704810][T25555] inactive_file 61440 [ 3530.704810][T25555] active_file 0 [ 3530.704810][T25555] unevictable 0 [ 3530.704810][T25555] slab_reclaimable 1892352 [ 3530.704810][T25555] slab_unreclaimable 11800576 [ 3530.704810][T25555] pgfault 237435 [ 3530.704810][T25555] pgmajfault 0 [ 3530.704810][T25555] workingset_refault 429 [ 3530.704810][T25555] workingset_activate 165 [ 3530.704810][T25555] workingset_nodereclaim 0 [ 3530.704810][T25555] pgrefill 8128 [ 3530.704810][T25555] pgscan 35562 [ 3530.704810][T25555] pgsteal 14304 [ 3530.993203][T25555] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25564,uid=0 [ 3531.015699][T25555] Memory cgroup out of memory: Killed process 25564 (syz-executor.4) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 23:33:50 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3531.051925][ T1061] oom_reaper: reaped process 25564 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 3531.472103][T25556] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3531.622375][T25556] CPU: 0 PID: 25556 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3531.630317][T25556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3531.640380][T25556] Call Trace: [ 3531.643717][T25556] dump_stack+0xf5/0x159 [ 3531.647993][T25556] dump_header+0xaa/0x449 [ 3531.654194][T25556] oom_kill_process.cold+0x10/0x15 [ 3531.659426][T25556] out_of_memory+0x231/0xa00 [ 3531.664101][T25556] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3531.669777][T25556] mem_cgroup_out_of_memory+0x128/0x150 [ 3531.675370][T25556] try_charge+0x8c1/0xbc0 [ 3531.679723][T25556] ? rcu_note_context_switch+0x700/0x760 [ 3531.685467][T25556] mem_cgroup_try_charge+0xd2/0x260 [ 3531.690696][T25556] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3531.696427][T25556] wp_page_copy+0x322/0x1160 [ 3531.701073][T25556] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3531.706800][T25556] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3531.712492][T25556] do_wp_page+0x192/0x11f0 [ 3531.716928][T25556] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3531.722598][T25556] __handle_mm_fault+0x1c07/0x2cb0 [ 3531.727752][T25556] handle_mm_fault+0x21b/0x530 [ 3531.732675][T25556] __do_page_fault+0x3fb/0x9e0 [ 3531.737502][T25556] do_page_fault+0x54/0x233 [ 3531.742037][T25556] ? do_syscall_64+0x270/0x370 [ 3531.746840][T25556] page_fault+0x34/0x40 [ 3531.751002][T25556] RIP: 0033:0x405308 23:33:51 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:51 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, 0x0) [ 3531.754922][T25556] Code: 85 02 00 00 80 3d 0f cf 66 00 00 c6 85 84 00 00 00 00 74 0f 8b 05 fc ce 66 00 39 45 24 0f 84 e7 01 00 00 44 8b a5 80 00 00 00 b3 d2 ff ff 48 2b 05 fc 2c 33 00 8b 75 00 49 89 d8 45 89 e1 4c [ 3531.774540][T25556] RSP: 002b:00007f46fbab6c90 EFLAGS: 00010246 [ 3531.780687][T25556] RAX: 00007f46fdab8000 RBX: 0000000000002048 RCX: 0000000000459f49 [ 3531.788658][T25556] RDX: 000000000003ffff RSI: 0000000000000000 RDI: 0000000000000000 [ 3531.796644][T25556] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3531.804640][T25556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3531.812677][T25556] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:33:51 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3532.710127][T25556] memory: usage 307032kB, limit 307200kB, failcnt 22232 [ 3532.718170][T25556] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3532.725976][T25556] Memory cgroup stats for /syz4: [ 3532.728223][T25556] anon 242851840 [ 3532.728223][T25556] file 651264 [ 3532.728223][T25556] kernel_stack 6193152 [ 3532.728223][T25556] slab 13692928 [ 3532.728223][T25556] sock 0 [ 3532.728223][T25556] shmem 696320 [ 3532.728223][T25556] file_mapped 0 [ 3532.728223][T25556] file_dirty 0 [ 3532.728223][T25556] file_writeback 0 [ 3532.728223][T25556] anon_thp 186646528 [ 3532.728223][T25556] inactive_anon 0 [ 3532.728223][T25556] active_anon 243462144 [ 3532.728223][T25556] inactive_file 61440 [ 3532.728223][T25556] active_file 0 [ 3532.728223][T25556] unevictable 0 [ 3532.728223][T25556] slab_reclaimable 1892352 [ 3532.728223][T25556] slab_unreclaimable 11800576 [ 3532.728223][T25556] pgfault 237435 [ 3532.728223][T25556] pgmajfault 0 [ 3532.728223][T25556] workingset_refault 429 [ 3532.728223][T25556] workingset_activate 165 [ 3532.728223][T25556] workingset_nodereclaim 0 [ 3532.728223][T25556] pgrefill 8128 [ 3532.728223][T25556] pgscan 35562 [ 3532.728223][T25556] pgsteal 14304 [ 3532.836941][T25556] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25555,uid=0 [ 3532.887918][T25556] Memory cgroup out of memory: Killed process 25556 (syz-executor.4) total-vm:72716kB, anon-rss:4260kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 3532.965462][ T1061] oom_reaper: reaped process 25556 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3532.978784][T25796] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3533.003170][T25796] CPU: 1 PID: 25796 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3533.011094][T25796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3533.021155][T25796] Call Trace: [ 3533.024508][T25796] dump_stack+0xf5/0x159 [ 3533.028788][T25796] dump_header+0xaa/0x449 [ 3533.033145][T25796] oom_kill_process.cold+0x10/0x15 [ 3533.038362][T25796] out_of_memory+0x231/0xa00 [ 3533.042965][T25796] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3533.048663][T25796] mem_cgroup_out_of_memory+0x128/0x150 [ 3533.054273][T25796] try_charge+0xb3a/0xbc0 [ 3533.058634][T25796] ? get_page_from_freelist+0x8c0/0x1650 [ 3533.064289][T25796] ? __tsan_write4+0x32/0x40 [ 3533.068904][T25796] ? __rcu_read_unlock+0x66/0x3c0 [ 3533.073978][T25796] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3533.079524][T25796] __memcg_kmem_charge+0xde/0x240 [ 3533.084582][T25796] __alloc_pages_nodemask+0x26c/0x310 [ 3533.090005][T25796] alloc_pages_current+0xd1/0x170 [ 3533.095063][T25796] pte_alloc_one+0x30/0xa0 [ 3533.099501][T25796] copy_huge_pmd+0x8f/0x780 [ 3533.104097][T25796] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3533.109815][T25796] copy_page_range+0x74c/0x1a80 [ 3533.114686][T25796] ? __tsan_write8+0x32/0x40 [ 3533.119364][T25796] dup_mm+0x74a/0xba0 [ 3533.123397][T25796] copy_process+0x36f3/0x3b50 [ 3533.128212][T25796] _do_fork+0xfe/0x6e0 [ 3533.132733][T25796] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3533.138441][T25796] ? __tsan_read8+0x2c/0x30 [ 3533.143007][T25796] __x64_sys_clone+0x12b/0x160 [ 3533.147812][T25796] do_syscall_64+0xcc/0x370 [ 3533.152411][T25796] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3533.158322][T25796] RIP: 0033:0x459f49 [ 3533.162328][T25796] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3533.182045][T25796] RSP: 002b:00007fc56dd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3533.190472][T25796] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3533.198473][T25796] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3533.206509][T25796] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3533.214514][T25796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc56dd116d4 [ 3533.222581][T25796] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3533.283819][T25796] memory: usage 307200kB, limit 307200kB, failcnt 18533 [ 3533.295471][T25796] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3533.308331][T25796] Memory cgroup stats for /syz2: [ 3533.309370][T25796] anon 250523648 [ 3533.309370][T25796] file 139264 [ 3533.309370][T25796] kernel_stack 5787648 [ 3533.309370][T25796] slab 12447744 [ 3533.309370][T25796] sock 28672 [ 3533.309370][T25796] shmem 151552 [ 3533.309370][T25796] file_mapped 0 [ 3533.309370][T25796] file_dirty 0 [ 3533.309370][T25796] file_writeback 0 [ 3533.309370][T25796] anon_thp 207618048 [ 3533.309370][T25796] inactive_anon 196608 [ 3533.309370][T25796] active_anon 250507264 [ 3533.309370][T25796] inactive_file 131072 [ 3533.309370][T25796] active_file 0 [ 3533.309370][T25796] unevictable 135168 [ 3533.309370][T25796] slab_reclaimable 1622016 [ 3533.309370][T25796] slab_unreclaimable 10825728 [ 3533.309370][T25796] pgfault 267234 [ 3533.309370][T25796] pgmajfault 0 [ 3533.309370][T25796] workingset_refault 297 [ 3533.309370][T25796] workingset_activate 99 [ 3533.309370][T25796] workingset_nodereclaim 0 [ 3533.309370][T25796] pgrefill 4337 [ 3533.309370][T25796] pgscan 34855 [ 3533.309370][T25796] pgsteal 30898 [ 3533.412621][T25796] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25765,uid=0 23:33:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:52 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:52 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map}) 23:33:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3533.434731][T25796] Memory cgroup out of memory: Killed process 25765 (syz-executor.2) total-vm:72584kB, anon-rss:2212kB, file-rss:35832kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 23:33:53 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3533.922042][T25815] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3533.985426][T25815] CPU: 0 PID: 25815 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3533.993358][T25815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3534.003418][T25815] Call Trace: [ 3534.006738][T25815] dump_stack+0xf5/0x159 [ 3534.011000][T25815] dump_header+0xaa/0x449 [ 3534.015345][T25815] oom_kill_process.cold+0x10/0x15 [ 3534.020470][T25815] out_of_memory+0x231/0xa00 [ 3534.025068][T25815] ? out_of_memory+0x10/0xa00 [ 3534.029806][T25815] mem_cgroup_out_of_memory+0x128/0x150 [ 3534.035388][T25815] try_charge+0xb3a/0xbc0 [ 3534.039736][T25815] ? get_page_from_freelist+0x8c0/0x1650 [ 3534.045504][T25815] ? __tsan_write4+0x32/0x40 [ 3534.050102][T25815] ? __rcu_read_unlock+0x66/0x3c0 [ 3534.055154][T25815] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3534.060629][T25815] __memcg_kmem_charge+0xde/0x240 [ 3534.065769][T25815] __alloc_pages_nodemask+0x26c/0x310 [ 3534.071163][T25815] alloc_pages_current+0xd1/0x170 [ 3534.076208][T25815] get_zeroed_page+0x14/0x50 [ 3534.080860][T25815] __pud_alloc+0x48/0x250 [ 3534.085206][T25815] copy_page_range+0x149f/0x1a80 [ 3534.090144][T25815] ? __tsan_write8+0x32/0x40 [ 3534.094737][T25815] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3534.100482][T25815] ? vma_gap_callbacks_rotate+0x126/0x190 [ 3534.106228][T25815] ? vm_get_page_prot+0x90/0x90 [ 3534.111177][T25815] dup_mm+0x74a/0xba0 [ 3534.115186][T25815] copy_process+0x36f3/0x3b50 [ 3534.119903][T25815] _do_fork+0xfe/0x6e0 [ 3534.123990][T25815] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3534.129640][T25815] __x64_sys_clone+0x12b/0x160 [ 3534.134492][T25815] do_syscall_64+0xcc/0x370 [ 3534.139009][T25815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3534.145013][T25815] RIP: 0033:0x459f49 [ 3534.149020][T25815] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3534.169842][T25815] RSP: 002b:00007fa9090b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3534.178300][T25815] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3534.186272][T25815] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3534.194256][T25815] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 3534.202231][T25815] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa9090b76d4 [ 3534.210316][T25815] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:33:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:33:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map}) 23:33:54 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3535.039511][T25815] memory: usage 307200kB, limit 307200kB, failcnt 9631 [ 3535.051000][T25815] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3535.060718][T25815] Memory cgroup stats for /syz0: [ 3535.063124][T25815] anon 264941568 [ 3535.063124][T25815] file 0 [ 3535.063124][T25815] kernel_stack 4386816 [ 3535.063124][T25815] slab 9998336 [ 3535.063124][T25815] sock 0 [ 3535.063124][T25815] shmem 73728 [ 3535.063124][T25815] file_mapped 135168 [ 3535.063124][T25815] file_dirty 0 [ 3535.063124][T25815] file_writeback 0 [ 3535.063124][T25815] anon_thp 232783872 [ 3535.063124][T25815] inactive_anon 0 [ 3535.063124][T25815] active_anon 264945664 [ 3535.063124][T25815] inactive_file 0 [ 3535.063124][T25815] active_file 28672 [ 3535.063124][T25815] unevictable 0 [ 3535.063124][T25815] slab_reclaimable 1216512 [ 3535.063124][T25815] slab_unreclaimable 8781824 [ 3535.063124][T25815] pgfault 237006 [ 3535.063124][T25815] pgmajfault 0 [ 3535.063124][T25815] workingset_refault 198 23:33:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3535.063124][T25815] workingset_activate 66 [ 3535.063124][T25815] workingset_nodereclaim 0 [ 3535.063124][T25815] pgrefill 3766 [ 3535.063124][T25815] pgscan 15683 [ 3535.063124][T25815] pgsteal 11708 23:33:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)="81", 0x1}]) dup3(r0, r1, 0x0) r3 = socket(0xa, 0x3, 0x5) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_map}) [ 3535.534696][T25815] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24741,uid=0 [ 3535.613150][T25815] Memory cgroup out of memory: Killed process 24741 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 23:33:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3535.880712][T25930] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3535.953462][T25930] CPU: 1 PID: 25930 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3535.961402][T25930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3535.971467][T25930] Call Trace: [ 3535.974825][T25930] dump_stack+0xf5/0x159 [ 3535.979117][T25930] dump_header+0xaa/0x449 [ 3535.983484][T25930] oom_kill_process.cold+0x10/0x15 [ 3535.988625][T25930] out_of_memory+0x231/0xa00 [ 3535.993230][T25930] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3535.998932][T25930] mem_cgroup_out_of_memory+0x128/0x150 [ 3536.004551][T25930] try_charge+0xb3a/0xbc0 [ 3536.008976][T25930] ? get_page_from_freelist+0x8c0/0x1650 [ 3536.014653][T25930] ? __tsan_write4+0x32/0x40 [ 3536.019265][T25930] ? __rcu_read_unlock+0x66/0x3c0 [ 3536.024356][T25930] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3536.029904][T25930] __memcg_kmem_charge+0xde/0x240 [ 3536.034960][T25930] __alloc_pages_nodemask+0x26c/0x310 [ 3536.040392][T25930] alloc_pages_current+0xd1/0x170 [ 3536.045487][T25930] get_zeroed_page+0x14/0x50 [ 3536.050095][T25930] __pud_alloc+0x48/0x250 [ 3536.055402][T25930] copy_page_range+0x149f/0x1a80 [ 3536.060357][T25930] ? __tsan_write8+0x32/0x40 [ 3536.065023][T25930] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3536.070702][T25930] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3536.076441][T25930] ? vm_get_page_prot+0x90/0x90 [ 3536.081332][T25930] dup_mm+0x74a/0xba0 [ 3536.085438][T25930] copy_process+0x36f3/0x3b50 [ 3536.090246][T25930] _do_fork+0xfe/0x6e0 [ 3536.094336][T25930] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3536.100004][T25930] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3536.105653][T25930] ? __tsan_read8+0x2c/0x30 [ 3536.110234][T25930] __x64_sys_clone+0x12b/0x160 [ 3536.115044][T25930] do_syscall_64+0xcc/0x370 [ 3536.119576][T25930] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3536.125480][T25930] RIP: 0033:0x459f49 [ 3536.129501][T25930] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:33:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3536.149143][T25930] RSP: 002b:00007fc56dd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3536.157650][T25930] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3536.165781][T25930] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3536.173800][T25930] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3536.181789][T25930] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc56dd116d4 [ 3536.189775][T25930] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3536.572766][T25930] memory: usage 307200kB, limit 307200kB, failcnt 18564 [ 3536.635512][T25930] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3536.664069][T25930] Memory cgroup stats for /syz2: [ 3536.664389][T25930] anon 250523648 [ 3536.664389][T25930] file 139264 [ 3536.664389][T25930] kernel_stack 5824512 [ 3536.664389][T25930] slab 12447744 [ 3536.664389][T25930] sock 28672 [ 3536.664389][T25930] shmem 151552 [ 3536.664389][T25930] file_mapped 0 [ 3536.664389][T25930] file_dirty 0 [ 3536.664389][T25930] file_writeback 0 [ 3536.664389][T25930] anon_thp 207618048 [ 3536.664389][T25930] inactive_anon 196608 [ 3536.664389][T25930] active_anon 250507264 [ 3536.664389][T25930] inactive_file 131072 [ 3536.664389][T25930] active_file 0 [ 3536.664389][T25930] unevictable 135168 [ 3536.664389][T25930] slab_reclaimable 1622016 [ 3536.664389][T25930] slab_unreclaimable 10825728 [ 3536.664389][T25930] pgfault 267333 [ 3536.664389][T25930] pgmajfault 0 [ 3536.664389][T25930] workingset_refault 297 [ 3536.664389][T25930] workingset_activate 99 [ 3536.664389][T25930] workingset_nodereclaim 0 [ 3536.664389][T25930] pgrefill 4370 [ 3536.664389][T25930] pgscan 34855 [ 3536.664389][T25930] pgsteal 30898 23:33:56 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') 23:33:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3537.087406][T25930] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25875,uid=0 [ 3537.125649][T25930] Memory cgroup out of memory: Killed process 25875 (syz-executor.2) total-vm:72716kB, anon-rss:2220kB, file-rss:35812kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 23:33:56 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') 23:33:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:56 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') [ 3538.090713][T26212] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3538.140328][T26212] CPU: 1 PID: 26212 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3538.148294][T26212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3538.158370][T26212] Call Trace: [ 3538.161688][T26212] dump_stack+0xf5/0x159 [ 3538.165962][T26212] dump_header+0xaa/0x449 [ 3538.170450][T26212] oom_kill_process.cold+0x10/0x15 [ 3538.175660][T26212] out_of_memory+0x231/0xa00 [ 3538.180271][T26212] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3538.185939][T26212] mem_cgroup_out_of_memory+0x128/0x150 [ 3538.191522][T26212] try_charge+0xb3a/0xbc0 [ 3538.195878][T26212] ? get_page_from_freelist+0x8c0/0x1650 [ 3538.201565][T26212] ? __tsan_write4+0x32/0x40 [ 3538.206193][T26212] ? __rcu_read_unlock+0x66/0x3c0 [ 3538.211241][T26212] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3538.216725][T26212] __memcg_kmem_charge+0xde/0x240 [ 3538.221808][T26212] __alloc_pages_nodemask+0x26c/0x310 [ 3538.227294][T26212] alloc_pages_current+0xd1/0x170 [ 3538.232329][T26212] pte_alloc_one+0x30/0xa0 [ 3538.236861][T26212] __pte_alloc+0x2d/0x220 [ 3538.241215][T26212] copy_page_range+0x151a/0x1a80 [ 3538.246268][T26212] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3538.251920][T26212] ? __vma_link_rb+0x3f4/0x440 [ 3538.256815][T26212] dup_mm+0x74a/0xba0 [ 3538.260964][T26212] copy_process+0x36f3/0x3b50 [ 3538.265782][T26212] _do_fork+0xfe/0x6e0 [ 3538.269875][T26212] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3538.275549][T26212] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3538.281200][T26212] ? __tsan_read8+0x2c/0x30 [ 3538.285793][T26212] __x64_sys_clone+0x12b/0x160 [ 3538.290677][T26212] do_syscall_64+0xcc/0x370 [ 3538.295209][T26212] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3538.301125][T26212] RIP: 0033:0x459f49 [ 3538.305049][T26212] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3538.324675][T26212] RSP: 002b:00007fc56dd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3538.333111][T26212] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3538.341126][T26212] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3538.350097][T26212] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3538.358096][T26212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc56dd116d4 [ 3538.366088][T26212] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:33:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3538.404172][T26212] memory: usage 307200kB, limit 307200kB, failcnt 18609 [ 3538.442154][T26212] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3538.478485][T26212] Memory cgroup stats for /syz2: [ 3538.482837][T26212] anon 250535936 [ 3538.482837][T26212] file 139264 [ 3538.482837][T26212] kernel_stack 5787648 [ 3538.482837][T26212] slab 12447744 [ 3538.482837][T26212] sock 28672 [ 3538.482837][T26212] shmem 151552 [ 3538.482837][T26212] file_mapped 0 [ 3538.482837][T26212] file_dirty 0 [ 3538.482837][T26212] file_writeback 0 [ 3538.482837][T26212] anon_thp 207618048 [ 3538.482837][T26212] inactive_anon 196608 [ 3538.482837][T26212] active_anon 250519552 [ 3538.482837][T26212] inactive_file 131072 [ 3538.482837][T26212] active_file 0 [ 3538.482837][T26212] unevictable 135168 [ 3538.482837][T26212] slab_reclaimable 1622016 [ 3538.482837][T26212] slab_unreclaimable 10825728 [ 3538.482837][T26212] pgfault 267399 [ 3538.482837][T26212] pgmajfault 0 [ 3538.482837][T26212] workingset_refault 297 [ 3538.482837][T26212] workingset_activate 99 [ 3538.482837][T26212] workingset_nodereclaim 0 [ 3538.482837][T26212] pgrefill 4370 [ 3538.482837][T26212] pgscan 34855 [ 3538.482837][T26212] pgsteal 30898 23:33:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:33:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:58 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:33:58 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3539.031166][T26212] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=13829,uid=0 [ 3539.092254][T26212] Memory cgroup out of memory: Killed process 13829 (syz-executor.2) total-vm:72716kB, anon-rss:2208kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 23:33:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet(0x10, 0x6, 0xfa) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa7}}], 0x80004ec, 0x0, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20001, 0x10270) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x5, 0x0, "9779cc07bb9494b900a1f0979b3dfcf03db2ee5f4f0600120000000000996eb5e5967cd5ee5e84643f35cd92487347ecdeaee5040000006a5211115703e7540000000000ae0d00"}, 0xd8) setsockopt$inet_tcp_int(r3, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x40, &(0x7f0000001fde), 0x4) setsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000000), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x581182, 0x0) r5 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r5) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() wait4(0x0, 0x0, 0x60000000, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x25) ptrace$cont(0x18, r6, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x4, 0x0, 0x0, 0x42, r6}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x008\xb1\xa0\xeb\x00\x00S\xc7#\xf7\x06\x00', 0x19, 0x2, 0x0, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x11, 0x0, 0x0}, 0x78) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) 23:33:59 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r2 = getpid() tkill(r2, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:33:59 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:33:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:33:59 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000002780)=""/4096, 0x1000) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) 23:34:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) socket(0x0, 0x1000000000000002, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:00 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:01 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000002780)=""/4096, 0x1000) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) 23:34:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) socket(0x0, 0x1000000000000002, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:01 executing program 4: perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:02 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) socket(0x0, 0x1000000000000002, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) memfd_create(&(0x7f0000000940)='I\x00=', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/ptmx\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) signalfd4(0xffffffffffffffff, &(0x7f00000023c0), 0x8, 0x0) socket$unix(0x1, 0x3, 0x0) eventfd(0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000600)='net/tcp\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r1 = memfd_create(&(0x7f00000000c0)='I\x00=', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000180)="6963e6424304006da3a74e3deec6fc5bb9650b5de56946c568f95d22c77190ba406d59a5958def156c9c8a2ac4677afffffffc800000000000200000f8bf54da32", 0x41) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000140)={0x30}, 0x25) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000025c0)=""/57, 0x39) 23:34:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:02 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3f) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x9, 0xfa}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 23:34:03 executing program 4: perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3543.864322][T26673] syz-executor.2 invoked oom-killer: gfp_mask=0x101cca(GFP_HIGHUSER_MOVABLE|__GFP_WRITE), order=0, oom_score_adj=1000 23:34:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) creat(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) 23:34:03 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3f) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x9, 0xfa}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 23:34:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3544.108038][T26673] CPU: 1 PID: 26673 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3544.116061][T26673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3544.126136][T26673] Call Trace: [ 3544.129492][T26673] dump_stack+0xf5/0x159 [ 3544.133761][T26673] dump_header+0xaa/0x449 [ 3544.138139][T26673] oom_kill_process.cold+0x10/0x15 [ 3544.143281][T26673] out_of_memory+0x231/0xa00 [ 3544.147910][T26673] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3544.153614][T26673] mem_cgroup_out_of_memory+0x128/0x150 [ 3544.159251][T26673] try_charge+0xb3a/0xbc0 [ 3544.163609][T26673] ? rcu_note_context_switch+0x700/0x760 [ 3544.169271][T26673] mem_cgroup_try_charge+0xd2/0x260 [ 3544.174500][T26673] __add_to_page_cache_locked+0x163/0x780 [ 3544.180261][T26673] ? __read_once_size.constprop.0+0x20/0x20 [ 3544.186180][T26673] add_to_page_cache_lru+0xe2/0x2d0 [ 3544.191467][T26673] pagecache_get_page+0x2ab/0x760 [ 3544.196571][T26673] grab_cache_page_write_begin+0x5d/0x90 [ 3544.202238][T26673] ext4_da_write_begin+0x175/0x7e0 [ 3544.207372][T26673] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3544.213035][T26673] generic_perform_write+0x136/0x320 [ 3544.218368][T26673] __generic_file_write_iter+0x251/0x380 [ 3544.224025][T26673] ext4_file_write_iter+0x1bd/0xa00 [ 3544.229254][T26673] new_sync_write+0x388/0x4a0 [ 3544.234009][T26673] __vfs_write+0xb1/0xc0 [ 3544.238271][T26673] vfs_write+0x18a/0x390 [ 3544.242540][T26673] ksys_write+0xd5/0x1b0 [ 3544.246814][T26673] __x64_sys_write+0x4c/0x60 [ 3544.251447][T26673] do_syscall_64+0xcc/0x370 [ 3544.256102][T26673] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3544.262007][T26673] RIP: 0033:0x459f49 [ 3544.265966][T26673] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3544.285681][T26673] RSP: 002b:00007fc56dd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3544.294115][T26673] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 3544.302103][T26673] RDX: 00000000fffffe38 RSI: 0000000020000080 RDI: 0000000000000003 [ 3544.310084][T26673] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3544.318142][T26673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc56dd116d4 [ 3544.326148][T26673] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 00000000ffffffff 23:34:03 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(0x0, &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:03 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000002780)=""/4096, 0x1000) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(r3, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_ENTRY(r3, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) 23:34:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:04 executing program 5: [ 3544.800431][T26673] memory: usage 307204kB, limit 307200kB, failcnt 18732 [ 3544.904555][T26673] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3544.973565][T26673] Memory cgroup stats for /syz2: [ 3544.976373][T26673] anon 250585088 [ 3544.976373][T26673] file 139264 [ 3544.976373][T26673] kernel_stack 5824512 [ 3544.976373][T26673] slab 12447744 [ 3544.976373][T26673] sock 28672 [ 3544.976373][T26673] shmem 151552 [ 3544.976373][T26673] file_mapped 0 [ 3544.976373][T26673] file_dirty 0 [ 3544.976373][T26673] file_writeback 0 [ 3544.976373][T26673] anon_thp 207618048 [ 3544.976373][T26673] inactive_anon 196608 [ 3544.976373][T26673] active_anon 250568704 [ 3544.976373][T26673] inactive_file 131072 [ 3544.976373][T26673] active_file 0 [ 3544.976373][T26673] unevictable 135168 [ 3544.976373][T26673] slab_reclaimable 1622016 [ 3544.976373][T26673] slab_unreclaimable 10825728 [ 3544.976373][T26673] pgfault 267762 [ 3544.976373][T26673] pgmajfault 0 [ 3544.976373][T26673] workingset_refault 297 [ 3544.976373][T26673] workingset_activate 132 [ 3544.976373][T26673] workingset_nodereclaim 0 [ 3544.976373][T26673] pgrefill 4405 [ 3544.976373][T26673] pgscan 34993 [ 3544.976373][T26673] pgsteal 30965 [ 3545.102682][T26673] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26672,uid=0 [ 3545.123612][T26673] Memory cgroup out of memory: Killed process 26673 (syz-executor.2) total-vm:72980kB, anon-rss:2228kB, file-rss:35880kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 3545.150478][ T1061] oom_reaper: reaped process 26673 (syz-executor.2), now anon-rss:0kB, file-rss:34920kB, shmem-rss:0kB [ 3545.169378][T26795] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3545.189397][T26795] CPU: 0 PID: 26795 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 23:34:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) socket(0x0, 0x1000000000000002, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:04 executing program 5: 23:34:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3545.197324][T26795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3545.207385][T26795] Call Trace: [ 3545.210720][T26795] dump_stack+0xf5/0x159 [ 3545.214994][T26795] dump_header+0xaa/0x449 [ 3545.219370][T26795] oom_kill_process.cold+0x10/0x15 [ 3545.224519][T26795] out_of_memory+0x231/0xa00 [ 3545.229182][T26795] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3545.234953][T26795] mem_cgroup_out_of_memory+0x128/0x150 [ 3545.240539][T26795] try_charge+0xb3a/0xbc0 [ 3545.245015][T26795] ? rcu_note_context_switch+0x700/0x760 [ 3545.250717][T26795] mem_cgroup_try_charge+0xd2/0x260 [ 3545.256018][T26795] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3545.261684][T26795] wp_page_copy+0x322/0x1160 [ 3545.266308][T26795] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3545.271973][T26795] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3545.277639][T26795] do_wp_page+0x192/0x11f0 [ 3545.282084][T26795] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3545.287798][T26795] __handle_mm_fault+0x1c07/0x2cb0 [ 3545.293004][T26795] handle_mm_fault+0x21b/0x530 [ 3545.297797][T26795] __do_page_fault+0x3fb/0x9e0 [ 3545.302673][T26795] do_page_fault+0x54/0x233 [ 3545.307210][T26795] ? do_syscall_64+0x270/0x370 [ 3545.312002][T26795] page_fault+0x34/0x40 [ 3545.316169][T26795] RIP: 0033:0x4155d3 [ 3545.320101][T26795] Code: e9 4c 89 e2 ff 74 24 48 4c 8b 4c 24 10 89 ee 4c 8b 44 24 18 48 89 df e8 cb f7 ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 48 f7 d8 <64> 89 04 25 d4 ff ff ff 48 83 c8 ff c3 48 81 ec 98 00 00 00 31 ff [ 3545.339777][T26795] RSP: 002b:00007ffdf09f90f8 EFLAGS: 00010213 [ 3545.345890][T26795] RAX: 000000000000006e RBX: 00000000000003e8 RCX: 0000000000459f49 [ 3545.353954][T26795] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf2c [ 3545.361945][T26795] RBP: 000000000000002d R08: ffffffffffffffff R09: ffffffffffffffff [ 3545.369935][T26795] R10: 00007ffdf09f91d0 R11: 0000000000000246 R12: 000000000075bf20 [ 3545.377921][T26795] R13: 0000000000361714 R14: 0000000000361741 R15: 000000000075bf2c [ 3545.393339][T26795] memory: usage 307192kB, limit 307200kB, failcnt 22279 23:34:04 executing program 5: [ 3545.424029][T26795] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3545.455349][T26795] Memory cgroup stats for /syz4: [ 3545.455659][T26795] anon 241651712 [ 3545.455659][T26795] file 651264 [ 3545.455659][T26795] kernel_stack 6303744 [ 3545.455659][T26795] slab 13692928 [ 3545.455659][T26795] sock 0 [ 3545.455659][T26795] shmem 696320 [ 3545.455659][T26795] file_mapped 0 [ 3545.455659][T26795] file_dirty 0 [ 3545.455659][T26795] file_writeback 0 [ 3545.455659][T26795] anon_thp 184549376 [ 3545.455659][T26795] inactive_anon 0 [ 3545.455659][T26795] active_anon 242270208 [ 3545.455659][T26795] inactive_file 61440 [ 3545.455659][T26795] active_file 0 [ 3545.455659][T26795] unevictable 0 [ 3545.455659][T26795] slab_reclaimable 1892352 [ 3545.455659][T26795] slab_unreclaimable 11800576 [ 3545.455659][T26795] pgfault 238227 [ 3545.455659][T26795] pgmajfault 0 [ 3545.455659][T26795] workingset_refault 429 [ 3545.455659][T26795] workingset_activate 165 [ 3545.455659][T26795] workingset_nodereclaim 0 [ 3545.455659][T26795] pgrefill 8161 [ 3545.455659][T26795] pgscan 35595 [ 3545.455659][T26795] pgsteal 14304 [ 3545.563039][T26795] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6819,uid=0 [ 3545.689581][T26795] Memory cgroup out of memory: Killed process 6819 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3545.791181][T26915] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3545.845876][T26915] CPU: 0 PID: 26915 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3545.853826][T26915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3545.863929][T26915] Call Trace: [ 3545.867232][T26915] dump_stack+0xf5/0x159 [ 3545.871503][T26915] dump_header+0xaa/0x449 [ 3545.875898][T26915] oom_kill_process.cold+0x10/0x15 [ 3545.881022][T26915] out_of_memory+0x231/0xa00 [ 3545.885655][T26915] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3545.891391][T26915] mem_cgroup_out_of_memory+0x128/0x150 [ 3545.896953][T26915] try_charge+0xb3a/0xbc0 [ 3545.901382][T26915] ? rcu_note_context_switch+0x700/0x760 [ 3545.907023][T26915] mem_cgroup_try_charge+0xd2/0x260 [ 3545.912236][T26915] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3545.917890][T26915] __handle_mm_fault+0x179a/0x2cb0 [ 3545.923038][T26915] handle_mm_fault+0x21b/0x530 [ 3545.927813][T26915] __do_page_fault+0x3fb/0x9e0 [ 3545.932595][T26915] do_page_fault+0x54/0x233 [ 3545.937121][T26915] ? do_syscall_64+0x270/0x370 [ 3545.941975][T26915] page_fault+0x34/0x40 [ 3545.946148][T26915] RIP: 0033:0x45c8fd [ 3545.950058][T26915] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 e0 8c fb ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 3545.969739][T26915] RSP: 002b:00007fff25964908 EFLAGS: 00010202 [ 3545.975923][T26915] RAX: ffffffffffffffea RBX: 00007fa9090b7700 RCX: 00007fa9090b7700 [ 3545.983910][T26915] RDX: 00000000003d0f00 RSI: 00007fa9090b6db0 RDI: 0000000000410b30 [ 3545.991892][T26915] RBP: 00007fff25964b20 R08: 00007fa9090b79d0 R09: 00007fa9090b7700 [ 3545.999872][T26915] R10: 00007fa9090b6dc0 R11: 0000000000000246 R12: 0000000000000000 [ 3546.007925][T26915] R13: 00007fff259649bf R14: 00007fa9090b79c0 R15: 000000000075bfd4 [ 3546.022158][T26915] memory: usage 307200kB, limit 307200kB, failcnt 9703 [ 3546.040125][T26915] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:34:05 executing program 4: perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:05 executing program 3: 23:34:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:05 executing program 5: [ 3546.059132][T26915] Memory cgroup stats for /syz0: [ 3546.059439][T26915] anon 263823360 [ 3546.059439][T26915] file 36864 [ 3546.059439][T26915] kernel_stack 4460544 [ 3546.059439][T26915] slab 10403840 [ 3546.059439][T26915] sock 0 [ 3546.059439][T26915] shmem 73728 [ 3546.059439][T26915] file_mapped 135168 [ 3546.059439][T26915] file_dirty 0 [ 3546.059439][T26915] file_writeback 0 [ 3546.059439][T26915] anon_thp 230686720 [ 3546.059439][T26915] inactive_anon 0 [ 3546.059439][T26915] active_anon 263827456 [ 3546.059439][T26915] inactive_file 0 [ 3546.059439][T26915] active_file 28672 [ 3546.059439][T26915] unevictable 0 [ 3546.059439][T26915] slab_reclaimable 1351680 [ 3546.059439][T26915] slab_unreclaimable 9052160 [ 3546.059439][T26915] pgfault 237732 [ 3546.059439][T26915] pgmajfault 0 [ 3546.059439][T26915] workingset_refault 198 [ 3546.059439][T26915] workingset_activate 66 [ 3546.059439][T26915] workingset_nodereclaim 0 [ 3546.059439][T26915] pgrefill 3832 [ 3546.059439][T26915] pgscan 15716 [ 3546.059439][T26915] pgsteal 11708 [ 3546.217171][T26915] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4478,uid=0 [ 3546.258172][T26915] Memory cgroup out of memory: Killed process 4478 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3546.502652][T26951] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3546.562349][T26951] CPU: 1 PID: 26951 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3546.570383][T26951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3546.580510][T26951] Call Trace: [ 3546.583822][T26951] dump_stack+0xf5/0x159 [ 3546.588094][T26951] dump_header+0xaa/0x449 [ 3546.592496][T26951] oom_kill_process.cold+0x10/0x15 [ 3546.597632][T26951] out_of_memory+0x231/0xa00 [ 3546.602288][T26951] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3546.607987][T26951] mem_cgroup_out_of_memory+0x128/0x150 [ 3546.613648][T26951] try_charge+0xb3a/0xbc0 [ 3546.618025][T26951] ? rcu_note_context_switch+0x700/0x760 [ 3546.623691][T26951] mem_cgroup_try_charge+0xd2/0x260 [ 3546.628930][T26951] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3546.634602][T26951] wp_page_copy+0x322/0x1160 [ 3546.639239][T26951] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3546.644914][T26951] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3546.650580][T26951] do_wp_page+0x192/0x11f0 [ 3546.655012][T26951] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3546.660694][T26951] __handle_mm_fault+0x1c07/0x2cb0 [ 3546.665843][T26951] handle_mm_fault+0x21b/0x530 [ 3546.670694][T26951] __do_page_fault+0x3fb/0x9e0 [ 3546.675489][T26951] do_page_fault+0x54/0x233 [ 3546.680093][T26951] ? do_syscall_64+0x270/0x370 [ 3546.684881][T26951] page_fault+0x34/0x40 [ 3546.689041][T26951] RIP: 0033:0x41100c [ 3546.692966][T26951] Code: 66 00 48 f7 d0 49 21 c5 4b 8d 8c 28 00 08 00 00 4c 89 ad 70 ff ff ff 48 21 c8 48 39 c3 0f 82 1b 04 00 00 be 01 00 00 00 31 c0 0f b1 35 24 12 66 00 74 1a 48 8d 3d 1b 12 66 00 48 81 ec 80 00 [ 3546.712661][T26951] RSP: 002b:00007ffdf09f9010 EFLAGS: 00010246 [ 3546.718746][T26951] RAX: 0000000000000000 RBX: 0000000000020000 RCX: 0000000000003a3f [ 3546.726825][T26951] RDX: 0000000000001000 RSI: 0000000000000001 RDI: 00007ffdf09f91c8 [ 3546.734827][T26951] RBP: 00007ffdf09f90f0 R08: 000000000000223f R09: ffffffffffffffff [ 3546.742938][T26951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdf09f91e0 [ 3546.750947][T26951] R13: 0000000000001000 R14: 0000000000000001 R15: 000000000075bfd4 23:34:06 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(0x0, &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) socket(0x0, 0x1000000000000002, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:06 executing program 3: 23:34:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:06 executing program 5: [ 3546.793058][T26951] memory: usage 307200kB, limit 307200kB, failcnt 22345 [ 3546.804932][T26951] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3546.811976][T26951] Memory cgroup stats for /syz4: [ 3546.812544][T26951] anon 241643520 [ 3546.812544][T26951] file 651264 [ 3546.812544][T26951] kernel_stack 6303744 [ 3546.812544][T26951] slab 13692928 [ 3546.812544][T26951] sock 0 [ 3546.812544][T26951] shmem 696320 [ 3546.812544][T26951] file_mapped 0 [ 3546.812544][T26951] file_dirty 0 [ 3546.812544][T26951] file_writeback 0 [ 3546.812544][T26951] anon_thp 184549376 [ 3546.812544][T26951] inactive_anon 0 [ 3546.812544][T26951] active_anon 242262016 [ 3546.812544][T26951] inactive_file 61440 [ 3546.812544][T26951] active_file 0 [ 3546.812544][T26951] unevictable 0 [ 3546.812544][T26951] slab_reclaimable 1892352 [ 3546.812544][T26951] slab_unreclaimable 11800576 [ 3546.812544][T26951] pgfault 238326 [ 3546.812544][T26951] pgmajfault 0 [ 3546.812544][T26951] workingset_refault 429 [ 3546.812544][T26951] workingset_activate 165 [ 3546.812544][T26951] workingset_nodereclaim 0 [ 3546.812544][T26951] pgrefill 8161 [ 3546.812544][T26951] pgscan 35595 [ 3546.812544][T26951] pgsteal 14304 23:34:06 executing program 3: 23:34:06 executing program 5: 23:34:06 executing program 3: [ 3547.317142][T26951] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6665,uid=0 [ 3547.387932][T26951] Memory cgroup out of memory: Killed process 6665 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3547.563388][T26958] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3547.593105][T26958] CPU: 0 PID: 26958 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3547.601044][T26958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3547.611113][T26958] Call Trace: [ 3547.614477][T26958] dump_stack+0xf5/0x159 [ 3547.618806][T26958] dump_header+0xaa/0x449 [ 3547.623173][T26958] oom_kill_process.cold+0x10/0x15 [ 3547.628318][T26958] out_of_memory+0x231/0xa00 [ 3547.632928][T26958] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3547.638707][T26958] mem_cgroup_out_of_memory+0x128/0x150 [ 3547.644359][T26958] try_charge+0x8c1/0xbc0 [ 3547.648725][T26958] ? get_page_from_freelist+0x8c0/0x1650 [ 3547.654377][T26958] ? __tsan_write4+0x32/0x40 [ 3547.658991][T26958] ? __rcu_read_unlock+0x66/0x3c0 [ 3547.664073][T26958] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3547.669562][T26958] __memcg_kmem_charge+0xde/0x240 [ 3547.674670][T26958] __alloc_pages_nodemask+0x26c/0x310 [ 3547.680104][T26958] alloc_pages_current+0xd1/0x170 [ 3547.685165][T26958] pte_alloc_one+0x30/0xa0 [ 3547.689630][T26958] __handle_mm_fault+0x296f/0x2cb0 [ 3547.694819][T26958] handle_mm_fault+0x21b/0x530 [ 3547.699613][T26958] __do_page_fault+0x3fb/0x9e0 [ 3547.704565][T26958] do_page_fault+0x54/0x233 [ 3547.709180][T26958] ? syscall_return_slowpath+0x1b8/0x220 [ 3547.714875][T26958] page_fault+0x34/0x40 [ 3547.719110][T26958] RIP: 0033:0x459f49 [ 3547.723108][T26958] Code: Bad RIP value. [ 3547.727216][T26958] RSP: 002b:00007f46fbab6c78 EFLAGS: 00010246 [ 3547.733302][T26958] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000459f49 [ 3547.741298][T26958] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3547.749336][T26958] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3547.757486][T26958] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46fbab76d4 [ 3547.765468][T26958] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3547.774216][T26958] memory: usage 305024kB, limit 307200kB, failcnt 22345 [ 3547.781229][T26958] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3547.788117][T26958] Memory cgroup stats for /syz4: [ 3547.788507][T26958] anon 239443968 [ 3547.788507][T26958] file 651264 [ 3547.788507][T26958] kernel_stack 6303744 [ 3547.788507][T26958] slab 13692928 [ 3547.788507][T26958] sock 0 [ 3547.788507][T26958] shmem 696320 [ 3547.788507][T26958] file_mapped 0 [ 3547.788507][T26958] file_dirty 0 [ 3547.788507][T26958] file_writeback 0 [ 3547.788507][T26958] anon_thp 182452224 [ 3547.788507][T26958] inactive_anon 0 [ 3547.788507][T26958] active_anon 240054272 [ 3547.788507][T26958] inactive_file 61440 [ 3547.788507][T26958] active_file 0 [ 3547.788507][T26958] unevictable 0 [ 3547.788507][T26958] slab_reclaimable 1892352 [ 3547.788507][T26958] slab_unreclaimable 11800576 [ 3547.788507][T26958] pgfault 238326 [ 3547.788507][T26958] pgmajfault 0 [ 3547.788507][T26958] workingset_refault 429 [ 3547.788507][T26958] workingset_activate 165 [ 3547.788507][T26958] workingset_nodereclaim 0 [ 3547.788507][T26958] pgrefill 8161 [ 3547.788507][T26958] pgscan 35595 [ 3547.788507][T26958] pgsteal 14304 [ 3547.883039][T26958] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6613,uid=0 [ 3547.898836][T26958] Memory cgroup out of memory: Killed process 6613 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3547.919878][ T1061] oom_reaper: reaped process 6613 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3547.930224][T26952] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3547.941780][T26952] CPU: 0 PID: 26952 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3547.949751][T26952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3547.959965][T26952] Call Trace: [ 3547.963290][T26952] dump_stack+0xf5/0x159 [ 3547.967576][T26952] dump_header+0xaa/0x449 [ 3547.971934][T26952] oom_kill_process.cold+0x10/0x15 [ 3547.977059][T26952] out_of_memory+0x231/0xa00 [ 3547.981692][T26952] mem_cgroup_out_of_memory+0x128/0x150 [ 3547.987308][T26952] try_charge+0x8c1/0xbc0 [ 3547.991679][T26952] ? rcu_note_context_switch+0x700/0x760 [ 3547.997389][T26952] mem_cgroup_try_charge+0xd2/0x260 [ 3548.002592][T26952] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3548.008223][T26952] wp_page_copy+0x322/0x1160 [ 3548.012899][T26952] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3548.018546][T26952] do_wp_page+0x192/0x11f0 [ 3548.022952][T26952] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3548.028687][T26952] __handle_mm_fault+0x1c07/0x2cb0 [ 3548.033893][T26952] handle_mm_fault+0x21b/0x530 [ 3548.038737][T26952] __do_page_fault+0x3fb/0x9e0 [ 3548.043552][T26952] do_page_fault+0x54/0x233 [ 3548.048087][T26952] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3548.053812][T26952] page_fault+0x34/0x40 [ 3548.057978][T26952] RIP: 0033:0x405308 [ 3548.061936][T26952] Code: 85 02 00 00 80 3d 0f cf 66 00 00 c6 85 84 00 00 00 00 74 0f 8b 05 fc ce 66 00 39 45 24 0f 84 e7 01 00 00 44 8b a5 80 00 00 00 b3 d2 ff ff 48 2b 05 fc 2c 33 00 8b 75 00 49 89 d8 45 89 e1 4c [ 3548.081546][T26952] RSP: 002b:00007f46fbab6c90 EFLAGS: 00010246 [ 3548.087715][T26952] RAX: 00007f46fdab8000 RBX: 000000000000206b RCX: 0000000000459f49 [ 3548.095678][T26952] RDX: 000000000003ffff RSI: 0000000000000000 RDI: 0000000000000000 [ 3548.103715][T26952] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3548.111679][T26952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3548.119645][T26952] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3548.129078][T26952] memory: usage 302712kB, limit 307200kB, failcnt 22345 [ 3548.136346][T26952] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3548.143465][T26952] Memory cgroup stats for /syz4: [ 3548.144957][T26952] anon 237305856 [ 3548.144957][T26952] file 651264 [ 3548.144957][T26952] kernel_stack 6303744 [ 3548.144957][T26952] slab 13692928 [ 3548.144957][T26952] sock 0 [ 3548.144957][T26952] shmem 696320 [ 3548.144957][T26952] file_mapped 0 [ 3548.144957][T26952] file_dirty 0 [ 3548.144957][T26952] file_writeback 0 [ 3548.144957][T26952] anon_thp 180355072 [ 3548.144957][T26952] inactive_anon 0 [ 3548.144957][T26952] active_anon 237916160 [ 3548.144957][T26952] inactive_file 61440 [ 3548.144957][T26952] active_file 0 [ 3548.144957][T26952] unevictable 0 [ 3548.144957][T26952] slab_reclaimable 1892352 [ 3548.144957][T26952] slab_unreclaimable 11800576 [ 3548.144957][T26952] pgfault 238326 [ 3548.144957][T26952] pgmajfault 0 [ 3548.144957][T26952] workingset_refault 429 [ 3548.144957][T26952] workingset_activate 165 [ 3548.144957][T26952] workingset_nodereclaim 0 [ 3548.144957][T26952] pgrefill 8161 [ 3548.144957][T26952] pgscan 35595 [ 3548.144957][T26952] pgsteal 14304 [ 3548.240133][T26952] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6483,uid=0 [ 3548.256345][T26952] Memory cgroup out of memory: Killed process 6483 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3548.290372][T26975] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3548.304059][T26975] CPU: 0 PID: 26975 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3548.312027][T26975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3548.322252][T26975] Call Trace: [ 3548.325567][T26975] dump_stack+0xf5/0x159 [ 3548.329837][T26975] dump_header+0xaa/0x449 [ 3548.334234][T26975] oom_kill_process.cold+0x10/0x15 [ 3548.339457][T26975] out_of_memory+0x231/0xa00 [ 3548.344076][T26975] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3548.349826][T26975] mem_cgroup_out_of_memory+0x128/0x150 [ 3548.355375][T26975] try_charge+0xb3a/0xbc0 [ 3548.359739][T26975] ? get_page_from_freelist+0x8c0/0x1650 [ 3548.365378][T26975] ? __tsan_write4+0x32/0x40 [ 3548.369980][T26975] ? __rcu_read_unlock+0x66/0x3c0 [ 3548.375005][T26975] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3548.380472][T26975] __memcg_kmem_charge+0xde/0x240 [ 3548.385522][T26975] __alloc_pages_nodemask+0x26c/0x310 [ 3548.390934][T26975] alloc_pages_current+0xd1/0x170 [ 3548.395984][T26975] pte_alloc_one+0x30/0xa0 [ 3548.400418][T26975] __handle_mm_fault+0x296f/0x2cb0 [ 3548.405583][T26975] handle_mm_fault+0x21b/0x530 [ 3548.410425][T26975] __do_page_fault+0x3fb/0x9e0 [ 3548.415252][T26975] do_page_fault+0x54/0x233 [ 3548.419770][T26975] ? syscall_return_slowpath+0x1b8/0x220 [ 3548.425559][T26975] page_fault+0x34/0x40 [ 3548.429702][T26975] RIP: 0033:0x459f49 [ 3548.433602][T26975] Code: Bad RIP value. [ 3548.437683][T26975] RSP: 002b:00007fa9090d7c78 EFLAGS: 00010246 [ 3548.443745][T26975] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000459f49 [ 3548.451775][T26975] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3548.459745][T26975] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3548.467850][T26975] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa9090d86d4 [ 3548.475820][T26975] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3548.492324][T26975] memory: usage 307200kB, limit 307200kB, failcnt 9738 [ 3548.527091][T26975] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3548.533976][T26975] Memory cgroup stats for /syz0: [ 3548.534225][T26975] anon 263606272 [ 3548.534225][T26975] file 36864 [ 3548.534225][T26975] kernel_stack 4497408 [ 3548.534225][T26975] slab 10403840 [ 3548.534225][T26975] sock 0 [ 3548.534225][T26975] shmem 73728 [ 3548.534225][T26975] file_mapped 135168 [ 3548.534225][T26975] file_dirty 0 [ 3548.534225][T26975] file_writeback 0 [ 3548.534225][T26975] anon_thp 230686720 [ 3548.534225][T26975] inactive_anon 0 [ 3548.534225][T26975] active_anon 263610368 [ 3548.534225][T26975] inactive_file 0 [ 3548.534225][T26975] active_file 28672 [ 3548.534225][T26975] unevictable 0 [ 3548.534225][T26975] slab_reclaimable 1351680 [ 3548.534225][T26975] slab_unreclaimable 9052160 [ 3548.534225][T26975] pgfault 237798 [ 3548.534225][T26975] pgmajfault 0 [ 3548.534225][T26975] workingset_refault 198 [ 3548.534225][T26975] workingset_activate 66 [ 3548.534225][T26975] workingset_nodereclaim 0 [ 3548.534225][T26975] pgrefill 3832 [ 3548.534225][T26975] pgscan 15716 [ 3548.534225][T26975] pgsteal 11708 23:34:08 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:08 executing program 3: 23:34:08 executing program 5: [ 3548.853078][T26975] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4450,uid=0 [ 3548.868712][T26975] Memory cgroup out of memory: Killed process 4450 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3548.942874][T26968] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3548.968412][T26968] CPU: 0 PID: 26968 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3548.976346][T26968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3548.986403][T26968] Call Trace: [ 3548.989760][T26968] dump_stack+0xf5/0x159 [ 3548.994025][T26968] dump_header+0xaa/0x449 [ 3548.998382][T26968] oom_kill_process.cold+0x10/0x15 [ 3549.003588][T26968] out_of_memory+0x231/0xa00 [ 3549.008274][T26968] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3549.014003][T26968] mem_cgroup_out_of_memory+0x128/0x150 [ 3549.019651][T26968] try_charge+0x8c1/0xbc0 [ 3549.024014][T26968] ? rcu_note_context_switch+0x700/0x760 [ 3549.029691][T26968] mem_cgroup_try_charge+0xd2/0x260 [ 3549.034971][T26968] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3549.040634][T26968] wp_page_copy+0x322/0x1160 [ 3549.045291][T26968] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3549.051018][T26968] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3549.056703][T26968] do_wp_page+0x192/0x11f0 [ 3549.061132][T26968] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3549.066792][T26968] __handle_mm_fault+0x1c07/0x2cb0 [ 3549.071943][T26968] handle_mm_fault+0x21b/0x530 [ 3549.076785][T26968] __do_page_fault+0x3fb/0x9e0 [ 3549.081582][T26968] do_page_fault+0x54/0x233 [ 3549.086173][T26968] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3549.091913][T26968] page_fault+0x34/0x40 [ 3549.096079][T26968] RIP: 0033:0x43362e [ 3549.100061][T26968] Code: 15 eb 36 64 00 4c 89 c0 85 d2 0f 85 74 01 00 00 48 83 c4 08 5b 5d 41 5c 41 5d c3 90 be 01 00 00 00 83 3d 9c 4e 64 00 00 74 08 0f b1 33 75 07 eb 1b 0f b1 33 74 16 48 8d 3b 48 81 ec 80 00 00 [ 3549.119682][T26968] RSP: 002b:00007fff25964900 EFLAGS: 00010202 [ 3549.125763][T26968] RAX: 0000000000000000 RBX: 0000000000716640 RCX: 0000000000459f9a [ 3549.133801][T26968] RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000011 [ 3549.141815][T26968] RBP: 0000000000000110 R08: ffffffffffffffff R09: 0000000000000000 [ 3549.150499][T26968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff25964b20 [ 3549.158554][T26968] R13: 00007fa9090b7700 R14: 0000000000000001 R15: 000000000075bfd4 [ 3549.240139][T26968] memory: usage 302864kB, limit 307200kB, failcnt 9738 [ 3549.247187][T26968] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3549.254034][T26968] Memory cgroup stats for /syz0: [ 3549.254321][T26968] anon 259354624 [ 3549.254321][T26968] file 36864 [ 3549.254321][T26968] kernel_stack 4497408 [ 3549.254321][T26968] slab 10403840 [ 3549.254321][T26968] sock 0 [ 3549.254321][T26968] shmem 73728 [ 3549.254321][T26968] file_mapped 135168 [ 3549.254321][T26968] file_dirty 0 [ 3549.254321][T26968] file_writeback 0 [ 3549.254321][T26968] anon_thp 226492416 [ 3549.254321][T26968] inactive_anon 0 [ 3549.254321][T26968] active_anon 259358720 [ 3549.254321][T26968] inactive_file 0 [ 3549.254321][T26968] active_file 28672 [ 3549.254321][T26968] unevictable 0 [ 3549.254321][T26968] slab_reclaimable 1351680 [ 3549.254321][T26968] slab_unreclaimable 9052160 [ 3549.254321][T26968] pgfault 237798 [ 3549.254321][T26968] pgmajfault 0 [ 3549.254321][T26968] workingset_refault 198 [ 3549.254321][T26968] workingset_activate 66 [ 3549.254321][T26968] workingset_nodereclaim 0 [ 3549.254321][T26968] pgrefill 3832 [ 3549.254321][T26968] pgscan 15716 [ 3549.254321][T26968] pgsteal 11708 [ 3549.351133][T26968] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4377,uid=0 [ 3549.366735][T26968] Memory cgroup out of memory: Killed process 4377 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3549.405709][T26970] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3549.427090][T26970] CPU: 0 PID: 26970 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3549.435046][T26970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3549.445116][T26970] Call Trace: [ 3549.448521][T26970] dump_stack+0xf5/0x159 [ 3549.452775][T26970] dump_header+0xaa/0x449 [ 3549.457107][T26970] oom_kill_process.cold+0x10/0x15 [ 3549.462213][T26970] out_of_memory+0x231/0xa00 [ 3549.466796][T26970] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3549.472457][T26970] mem_cgroup_out_of_memory+0x128/0x150 [ 3549.478138][T26970] try_charge+0x8c1/0xbc0 [ 3549.482544][T26970] ? rcu_note_context_switch+0x700/0x760 [ 3549.492193][T26970] mem_cgroup_try_charge+0xd2/0x260 [ 3549.497393][T26970] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3549.503073][T26970] wp_page_copy+0x322/0x1160 [ 3549.507724][T26970] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3549.513403][T26970] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3549.519131][T26970] do_wp_page+0x192/0x11f0 [ 3549.523564][T26970] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3549.529261][T26970] __handle_mm_fault+0x1c07/0x2cb0 [ 3549.534394][T26970] handle_mm_fault+0x21b/0x530 [ 3549.539153][T26970] __do_page_fault+0x3fb/0x9e0 [ 3549.543933][T26970] do_page_fault+0x54/0x233 [ 3549.548441][T26970] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3549.554156][T26970] page_fault+0x34/0x40 [ 3549.558334][T26970] RIP: 0033:0x405308 [ 3549.562274][T26970] Code: 85 02 00 00 80 3d 0f cf 66 00 00 c6 85 84 00 00 00 00 74 0f 8b 05 fc ce 66 00 39 45 24 0f 84 e7 01 00 00 44 8b a5 80 00 00 00 b3 d2 ff ff 48 2b 05 fc 2c 33 00 8b 75 00 49 89 d8 45 89 e1 4c [ 3549.581868][T26970] RSP: 002b:00007fa9090d7c90 EFLAGS: 00010246 [ 3549.587943][T26970] RAX: 00007fa90b0d9000 RBX: 00000000000034de RCX: 0000000000459f49 [ 3549.595918][T26970] RDX: 000000000003ffff RSI: 0000000000000000 RDI: 0000000000000000 [ 3549.603918][T26970] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3549.611902][T26970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3549.619860][T26970] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3549.632237][T26970] memory: usage 298672kB, limit 307200kB, failcnt 9738 [ 3549.639222][T26970] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3549.646098][T26970] Memory cgroup stats for /syz0: [ 3549.647343][T26970] anon 255057920 [ 3549.647343][T26970] file 36864 [ 3549.647343][T26970] kernel_stack 4497408 [ 3549.647343][T26970] slab 10403840 [ 3549.647343][T26970] sock 0 [ 3549.647343][T26970] shmem 73728 [ 3549.647343][T26970] file_mapped 135168 [ 3549.647343][T26970] file_dirty 0 [ 3549.647343][T26970] file_writeback 0 [ 3549.647343][T26970] anon_thp 222298112 [ 3549.647343][T26970] inactive_anon 0 [ 3549.647343][T26970] active_anon 255062016 [ 3549.647343][T26970] inactive_file 0 [ 3549.647343][T26970] active_file 28672 [ 3549.647343][T26970] unevictable 0 [ 3549.647343][T26970] slab_reclaimable 1351680 [ 3549.647343][T26970] slab_unreclaimable 9052160 [ 3549.647343][T26970] pgfault 237798 [ 3549.647343][T26970] pgmajfault 0 [ 3549.647343][T26970] workingset_refault 198 [ 3549.647343][T26970] workingset_activate 66 [ 3549.647343][T26970] workingset_nodereclaim 0 [ 3549.647343][T26970] pgrefill 3832 [ 3549.647343][T26970] pgscan 15716 [ 3549.647343][T26970] pgsteal 11708 [ 3549.742270][T26970] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=26968,uid=0 [ 3549.758922][T26970] Memory cgroup out of memory: Killed process 26968 (syz-executor.0) total-vm:72716kB, anon-rss:4252kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3549.789194][ T1061] oom_reaper: reaped process 26968 (syz-executor.0), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 23:34:09 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(0x0, &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) socket(0x0, 0x1000000000000002, 0x0) 23:34:09 executing program 3: 23:34:09 executing program 5: 23:34:09 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:09 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:09 executing program 5: 23:34:09 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:09 executing program 3: 23:34:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x3102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socket(0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000b34ffc)) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x5, 0x5, 0x0) 23:34:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:10 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:10 executing program 5: clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000a32c78365af4f57e477f89b47c70d1e856d56c9a309cecdc7c07000000bc7000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x12, 0x0) 23:34:10 executing program 3: socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000080)=""/22, 0x16}], 0x1, 0x6edd) 23:34:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:10 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', 0x0) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) socket(0x0, 0x1000000000000002, 0x0) [ 3551.551185][T27144] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3551.583011][T27144] CPU: 0 PID: 27144 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3551.590970][T27144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:34:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3551.601037][T27144] Call Trace: [ 3551.604436][T27144] dump_stack+0xf5/0x159 [ 3551.608778][T27144] dump_header+0xaa/0x449 [ 3551.613146][T27144] oom_kill_process.cold+0x10/0x15 [ 3551.618345][T27144] out_of_memory+0x231/0xa00 [ 3551.622963][T27144] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3551.628642][T27144] mem_cgroup_out_of_memory+0x128/0x150 [ 3551.634292][T27144] try_charge+0xb3a/0xbc0 [ 3551.638743][T27144] ? get_page_from_freelist+0x8c0/0x1650 [ 3551.644506][T27144] ? __tsan_write4+0x32/0x40 [ 3551.649123][T27144] ? __rcu_read_unlock+0x66/0x3c0 [ 3551.654176][T27144] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3551.659699][T27144] __memcg_kmem_charge+0xde/0x240 [ 3551.664910][T27144] __alloc_pages_nodemask+0x26c/0x310 [ 3551.670381][T27144] alloc_pages_current+0xd1/0x170 [ 3551.675431][T27144] pte_alloc_one+0x30/0xa0 [ 3551.685256][T27144] __pte_alloc+0x2d/0x220 [ 3551.689612][T27144] copy_page_range+0x151a/0x1a80 [ 3551.694613][T27144] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3551.700261][T27144] ? __vma_link_rb+0x3f4/0x440 [ 3551.705120][T27144] dup_mm+0x74a/0xba0 [ 3551.709151][T27144] copy_process+0x36f3/0x3b50 [ 3551.713927][T27144] _do_fork+0xfe/0x6e0 [ 3551.718031][T27144] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3551.723801][T27144] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3551.729457][T27144] ? __tsan_read8+0x2c/0x30 [ 3551.734008][T27144] __x64_sys_clone+0x12b/0x160 [ 3551.738868][T27144] do_syscall_64+0xcc/0x370 [ 3551.743439][T27144] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3551.749404][T27144] RIP: 0033:0x459f49 [ 3551.753354][T27144] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3551.772985][T27144] RSP: 002b:00007f46fbab6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3551.781422][T27144] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3551.789410][T27144] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 23:34:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in, 0x0, 0x0, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./bus\x00', 0x8143242, 0x0) close(r1) r2 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x101, 0x105082) pwritev(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x81000) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) fcntl$setstatus(r1, 0x4, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f00000000c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 3551.797397][T27144] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3551.805440][T27144] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46fbab76d4 [ 3551.813478][T27144] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3551.889285][T27144] memory: usage 307200kB, limit 307200kB, failcnt 22423 [ 3551.896447][T27144] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3551.904137][T27144] Memory cgroup stats for /syz4: [ 3551.905490][T27144] anon 241741824 [ 3551.905490][T27144] file 651264 [ 3551.905490][T27144] kernel_stack 6303744 [ 3551.905490][T27144] slab 13828096 [ 3551.905490][T27144] sock 0 [ 3551.905490][T27144] shmem 696320 [ 3551.905490][T27144] file_mapped 0 [ 3551.905490][T27144] file_dirty 0 23:34:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3551.905490][T27144] file_writeback 0 [ 3551.905490][T27144] anon_thp 184549376 [ 3551.905490][T27144] inactive_anon 0 [ 3551.905490][T27144] active_anon 242339840 [ 3551.905490][T27144] inactive_file 61440 [ 3551.905490][T27144] active_file 0 [ 3551.905490][T27144] unevictable 0 [ 3551.905490][T27144] slab_reclaimable 1892352 [ 3551.905490][T27144] slab_unreclaimable 11935744 [ 3551.905490][T27144] pgfault 238656 [ 3551.905490][T27144] pgmajfault 0 [ 3551.905490][T27144] workingset_refault 429 [ 3551.905490][T27144] workingset_activate 165 [ 3551.905490][T27144] workingset_nodereclaim 0 [ 3551.905490][T27144] pgrefill 8161 [ 3551.905490][T27144] pgscan 35595 [ 3551.905490][T27144] pgsteal 14304 [ 3552.004715][T27144] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26989,uid=0 [ 3552.037658][T27144] Memory cgroup out of memory: Killed process 26989 (syz-executor.4) total-vm:72716kB, anon-rss:4264kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 23:34:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) socket(0x0, 0x1000000000000002, 0x0) 23:34:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x4e23, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) socket(0x0, 0x1000000000000002, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3552.261605][T27168] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3552.297185][T27168] CPU: 1 PID: 27168 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3552.305128][T27168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3552.315247][T27168] Call Trace: [ 3552.318565][T27168] dump_stack+0xf5/0x159 [ 3552.322839][T27168] dump_header+0xaa/0x449 [ 3552.327256][T27168] oom_kill_process.cold+0x10/0x15 [ 3552.332401][T27168] out_of_memory+0x231/0xa00 [ 3552.337074][T27168] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3552.342812][T27168] mem_cgroup_out_of_memory+0x128/0x150 [ 3552.348424][T27168] try_charge+0xb3a/0xbc0 [ 3552.352788][T27168] ? get_page_from_freelist+0x8c0/0x1650 [ 3552.358444][T27168] ? __tsan_write4+0x32/0x40 [ 3552.363060][T27168] ? __rcu_read_unlock+0x66/0x3c0 [ 3552.368112][T27168] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3552.373599][T27168] __memcg_kmem_charge+0xde/0x240 [ 3552.378730][T27168] __alloc_pages_nodemask+0x26c/0x310 [ 3552.384193][T27168] alloc_pages_current+0xd1/0x170 [ 3552.389239][T27168] pte_alloc_one+0x30/0xa0 [ 3552.393729][T27168] __pte_alloc+0x2d/0x220 [ 3552.398084][T27168] copy_page_range+0x151a/0x1a80 [ 3552.403073][T27168] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3552.408724][T27168] ? __vma_link_rb+0x3f4/0x440 [ 3552.413541][T27168] dup_mm+0x74a/0xba0 [ 3552.417594][T27168] copy_process+0x36f3/0x3b50 [ 3552.422373][T27168] _do_fork+0xfe/0x6e0 [ 3552.426464][T27168] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3552.432122][T27168] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3552.437777][T27168] ? __tsan_read8+0x2c/0x30 [ 3552.442304][T27168] __x64_sys_clone+0x12b/0x160 [ 3552.447186][T27168] do_syscall_64+0xcc/0x370 [ 3552.451753][T27168] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3552.457677][T27168] RIP: 0033:0x459f49 [ 3552.461954][T27168] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3552.482017][T27168] RSP: 002b:00007fa9090b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3552.490457][T27168] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3552.498452][T27168] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 23:34:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3552.506445][T27168] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 3552.514446][T27168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa9090b76d4 [ 3552.522438][T27168] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3552.568968][T27168] memory: usage 307200kB, limit 307200kB, failcnt 9774 [ 3552.610396][T27168] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3552.640961][T27168] Memory cgroup stats for /syz0: [ 3552.643905][T27168] anon 263688192 [ 3552.643905][T27168] file 36864 [ 3552.643905][T27168] kernel_stack 4497408 [ 3552.643905][T27168] slab 10403840 [ 3552.643905][T27168] sock 0 [ 3552.643905][T27168] shmem 73728 [ 3552.643905][T27168] file_mapped 135168 [ 3552.643905][T27168] file_dirty 0 [ 3552.643905][T27168] file_writeback 0 [ 3552.643905][T27168] anon_thp 230686720 [ 3552.643905][T27168] inactive_anon 0 [ 3552.643905][T27168] active_anon 263692288 [ 3552.643905][T27168] inactive_file 0 [ 3552.643905][T27168] active_file 28672 [ 3552.643905][T27168] unevictable 0 [ 3552.643905][T27168] slab_reclaimable 1351680 [ 3552.643905][T27168] slab_unreclaimable 9052160 [ 3552.643905][T27168] pgfault 237996 [ 3552.643905][T27168] pgmajfault 0 [ 3552.643905][T27168] workingset_refault 198 [ 3552.643905][T27168] workingset_activate 66 [ 3552.643905][T27168] workingset_nodereclaim 0 [ 3552.643905][T27168] pgrefill 3832 [ 3552.643905][T27168] pgscan 15716 [ 3552.643905][T27168] pgsteal 11708 [ 3552.872905][T27168] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=27023,uid=0 [ 3552.916689][T27168] Memory cgroup out of memory: Killed process 27023 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3552.951689][ T1061] oom_reaper: reaped process 27023 (syz-executor.0), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 3553.072782][T27304] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=3, oom_score_adj=1000 [ 3553.092145][T27304] CPU: 1 PID: 27304 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 3553.100072][T27304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3553.110428][T27304] Call Trace: [ 3553.113747][T27304] dump_stack+0xf5/0x159 [ 3553.118698][T27304] dump_header+0xaa/0x449 [ 3553.123065][T27304] oom_kill_process.cold+0x10/0x15 [ 3553.128278][T27304] out_of_memory+0x231/0xa00 [ 3553.132892][T27304] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3553.138571][T27304] mem_cgroup_out_of_memory+0x128/0x150 [ 3553.144197][T27304] try_charge+0xb3a/0xbc0 [ 3553.148561][T27304] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3553.154276][T27304] ? __tsan_read8+0x2c/0x30 [ 3553.158850][T27304] mem_cgroup_charge_skmem+0xd5/0x190 [ 3553.164248][T27304] __sk_mem_raise_allocated+0x32d/0x9f0 [ 3553.169903][T27304] __sk_mem_schedule+0x7a/0xd0 [ 3553.174780][T27304] tcp_sendmsg_locked+0xb08/0x1f30 [ 3553.179954][T27304] ? __tsan_read4+0x2c/0x30 [ 3553.184520][T27304] tcp_sendmsg+0x39/0x60 [ 3553.188783][T27304] inet_sendmsg+0x6d/0x90 [ 3553.193189][T27304] ? inet_send_prepare+0x200/0x200 [ 3553.198331][T27304] sock_sendmsg+0x9f/0xc0 [ 3553.202916][T27304] sock_write_iter+0x16b/0x210 [ 3553.207713][T27304] new_sync_write+0x388/0x4a0 [ 3553.212481][T27304] __vfs_write+0xb1/0xc0 [ 3553.217582][T27304] vfs_write+0x18a/0x390 [ 3553.221961][T27304] ksys_write+0xd5/0x1b0 [ 3553.226232][T27304] __x64_sys_write+0x4c/0x60 [ 3553.230836][T27304] do_syscall_64+0xcc/0x370 [ 3553.235448][T27304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3553.241326][T27304] RIP: 0033:0x459f49 [ 3553.245295][T27304] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3553.264905][T27304] RSP: 002b:00007f09a635bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:34:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:12 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:12 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3553.273350][T27304] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 3553.281317][T27304] RDX: 00000001000001bd RSI: 0000000020002300 RDI: 0000000000000003 [ 3553.289399][T27304] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 3553.297395][T27304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09a635c6d4 [ 3553.305371][T27304] R13: 00000000004ca5d8 R14: 00000000004e2730 R15: 00000000ffffffff [ 3553.343337][T27304] memory: usage 307200kB, limit 307200kB, failcnt 27821 [ 3553.375362][T27304] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3553.393402][T27304] Memory cgroup stats for /syz3: [ 3553.393692][T27304] anon 247341056 [ 3553.393692][T27304] file 110592 [ 3553.393692][T27304] kernel_stack 5787648 [ 3553.393692][T27304] slab 13275136 [ 3553.393692][T27304] sock 135168 [ 3553.393692][T27304] shmem 253952 [ 3553.393692][T27304] file_mapped 135168 [ 3553.393692][T27304] file_dirty 0 [ 3553.393692][T27304] file_writeback 0 [ 3553.393692][T27304] anon_thp 201326592 [ 3553.393692][T27304] inactive_anon 135168 [ 3553.393692][T27304] active_anon 247291904 23:34:12 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', 0x0) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3553.393692][T27304] inactive_file 0 [ 3553.393692][T27304] active_file 0 [ 3553.393692][T27304] unevictable 0 [ 3553.393692][T27304] slab_reclaimable 1757184 [ 3553.393692][T27304] slab_unreclaimable 11517952 [ 3553.393692][T27304] pgfault 242187 [ 3553.393692][T27304] pgmajfault 0 [ 3553.393692][T27304] workingset_refault 396 [ 3553.393692][T27304] workingset_activate 165 [ 3553.393692][T27304] workingset_nodereclaim 0 [ 3553.393692][T27304] pgrefill 4233 [ 3553.393692][T27304] pgscan 49510 [ 3553.393692][T27304] pgsteal 45699 23:34:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:13 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', 0x0) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3553.847917][T27304] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17684,uid=0 [ 3553.913870][T27304] Memory cgroup out of memory: Killed process 17684 (syz-executor.3) total-vm:72584kB, anon-rss:2208kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3554.038463][T27176] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3554.126531][T27176] CPU: 0 PID: 27176 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 3554.134460][T27176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3554.144514][T27176] Call Trace: [ 3554.147909][T27176] dump_stack+0xf5/0x159 [ 3554.152250][T27176] dump_header+0xaa/0x449 [ 3554.156602][T27176] oom_kill_process.cold+0x10/0x15 [ 3554.161734][T27176] out_of_memory+0x231/0xa00 [ 3554.166446][T27176] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3554.172259][T27176] mem_cgroup_out_of_memory+0x128/0x150 [ 3554.179316][T27176] try_charge+0x8c1/0xbc0 [ 3554.183695][T27176] ? rcu_note_context_switch+0x700/0x760 [ 3554.189397][T27176] mem_cgroup_try_charge+0xd2/0x260 [ 3554.194627][T27176] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3554.200338][T27176] __handle_mm_fault+0x179a/0x2cb0 [ 3554.205546][T27176] handle_mm_fault+0x21b/0x530 [ 3554.210357][T27176] __do_page_fault+0x3fb/0x9e0 [ 3554.215206][T27176] do_page_fault+0x54/0x233 [ 3554.219730][T27176] ? do_syscall_64+0x270/0x370 [ 3554.224540][T27176] page_fault+0x34/0x40 [ 3554.228707][T27176] RIP: 0033:0x45c8fd [ 3554.232664][T27176] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 e0 8c fb ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 3554.252495][T27176] RSP: 002b:00007ffc7a4e8378 EFLAGS: 00010202 [ 3554.258561][T27176] RAX: ffffffffffffffea RBX: 00007f09a631a700 RCX: 00007f09a631a700 [ 3554.266753][T27176] RDX: 00000000003d0f00 RSI: 00007f09a6319db0 RDI: 0000000000410b30 [ 3554.274741][T27176] RBP: 00007ffc7a4e8590 R08: 00007f09a631a9d0 R09: 00007f09a631a700 [ 3554.282720][T27176] R10: 00007f09a6319dc0 R11: 0000000000000246 R12: 0000000000000000 [ 3554.290718][T27176] R13: 00007ffc7a4e842f R14: 00007f09a631a9c0 R15: 000000000075c1cc [ 3554.300809][T27176] memory: usage 307176kB, limit 307200kB, failcnt 27832 [ 3554.314109][T27176] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3554.322191][T27176] Memory cgroup stats for /syz3: [ 3554.323137][T27176] anon 245256192 [ 3554.323137][T27176] file 110592 [ 3554.323137][T27176] kernel_stack 5787648 [ 3554.323137][T27176] slab 13275136 [ 3554.323137][T27176] sock 2314240 [ 3554.323137][T27176] shmem 253952 [ 3554.323137][T27176] file_mapped 135168 [ 3554.323137][T27176] file_dirty 0 [ 3554.323137][T27176] file_writeback 0 [ 3554.323137][T27176] anon_thp 199229440 [ 3554.323137][T27176] inactive_anon 135168 [ 3554.323137][T27176] active_anon 245215232 [ 3554.323137][T27176] inactive_file 0 [ 3554.323137][T27176] active_file 0 [ 3554.323137][T27176] unevictable 0 [ 3554.323137][T27176] slab_reclaimable 1757184 [ 3554.323137][T27176] slab_unreclaimable 11517952 [ 3554.323137][T27176] pgfault 242682 [ 3554.323137][T27176] pgmajfault 0 [ 3554.323137][T27176] workingset_refault 396 [ 3554.323137][T27176] workingset_activate 165 [ 3554.323137][T27176] workingset_nodereclaim 0 [ 3554.323137][T27176] pgrefill 4233 [ 3554.323137][T27176] pgscan 49510 [ 3554.323137][T27176] pgsteal 45699 [ 3554.425097][T27176] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=16617,uid=0 [ 3554.448079][T27176] Memory cgroup out of memory: Killed process 16617 (syz-executor.3) total-vm:72584kB, anon-rss:2208kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3554.494591][ T1061] oom_reaper: reaped process 16617 (syz-executor.3), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 3554.524384][T27433] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3554.563821][T27433] CPU: 0 PID: 27433 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3554.571759][T27433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3554.581921][T27433] Call Trace: [ 3554.585299][T27433] dump_stack+0xf5/0x159 [ 3554.589572][T27433] dump_header+0xaa/0x449 [ 3554.593949][T27433] oom_kill_process.cold+0x10/0x15 [ 3554.599117][T27433] out_of_memory+0x231/0xa00 [ 3554.603785][T27433] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3554.609468][T27433] mem_cgroup_out_of_memory+0x128/0x150 [ 3554.615055][T27433] try_charge+0xb3a/0xbc0 [ 3554.619409][T27433] ? get_page_from_freelist+0x8c0/0x1650 [ 3554.625067][T27433] ? __tsan_write4+0x32/0x40 [ 3554.629754][T27433] ? __rcu_read_unlock+0x66/0x3c0 [ 3554.634810][T27433] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3554.640350][T27433] __memcg_kmem_charge+0xde/0x240 [ 3554.645413][T27433] __alloc_pages_nodemask+0x26c/0x310 [ 3554.650833][T27433] alloc_pages_current+0xd1/0x170 [ 3554.655955][T27433] pte_alloc_one+0x30/0xa0 [ 3554.660408][T27433] __pte_alloc+0x2d/0x220 [ 3554.664766][T27433] copy_page_range+0x151a/0x1a80 [ 3554.669739][T27433] ? __kcsan_check_watchpoint+0x66/0x180 [ 3554.675428][T27433] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3554.681087][T27433] ? __vma_link_rb+0x3f4/0x440 [ 3554.685892][T27433] dup_mm+0x74a/0xba0 [ 3554.689978][T27433] copy_process+0x36f3/0x3b50 [ 3554.694805][T27433] _do_fork+0xfe/0x6e0 [ 3554.698999][T27433] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3554.704648][T27433] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3554.710305][T27433] ? __tsan_read8+0x2c/0x30 23:34:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in, 0x0, 0x0, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./bus\x00', 0x8143242, 0x0) close(r1) r2 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x101, 0x105082) pwritev(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x81000) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) fcntl$setstatus(r1, 0x4, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x80005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f00000000c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:34:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:14 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', 0x0) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:14 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', 0x0) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3554.714847][T27433] __x64_sys_clone+0x12b/0x160 [ 3554.719653][T27433] do_syscall_64+0xcc/0x370 [ 3554.724182][T27433] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3554.730236][T27433] RIP: 0033:0x459f49 [ 3554.734178][T27433] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3554.753805][T27433] RSP: 002b:00007f46fbab6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3554.762240][T27433] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 3554.770226][T27433] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3554.778218][T27433] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3554.786209][T27433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46fbab76d4 [ 3554.794247][T27433] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3554.850515][T27433] memory: usage 307200kB, limit 307200kB, failcnt 22451 [ 3554.863151][T27433] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3554.887435][T27433] Memory cgroup stats for /syz4: [ 3554.889711][T27433] anon 241692672 [ 3554.889711][T27433] file 651264 [ 3554.889711][T27433] kernel_stack 6303744 [ 3554.889711][T27433] slab 13828096 [ 3554.889711][T27433] sock 0 [ 3554.889711][T27433] shmem 696320 [ 3554.889711][T27433] file_mapped 0 [ 3554.889711][T27433] file_dirty 0 [ 3554.889711][T27433] file_writeback 0 [ 3554.889711][T27433] anon_thp 184549376 [ 3554.889711][T27433] inactive_anon 0 [ 3554.889711][T27433] active_anon 242290688 [ 3554.889711][T27433] inactive_file 61440 [ 3554.889711][T27433] active_file 0 [ 3554.889711][T27433] unevictable 0 [ 3554.889711][T27433] slab_reclaimable 1892352 [ 3554.889711][T27433] slab_unreclaimable 11935744 [ 3554.889711][T27433] pgfault 238722 [ 3554.889711][T27433] pgmajfault 0 [ 3554.889711][T27433] workingset_refault 462 [ 3554.889711][T27433] workingset_activate 165 [ 3554.889711][T27433] workingset_nodereclaim 0 [ 3554.889711][T27433] pgrefill 8161 [ 3554.889711][T27433] pgscan 35595 [ 3554.889711][T27433] pgsteal 14304 23:34:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3555.646775][T27433] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27430,uid=0 23:34:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3555.751832][T27433] Memory cgroup out of memory: Killed process 27430 (syz-executor.4) total-vm:72584kB, anon-rss:4212kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 3555.887280][T27669] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3555.937066][T27669] CPU: 1 PID: 27669 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3555.945108][T27669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3555.955184][T27669] Call Trace: [ 3555.958610][T27669] dump_stack+0xf5/0x159 [ 3555.963017][T27669] dump_header+0xaa/0x449 [ 3555.967460][T27669] oom_kill_process.cold+0x10/0x15 [ 3555.972692][T27669] out_of_memory+0x231/0xa00 [ 3555.977314][T27669] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3555.982990][T27669] mem_cgroup_out_of_memory+0x128/0x150 [ 3555.988586][T27669] try_charge+0xb3a/0xbc0 [ 3555.993060][T27669] ? rcu_note_context_switch+0x700/0x760 [ 3555.998738][T27669] mem_cgroup_try_charge+0xd2/0x260 [ 3556.003970][T27669] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3556.009789][T27669] wp_page_copy+0x322/0x1160 [ 3556.014408][T27669] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3556.020067][T27669] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3556.025998][T27669] do_wp_page+0x192/0x11f0 [ 3556.030511][T27669] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3556.036180][T27669] __handle_mm_fault+0x1c07/0x2cb0 [ 3556.041376][T27669] handle_mm_fault+0x21b/0x530 [ 3556.046217][T27669] __do_page_fault+0x3fb/0x9e0 [ 3556.051019][T27669] do_page_fault+0x54/0x233 [ 3556.055656][T27669] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3556.061472][T27669] page_fault+0x34/0x40 [ 3556.065677][T27669] RIP: 0033:0x43362e [ 3556.069610][T27669] Code: 15 eb 36 64 00 4c 89 c0 85 d2 0f 85 74 01 00 00 48 83 c4 08 5b 5d 41 5c 41 5d c3 90 be 01 00 00 00 83 3d 9c 4e 64 00 00 74 08 0f b1 33 75 07 eb 1b 0f b1 33 74 16 48 8d 3b 48 81 ec 80 00 00 [ 3556.089239][T27669] RSP: 002b:00007fff25964900 EFLAGS: 00010202 [ 3556.095330][T27669] RAX: 0000000000000000 RBX: 0000000000716640 RCX: 0000000000459f9a [ 3556.103397][T27669] RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000011 [ 3556.111393][T27669] RBP: 0000000000000110 R08: ffffffffffffffff R09: 0000000000000000 [ 3556.119875][T27669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff25964b20 [ 3556.127924][T27669] R13: 00007fa9090b7700 R14: 0000000000000001 R15: 000000000075bfd4 [ 3556.138637][ T1061] oom_reaper: reaped process 27430 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3556.373369][T27669] memory: usage 307200kB, limit 307200kB, failcnt 9847 [ 3556.385990][T27669] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3556.397308][T27669] Memory cgroup stats for /syz0: [ 3556.397589][T27669] anon 263770112 [ 3556.397589][T27669] file 36864 [ 3556.397589][T27669] kernel_stack 4497408 [ 3556.397589][T27669] slab 10403840 [ 3556.397589][T27669] sock 0 [ 3556.397589][T27669] shmem 73728 [ 3556.397589][T27669] file_mapped 135168 [ 3556.397589][T27669] file_dirty 0 [ 3556.397589][T27669] file_writeback 0 [ 3556.397589][T27669] anon_thp 230686720 [ 3556.397589][T27669] inactive_anon 0 [ 3556.397589][T27669] active_anon 263700480 [ 3556.397589][T27669] inactive_file 0 [ 3556.397589][T27669] active_file 28672 [ 3556.397589][T27669] unevictable 0 [ 3556.397589][T27669] slab_reclaimable 1351680 [ 3556.397589][T27669] slab_unreclaimable 9052160 [ 3556.397589][T27669] pgfault 238161 [ 3556.397589][T27669] pgmajfault 0 [ 3556.397589][T27669] workingset_refault 198 [ 3556.397589][T27669] workingset_activate 66 [ 3556.397589][T27669] workingset_nodereclaim 0 [ 3556.397589][T27669] pgrefill 3832 [ 3556.397589][T27669] pgscan 15716 [ 3556.397589][T27669] pgsteal 11708 [ 3556.497201][T27669] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=27547,uid=0 [ 3556.519998][T27669] Memory cgroup out of memory: Killed process 27547 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3556.549386][T27775] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 23:34:15 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:15 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', 0x0) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3556.577102][T27775] CPU: 0 PID: 27775 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3556.585441][T27775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3556.595795][T27775] Call Trace: [ 3556.599128][T27775] dump_stack+0xf5/0x159 [ 3556.603592][T27775] dump_header+0xaa/0x449 [ 3556.608215][T27775] oom_kill_process.cold+0x10/0x15 [ 3556.613433][T27775] out_of_memory+0x231/0xa00 [ 3556.618150][T27775] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3556.623921][T27775] mem_cgroup_out_of_memory+0x128/0x150 [ 3556.629611][T27775] try_charge+0x8c1/0xbc0 [ 3556.634148][T27775] ? get_page_from_freelist+0x8c0/0x1650 [ 3556.640364][T27775] ? __tsan_write4+0x32/0x40 [ 3556.644992][T27775] ? __rcu_read_unlock+0x66/0x3c0 [ 3556.650132][T27775] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3556.655663][T27775] __memcg_kmem_charge+0xde/0x240 [ 3556.661551][T27775] __alloc_pages_nodemask+0x26c/0x310 [ 3556.667254][T27775] alloc_pages_current+0xd1/0x170 [ 3556.672319][T27775] pte_alloc_one+0x30/0xa0 [ 3556.676831][T27775] __handle_mm_fault+0x296f/0x2cb0 [ 3556.682199][T27775] handle_mm_fault+0x21b/0x530 [ 3556.687004][T27775] __do_page_fault+0x3fb/0x9e0 [ 3556.691918][T27775] do_page_fault+0x54/0x233 [ 3556.696569][T27775] ? syscall_return_slowpath+0x1b8/0x220 [ 3556.702585][T27775] page_fault+0x34/0x40 [ 3556.706860][T27775] RIP: 0033:0x459f49 [ 3556.710948][T27775] Code: Bad RIP value. [ 3556.715253][T27775] RSP: 002b:00007fa9090d7c78 EFLAGS: 00010246 [ 3556.721522][T27775] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000459f49 [ 3556.729605][T27775] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3556.737664][T27775] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3556.745884][T27775] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa9090d86d4 [ 3556.754862][T27775] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff [ 3556.775694][T27775] memory: usage 302892kB, limit 307200kB, failcnt 9847 [ 3556.782711][T27775] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3556.794932][T27775] Memory cgroup stats for /syz0: [ 3556.795306][T27775] anon 259432448 [ 3556.795306][T27775] file 36864 [ 3556.795306][T27775] kernel_stack 4497408 [ 3556.795306][T27775] slab 10403840 [ 3556.795306][T27775] sock 0 [ 3556.795306][T27775] shmem 73728 [ 3556.795306][T27775] file_mapped 135168 [ 3556.795306][T27775] file_dirty 0 [ 3556.795306][T27775] file_writeback 0 [ 3556.795306][T27775] anon_thp 226492416 [ 3556.795306][T27775] inactive_anon 0 [ 3556.795306][T27775] active_anon 259436544 [ 3556.795306][T27775] inactive_file 0 [ 3556.795306][T27775] active_file 28672 [ 3556.795306][T27775] unevictable 0 [ 3556.795306][T27775] slab_reclaimable 1351680 [ 3556.795306][T27775] slab_unreclaimable 9052160 [ 3556.795306][T27775] pgfault 238161 [ 3556.795306][T27775] pgmajfault 0 [ 3556.795306][T27775] workingset_refault 198 [ 3556.795306][T27775] workingset_activate 66 [ 3556.795306][T27775] workingset_nodereclaim 0 [ 3556.795306][T27775] pgrefill 3832 [ 3556.795306][T27775] pgscan 15716 [ 3556.795306][T27775] pgsteal 11708 [ 3557.027406][T27775] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=26975,uid=0 23:34:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(0xffffffffffffffff, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3557.139890][T27775] Memory cgroup out of memory: Killed process 26975 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 23:34:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3557.371727][T27671] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3557.438607][T27671] CPU: 0 PID: 27671 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3557.446749][T27671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3557.457084][T27671] Call Trace: [ 3557.460550][T27671] dump_stack+0xf5/0x159 [ 3557.464914][T27671] dump_header+0xaa/0x449 [ 3557.469484][T27671] oom_kill_process.cold+0x10/0x15 [ 3557.474729][T27671] out_of_memory+0x231/0xa00 [ 3557.479411][T27671] ? __mutex_lock.isra.0+0x31f/0x740 [ 3557.484823][T27671] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3557.490535][T27671] mem_cgroup_out_of_memory+0x128/0x150 [ 3557.496269][T27671] try_charge+0x8c1/0xbc0 [ 3557.500646][T27671] ? rcu_note_context_switch+0x700/0x760 [ 3557.506429][T27671] mem_cgroup_try_charge+0xd2/0x260 [ 3557.511824][T27671] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3557.517693][T27671] wp_page_copy+0x322/0x1160 [ 3557.522367][T27671] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3557.528140][T27671] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3557.533826][T27671] do_wp_page+0x192/0x11f0 [ 3557.538280][T27671] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3557.543961][T27671] __handle_mm_fault+0x1c07/0x2cb0 [ 3557.549137][T27671] handle_mm_fault+0x21b/0x530 [ 3557.554005][T27671] __do_page_fault+0x3fb/0x9e0 [ 3557.558927][T27671] do_page_fault+0x54/0x233 [ 3557.563551][T27671] ? do_syscall_64+0x270/0x370 [ 3557.568678][T27671] page_fault+0x34/0x40 [ 3557.572950][T27671] RIP: 0033:0x405308 [ 3557.577072][T27671] Code: 85 02 00 00 80 3d 0f cf 66 00 00 c6 85 84 00 00 00 00 74 0f 8b 05 fc ce 66 00 39 45 24 0f 84 e7 01 00 00 44 8b a5 80 00 00 00 b3 d2 ff ff 48 2b 05 fc 2c 33 00 8b 75 00 49 89 d8 45 89 e1 4c [ 3557.596803][T27671] RSP: 002b:00007fa9090d7c90 EFLAGS: 00010246 [ 3557.602907][T27671] RAX: 00007fa90b0d9000 RBX: 00000000000034ee RCX: 0000000000459f49 [ 3557.611020][T27671] RDX: 000000000003ffff RSI: 0000000000000000 RDI: 0000000000000000 [ 3557.619113][T27671] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3557.627122][T27671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3557.635289][T27671] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:34:17 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(0xffffffffffffffff, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3558.037851][T27671] memory: usage 298512kB, limit 307200kB, failcnt 9847 [ 3558.077482][T27671] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3558.084916][T27671] Memory cgroup stats for /syz0: [ 3558.086458][T27671] anon 255131648 [ 3558.086458][T27671] file 36864 [ 3558.086458][T27671] kernel_stack 4460544 [ 3558.086458][T27671] slab 10403840 [ 3558.086458][T27671] sock 0 [ 3558.086458][T27671] shmem 73728 [ 3558.086458][T27671] file_mapped 135168 [ 3558.086458][T27671] file_dirty 0 [ 3558.086458][T27671] file_writeback 0 [ 3558.086458][T27671] anon_thp 222298112 [ 3558.086458][T27671] inactive_anon 0 [ 3558.086458][T27671] active_anon 255135744 [ 3558.086458][T27671] inactive_file 0 [ 3558.086458][T27671] active_file 28672 [ 3558.086458][T27671] unevictable 0 [ 3558.086458][T27671] slab_reclaimable 1351680 [ 3558.086458][T27671] slab_unreclaimable 9052160 [ 3558.086458][T27671] pgfault 238194 [ 3558.086458][T27671] pgmajfault 0 [ 3558.086458][T27671] workingset_refault 198 [ 3558.086458][T27671] workingset_activate 66 [ 3558.086458][T27671] workingset_nodereclaim 0 [ 3558.086458][T27671] pgrefill 3832 [ 3558.086458][T27671] pgscan 15716 [ 3558.086458][T27671] pgsteal 11708 [ 3558.255724][T27671] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4353,uid=0 [ 3558.277576][T27671] Memory cgroup out of memory: Killed process 4353 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 23:34:18 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(0xffffffffffffffff, r0, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:18 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:19 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:19 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:19 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:20 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:20 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:20 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:21 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, 0x0, 0x0, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:22 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:22 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:22 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3563.392917][T29107] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3563.466712][T29107] CPU: 1 PID: 29107 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3563.474671][T29107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3563.484867][T29107] Call Trace: [ 3563.488204][T29107] dump_stack+0xf5/0x159 [ 3563.492487][T29107] dump_header+0xaa/0x449 [ 3563.496991][T29107] oom_kill_process.cold+0x10/0x15 [ 3563.502217][T29107] out_of_memory+0x231/0xa00 [ 3563.506886][T29107] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3563.512551][T29107] mem_cgroup_out_of_memory+0x128/0x150 [ 3563.518164][T29107] try_charge+0xb3a/0xbc0 [ 3563.522517][T29107] ? __tsan_write4+0x32/0x40 [ 3563.527145][T29107] ? __rcu_read_unlock+0x66/0x3c0 [ 3563.532269][T29107] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3563.537814][T29107] __memcg_kmem_charge+0xde/0x240 [ 3563.543010][T29107] copy_process+0x11d2/0x3b50 [ 3563.547835][T29107] ? record_times+0x16/0x90 [ 3563.552456][T29107] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3563.558209][T29107] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3563.563866][T29107] _do_fork+0xfe/0x6e0 [ 3563.568000][T29107] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3563.573791][T29107] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3563.579455][T29107] ? blkcg_maybe_throttle_current+0x472/0x610 [ 3563.586017][T29107] __x64_sys_clone+0x12b/0x160 [ 3563.590886][T29107] do_syscall_64+0xcc/0x370 [ 3563.595491][T29107] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3563.601394][T29107] RIP: 0033:0x45c919 [ 3563.605359][T29107] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3563.625321][T29107] RSP: 002b:00007ffce38d44a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3563.633837][T29107] RAX: ffffffffffffffda RBX: 00007fc56dcf0700 RCX: 000000000045c919 [ 3563.641824][T29107] RDX: 00007fc56dcf09d0 RSI: 00007fc56dcefdb0 RDI: 00000000003d0f00 [ 3563.649995][T29107] RBP: 00007ffce38d46c0 R08: 00007fc56dcf0700 R09: 00007fc56dcf0700 [ 3563.658016][T29107] R10: 00007fc56dcf09d0 R11: 0000000000000202 R12: 0000000000000000 23:34:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3563.666099][T29107] R13: 00007ffce38d455f R14: 00007fc56dcf09c0 R15: 000000000075bfd4 23:34:23 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3563.729311][T29107] memory: usage 307200kB, limit 307200kB, failcnt 18982 [ 3563.748501][T29107] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3563.773668][T29107] Memory cgroup stats for /syz2: [ 3563.774074][T29107] anon 250572800 [ 3563.774074][T29107] file 12288 [ 3563.774074][T29107] kernel_stack 5787648 [ 3563.774074][T29107] slab 12582912 [ 3563.774074][T29107] sock 28672 [ 3563.774074][T29107] shmem 151552 [ 3563.774074][T29107] file_mapped 0 [ 3563.774074][T29107] file_dirty 135168 [ 3563.774074][T29107] file_writeback 0 [ 3563.774074][T29107] anon_thp 207618048 [ 3563.774074][T29107] inactive_anon 196608 [ 3563.774074][T29107] active_anon 250556416 [ 3563.774074][T29107] inactive_file 49152 [ 3563.774074][T29107] active_file 0 [ 3563.774074][T29107] unevictable 135168 [ 3563.774074][T29107] slab_reclaimable 1757184 [ 3563.774074][T29107] slab_unreclaimable 10825728 [ 3563.774074][T29107] pgfault 271953 [ 3563.774074][T29107] pgmajfault 0 [ 3563.774074][T29107] workingset_refault 297 [ 3563.774074][T29107] workingset_activate 132 [ 3563.774074][T29107] workingset_nodereclaim 0 [ 3563.774074][T29107] pgrefill 4438 [ 3563.774074][T29107] pgscan 36864 [ 3563.774074][T29107] pgsteal 32785 [ 3563.884128][T29107] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=22971,uid=0 [ 3563.931960][T29107] Memory cgroup out of memory: Killed process 22971 (syz-executor.2) total-vm:72584kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 23:34:23 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, 0x0, 0x0, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3564.157500][T29115] syz-executor.2 invoked oom-killer: gfp_mask=0x101cca(GFP_HIGHUSER_MOVABLE|__GFP_WRITE), order=0, oom_score_adj=1000 [ 3564.300530][T29115] CPU: 1 PID: 29115 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 3564.308651][T29115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3564.318726][T29115] Call Trace: [ 3564.322103][T29115] dump_stack+0xf5/0x159 [ 3564.326658][T29115] dump_header+0xaa/0x449 [ 3564.331036][T29115] oom_kill_process.cold+0x10/0x15 [ 3564.336209][T29115] out_of_memory+0x231/0xa00 [ 3564.340830][T29115] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3564.346538][T29115] mem_cgroup_out_of_memory+0x128/0x150 [ 3564.352133][T29115] try_charge+0x8c1/0xbc0 [ 3564.357642][T29115] ? rcu_note_context_switch+0x700/0x760 [ 3564.363478][T29115] mem_cgroup_try_charge+0xd2/0x260 [ 3564.368727][T29115] __add_to_page_cache_locked+0x163/0x780 [ 3564.374531][T29115] ? __read_once_size.constprop.0+0x20/0x20 [ 3564.380467][T29115] add_to_page_cache_lru+0xe2/0x2d0 [ 3564.385755][T29115] pagecache_get_page+0x2ab/0x760 [ 3564.390831][T29115] grab_cache_page_write_begin+0x5d/0x90 [ 3564.396624][T29115] ext4_da_write_begin+0x175/0x7e0 [ 3564.401806][T29115] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3564.407489][T29115] generic_perform_write+0x136/0x320 [ 3564.412973][T29115] __generic_file_write_iter+0x251/0x380 [ 3564.418826][T29115] ext4_file_write_iter+0x1bd/0xa00 [ 3564.424088][T29115] new_sync_write+0x388/0x4a0 [ 3564.428819][T29115] __vfs_write+0xb1/0xc0 [ 3564.433264][T29115] vfs_write+0x18a/0x390 [ 3564.437668][T29115] ksys_write+0xd5/0x1b0 [ 3564.441953][T29115] __x64_sys_write+0x4c/0x60 [ 3564.446655][T29115] do_syscall_64+0xcc/0x370 [ 3564.451197][T29115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3564.457298][T29115] RIP: 0033:0x459f49 [ 3564.461254][T29115] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3564.481057][T29115] RSP: 002b:00007fc56dd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3564.489621][T29115] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 3564.497764][T29115] RDX: 00000000fffffe38 RSI: 0000000020000080 RDI: 0000000000000003 [ 3564.505814][T29115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3564.513811][T29115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc56dd116d4 [ 3564.522136][T29115] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 00000000ffffffff 23:34:24 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3564.847096][T29115] memory: usage 302828kB, limit 307200kB, failcnt 18982 [ 3564.882445][T29115] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3564.921913][T29115] Memory cgroup stats for /syz2: [ 3564.925005][T29115] anon 246292480 [ 3564.925005][T29115] file 12288 [ 3564.925005][T29115] kernel_stack 5787648 [ 3564.925005][T29115] slab 12582912 [ 3564.925005][T29115] sock 28672 [ 3564.925005][T29115] shmem 151552 [ 3564.925005][T29115] file_mapped 0 [ 3564.925005][T29115] file_dirty 135168 [ 3564.925005][T29115] file_writeback 0 [ 3564.925005][T29115] anon_thp 203423744 [ 3564.925005][T29115] inactive_anon 196608 [ 3564.925005][T29115] active_anon 246276096 23:34:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3564.925005][T29115] inactive_file 49152 [ 3564.925005][T29115] active_file 0 [ 3564.925005][T29115] unevictable 135168 [ 3564.925005][T29115] slab_reclaimable 1757184 [ 3564.925005][T29115] slab_unreclaimable 10825728 [ 3564.925005][T29115] pgfault 271986 [ 3564.925005][T29115] pgmajfault 0 [ 3564.925005][T29115] workingset_refault 297 [ 3564.925005][T29115] workingset_activate 132 [ 3564.925005][T29115] workingset_nodereclaim 0 [ 3564.925005][T29115] pgrefill 4438 [ 3564.925005][T29115] pgscan 36864 [ 3564.925005][T29115] pgsteal 32785 [ 3565.054359][T29115] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=22962,uid=0 [ 3565.076551][T29115] Memory cgroup out of memory: Killed process 22962 (syz-executor.2) total-vm:72584kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 23:34:24 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3565.345082][T29104] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3565.390873][T29104] CPU: 0 PID: 29104 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 3565.398948][T29104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3565.409024][T29104] Call Trace: [ 3565.412537][T29104] dump_stack+0xf5/0x159 [ 3565.416896][T29104] dump_header+0xaa/0x449 [ 3565.421282][T29104] oom_kill_process.cold+0x10/0x15 [ 3565.426597][T29104] out_of_memory+0x231/0xa00 [ 3565.431229][T29104] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3565.437025][T29104] mem_cgroup_out_of_memory+0x128/0x150 [ 3565.442627][T29104] try_charge+0xb3a/0xbc0 [ 3565.447058][T29104] ? rcu_note_context_switch+0x700/0x760 [ 3565.453062][T29104] mem_cgroup_try_charge+0xd2/0x260 [ 3565.458763][T29104] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3565.464603][T29104] wp_page_copy+0x322/0x1160 [ 3565.469224][T29104] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3565.474903][T29104] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3565.480679][T29104] do_wp_page+0x192/0x11f0 [ 3565.485123][T29104] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3565.490797][T29104] __handle_mm_fault+0x1c07/0x2cb0 [ 3565.496041][T29104] handle_mm_fault+0x21b/0x530 [ 3565.501047][T29104] __do_page_fault+0x3fb/0x9e0 [ 3565.505921][T29104] do_page_fault+0x54/0x233 [ 3565.510727][T29104] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3565.516492][T29104] page_fault+0x34/0x40 [ 3565.520676][T29104] RIP: 0033:0x40ef98 [ 3565.524696][T29104] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf e1 f6 4b 00 31 c0 e8 63 2e ff ff 31 ff e8 ac 2a ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 32 66 00 [ 3565.544591][T29104] RSP: 002b:00007ffc7a4e83e0 EFLAGS: 00010246 [ 3565.550681][T29104] RAX: 00000000cbf452cb RBX: 0000000061748ea3 RCX: 0000001b2e520000 [ 3565.558859][T29104] RDX: 0000000000000000 RSI: 00000000000012cb RDI: ffffffffcbf452cb [ 3565.567024][T29104] RBP: 0000000000000007 R08: 00000000cbf452cb R09: 00000000cbf452cf [ 3565.575236][T29104] R10: 00007ffc7a4e8580 R11: 0000000000000246 R12: 000000000075bfa8 [ 3565.583305][T29104] R13: 0000000080000000 R14: 00007f09a839f008 R15: 000000000000000c [ 3565.605088][T29104] memory: usage 307200kB, limit 307200kB, failcnt 28040 [ 3565.637279][T29104] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3565.644326][T29104] Memory cgroup stats for /syz3: [ 3565.644574][T29104] anon 247418880 [ 3565.644574][T29104] file 12288 [ 3565.644574][T29104] kernel_stack 5787648 [ 3565.644574][T29104] slab 13275136 [ 3565.644574][T29104] sock 0 [ 3565.644574][T29104] shmem 253952 [ 3565.644574][T29104] file_mapped 135168 [ 3565.644574][T29104] file_dirty 0 [ 3565.644574][T29104] file_writeback 0 [ 3565.644574][T29104] anon_thp 201326592 [ 3565.644574][T29104] inactive_anon 135168 [ 3565.644574][T29104] active_anon 247394304 [ 3565.644574][T29104] inactive_file 0 [ 3565.644574][T29104] active_file 0 [ 3565.644574][T29104] unevictable 0 [ 3565.644574][T29104] slab_reclaimable 1757184 [ 3565.644574][T29104] slab_unreclaimable 11517952 [ 3565.644574][T29104] pgfault 243309 [ 3565.644574][T29104] pgmajfault 0 [ 3565.644574][T29104] workingset_refault 396 [ 3565.644574][T29104] workingset_activate 165 [ 3565.644574][T29104] workingset_nodereclaim 0 [ 3565.644574][T29104] pgrefill 4233 [ 3565.644574][T29104] pgscan 49510 [ 3565.644574][T29104] pgsteal 45732 [ 3565.871407][T29104] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=28453,uid=0 [ 3565.893200][T29104] Memory cgroup out of memory: Killed process 28453 (syz-executor.3) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 3565.920735][ T1061] oom_reaper: reaped process 28453 (syz-executor.3), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 3565.939691][T29258] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3565.960887][T29258] CPU: 1 PID: 29258 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3565.968829][T29258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3565.978921][T29258] Call Trace: [ 3565.982439][T29258] dump_stack+0xf5/0x159 [ 3565.986737][T29258] dump_header+0xaa/0x449 [ 3565.991108][T29258] oom_kill_process.cold+0x10/0x15 [ 3565.996333][T29258] out_of_memory+0x231/0xa00 [ 3566.001027][T29258] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3566.006804][T29258] mem_cgroup_out_of_memory+0x128/0x150 [ 3566.012443][T29258] try_charge+0xb3a/0xbc0 [ 3566.016827][T29258] ? rcu_note_context_switch+0x700/0x760 [ 3566.022506][T29258] mem_cgroup_try_charge+0xd2/0x260 [ 3566.027749][T29258] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3566.033423][T29258] __handle_mm_fault+0x179a/0x2cb0 [ 3566.038595][T29258] handle_mm_fault+0x21b/0x530 [ 3566.043411][T29258] __do_page_fault+0x3fb/0x9e0 [ 3566.048301][T29258] do_page_fault+0x54/0x233 [ 3566.052892][T29258] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3566.058724][T29258] page_fault+0x34/0x40 [ 3566.063015][T29258] RIP: 0033:0x400644 [ 3566.067121][T29258] Code: 06 e9 49 01 00 00 48 8b 44 24 10 48 0b 44 24 28 75 1f 48 8b 14 24 48 8b 7c 24 20 be 04 00 00 00 e8 21 5a 00 00 48 8b 74 24 08 <89> 06 e9 1e 01 00 00 48 8b 44 24 08 48 8b 14 24 be 04 00 00 00 8b [ 3566.087406][T29258] RSP: 002b:00007fff25964a00 EFLAGS: 00010202 [ 3566.093625][T29258] RAX: 0000000000000002 RBX: 000000000075c9a0 RCX: 0000000000000000 [ 3566.101819][T29258] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000002 [ 3566.109806][T29258] RBP: 0000000000760888 R08: 0000000000000000 R09: 0000000000000000 [ 3566.117892][T29258] R10: 00007fff25964b10 R11: 0000000000000246 R12: 000000000075bf20 [ 3566.126008][T29258] R13: 000000000036626c R14: 0000000000760890 R15: 000000000075bf2c [ 3566.137274][T29258] memory: usage 307200kB, limit 307200kB, failcnt 9908 [ 3566.145948][T29258] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3566.155344][T29258] Memory cgroup stats for /syz0: [ 3566.155624][T29258] anon 263770112 [ 3566.155624][T29258] file 36864 [ 3566.155624][T29258] kernel_stack 4460544 [ 3566.155624][T29258] slab 10403840 [ 3566.155624][T29258] sock 0 [ 3566.155624][T29258] shmem 73728 [ 3566.155624][T29258] file_mapped 135168 [ 3566.155624][T29258] file_dirty 0 [ 3566.155624][T29258] file_writeback 0 [ 3566.155624][T29258] anon_thp 230686720 [ 3566.155624][T29258] inactive_anon 0 [ 3566.155624][T29258] active_anon 263700480 [ 3566.155624][T29258] inactive_file 0 [ 3566.155624][T29258] active_file 28672 [ 3566.155624][T29258] unevictable 0 [ 3566.155624][T29258] slab_reclaimable 1351680 [ 3566.155624][T29258] slab_unreclaimable 9052160 [ 3566.155624][T29258] pgfault 238623 [ 3566.155624][T29258] pgmajfault 0 [ 3566.155624][T29258] workingset_refault 198 [ 3566.155624][T29258] workingset_activate 66 [ 3566.155624][T29258] workingset_nodereclaim 0 [ 3566.155624][T29258] pgrefill 3832 [ 3566.155624][T29258] pgscan 15749 [ 3566.155624][T29258] pgsteal 11741 [ 3566.255371][T29258] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=29114,uid=0 [ 3566.275708][T29258] Memory cgroup out of memory: Killed process 29114 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3566.301475][ T1061] oom_reaper: reaped process 29114 (syz-executor.0), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 23:34:25 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:25 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3566.581481][T29499] syz-executor.4 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=1000 [ 3566.697172][T29499] CPU: 0 PID: 29499 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3566.705150][T29499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3566.715221][T29499] Call Trace: [ 3566.718612][T29499] dump_stack+0xf5/0x159 [ 3566.722968][T29499] dump_header+0xaa/0x449 [ 3566.727360][T29499] oom_kill_process.cold+0x10/0x15 [ 3566.732510][T29499] out_of_memory+0x231/0xa00 [ 3566.737122][T29499] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3566.742813][T29499] mem_cgroup_out_of_memory+0x128/0x150 [ 3566.748492][T29499] try_charge+0xb3a/0xbc0 [ 3566.752841][T29499] ? __tsan_read4+0x2c/0x30 [ 3566.757408][T29499] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3566.762906][T29499] cache_grow_begin+0x3ed/0x670 [ 3566.767819][T29499] fallback_alloc+0x161/0x1f0 [ 3566.772564][T29499] ____cache_alloc_node+0x1b1/0x1c0 [ 3566.777849][T29499] ? debug_smp_processor_id+0x4c/0x172 [ 3566.783355][T29499] __kmalloc+0x1ac/0x690 [ 3566.787621][T29499] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3566.793279][T29499] ? __seq_open_private+0x2e/0xb0 [ 3566.798362][T29499] __seq_open_private+0x2e/0xb0 [ 3566.803242][T29499] seq_open_net+0x111/0x1a0 [ 3566.807782][T29499] ? proc_create_net_single_write+0xd0/0xd0 [ 3566.813737][T29499] proc_reg_open+0x12d/0x2f0 [ 3566.818364][T29499] do_dentry_open+0x2f4/0x8f0 [ 3566.823116][T29499] ? security_inode_permission+0xa5/0xc0 [ 3566.828839][T29499] ? __write_once_size.constprop.0+0x20/0x20 [ 3566.834852][T29499] vfs_open+0x62/0x80 [ 3566.838866][T29499] path_openat+0xf75/0x36e0 [ 3566.843465][T29499] ? audit_filter_rules.constprop.0+0x14b0/0x1f90 [ 3566.849933][T29499] do_filp_open+0x11e/0x1b0 [ 3566.854517][T29499] ? simple_attr_release+0x40/0x40 [ 3566.859697][T29499] do_sys_open+0x3b3/0x4f0 [ 3566.864152][T29499] __x64_sys_open+0x55/0x70 [ 3566.868688][T29499] do_syscall_64+0xcc/0x370 [ 3566.873294][T29499] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3566.879202][T29499] RIP: 0033:0x413ce1 [ 3566.883128][T29499] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3566.902746][T29499] RSP: 002b:00007f46fbab6bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3566.911210][T29499] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000413ce1 [ 3566.919253][T29499] RDX: fffffffffffffff3 RSI: 0000000000000000 RDI: 00007f46fbab6bd0 [ 3566.927243][T29499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000013 [ 3566.935235][T29499] R10: 0000000000000008 R11: 0000000000000293 R12: 00007f46fbab76d4 23:34:26 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, 0x0, 0x0, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3566.943222][T29499] R13: 00000000004c9a8b R14: 00000000004e1548 R15: 00000000ffffffff 23:34:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3566.982746][T29499] memory: usage 307200kB, limit 307200kB, failcnt 22524 [ 3566.995805][T29499] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3567.014559][T29499] Memory cgroup stats for /syz4: [ 3567.014780][T29499] anon 240312320 [ 3567.014780][T29499] file 516096 [ 3567.014780][T29499] kernel_stack 6414336 [ 3567.014780][T29499] slab 13963264 [ 3567.014780][T29499] sock 0 [ 3567.014780][T29499] shmem 696320 [ 3567.014780][T29499] file_mapped 0 [ 3567.014780][T29499] file_dirty 0 [ 3567.014780][T29499] file_writeback 0 [ 3567.014780][T29499] anon_thp 182452224 [ 3567.014780][T29499] inactive_anon 0 [ 3567.014780][T29499] active_anon 240971776 [ 3567.014780][T29499] inactive_file 61440 [ 3567.014780][T29499] active_file 0 [ 3567.014780][T29499] unevictable 0 [ 3567.014780][T29499] slab_reclaimable 1892352 [ 3567.014780][T29499] slab_unreclaimable 12070912 [ 3567.014780][T29499] pgfault 239514 23:34:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3567.014780][T29499] pgmajfault 0 [ 3567.014780][T29499] workingset_refault 495 [ 3567.014780][T29499] workingset_activate 165 [ 3567.014780][T29499] workingset_nodereclaim 0 [ 3567.014780][T29499] pgrefill 8227 [ 3567.014780][T29499] pgscan 35661 [ 3567.014780][T29499] pgsteal 14304 [ 3567.187069][T29499] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=5909,uid=0 [ 3567.231549][T29499] Memory cgroup out of memory: Killed process 5909 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 23:34:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3567.541740][T29498] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3567.598348][T29498] CPU: 1 PID: 29498 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3567.606301][T29498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3567.616369][T29498] Call Trace: [ 3567.619787][T29498] dump_stack+0xf5/0x159 [ 3567.624064][T29498] dump_header+0xaa/0x449 [ 3567.628493][T29498] oom_kill_process.cold+0x10/0x15 [ 3567.633655][T29498] out_of_memory+0x231/0xa00 [ 3567.638341][T29498] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3567.644059][T29498] mem_cgroup_out_of_memory+0x128/0x150 [ 3567.649746][T29498] try_charge+0x8c1/0xbc0 [ 3567.654107][T29498] ? rcu_note_context_switch+0x700/0x760 [ 3567.659849][T29498] mem_cgroup_try_charge+0xd2/0x260 [ 3567.665138][T29498] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3567.670808][T29498] __handle_mm_fault+0x179a/0x2cb0 [ 3567.675970][T29498] handle_mm_fault+0x21b/0x530 [ 3567.680819][T29498] __do_page_fault+0x3fb/0x9e0 [ 3567.685613][T29498] do_page_fault+0x54/0x233 [ 3567.690179][T29498] ? do_syscall_64+0x270/0x370 [ 3567.694967][T29498] page_fault+0x34/0x40 [ 3567.699136][T29498] RIP: 0033:0x41173f [ 3567.703138][T29498] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 3567.722854][T29498] RSP: 002b:00007ffdf09f9010 EFLAGS: 00010206 [ 3567.728942][T29498] RAX: 00007f46fba76000 RBX: 0000000000020000 RCX: 0000000000459f9a [ 3567.737074][T29498] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 3567.745092][T29498] RBP: 00007ffdf09f90f0 R08: ffffffffffffffff R09: 0000000000000000 [ 3567.753078][T29498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdf09f91e0 [ 3567.761109][T29498] R13: 00007f46fba96700 R14: 0000000000000001 R15: 000000000075bfd4 23:34:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:27 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x7) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3567.997315][T29498] memory: usage 304888kB, limit 307200kB, failcnt 22524 [ 3568.028875][T29498] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:34:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:27 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3568.267054][T29498] Memory cgroup stats for /syz4: [ 3568.267355][T29498] anon 238256128 [ 3568.267355][T29498] file 516096 [ 3568.267355][T29498] kernel_stack 6414336 [ 3568.267355][T29498] slab 13963264 [ 3568.267355][T29498] sock 0 [ 3568.267355][T29498] shmem 696320 [ 3568.267355][T29498] file_mapped 0 [ 3568.267355][T29498] file_dirty 0 [ 3568.267355][T29498] file_writeback 0 [ 3568.267355][T29498] anon_thp 180355072 [ 3568.267355][T29498] inactive_anon 0 [ 3568.267355][T29498] active_anon 238915584 [ 3568.267355][T29498] inactive_file 61440 [ 3568.267355][T29498] active_file 0 [ 3568.267355][T29498] unevictable 0 [ 3568.267355][T29498] slab_reclaimable 1892352 [ 3568.267355][T29498] slab_unreclaimable 12070912 [ 3568.267355][T29498] pgfault 239514 [ 3568.267355][T29498] pgmajfault 0 [ 3568.267355][T29498] workingset_refault 495 [ 3568.267355][T29498] workingset_activate 165 [ 3568.267355][T29498] workingset_nodereclaim 0 [ 3568.267355][T29498] pgrefill 8227 [ 3568.267355][T29498] pgscan 35661 [ 3568.267355][T29498] pgsteal 14304 [ 3568.485765][T29498] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=5878,uid=0 [ 3568.577624][T29498] Memory cgroup out of memory: Killed process 5878 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3568.660680][ T1061] oom_reaper: reaped process 5878 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 23:34:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:28 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:28 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3570.070709][T29921] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3570.183264][T29921] CPU: 1 PID: 29921 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3570.191205][T29921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3570.202830][T29921] Call Trace: [ 3570.206153][T29921] dump_stack+0xf5/0x159 [ 3570.210421][T29921] dump_header+0xaa/0x449 [ 3570.214889][T29921] oom_kill_process.cold+0x10/0x15 [ 3570.220027][T29921] out_of_memory+0x231/0xa00 [ 3570.224676][T29921] ? __kcsan_setup_watchpoint+0x6b/0x4a0 23:34:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3570.230338][T29921] mem_cgroup_out_of_memory+0x128/0x150 [ 3570.235919][T29921] try_charge+0xb3a/0xbc0 [ 3570.240281][T29921] ? rcu_note_context_switch+0x700/0x760 [ 3570.245945][T29921] mem_cgroup_try_charge+0xd2/0x260 [ 3570.251192][T29921] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3570.256846][T29921] __handle_mm_fault+0x179a/0x2cb0 [ 3570.262011][T29921] handle_mm_fault+0x21b/0x530 [ 3570.266815][T29921] __do_page_fault+0x3fb/0x9e0 [ 3570.271684][T29921] do_page_fault+0x54/0x233 [ 3570.276212][T29921] ? do_syscall_64+0x270/0x370 [ 3570.281011][T29921] page_fault+0x34/0x40 [ 3570.285170][T29921] RIP: 0033:0x45c8fd [ 3570.289101][T29921] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 e0 8c fb ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 3570.308752][T29921] RSP: 002b:00007ffdf09f8fc8 EFLAGS: 00010202 [ 3570.314909][T29921] RAX: ffffffffffffffea RBX: 00007f46fba75700 RCX: 00007f46fba75700 [ 3570.323335][T29921] RDX: 00000000003d0f00 RSI: 00007f46fba74db0 RDI: 0000000000410b30 23:34:29 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3570.331334][T29921] RBP: 00007ffdf09f91e0 R08: 00007f46fba759d0 R09: 00007f46fba75700 [ 3570.339316][T29921] R10: 00007f46fba74dc0 R11: 0000000000000246 R12: 0000000000000000 [ 3570.347425][T29921] R13: 00007ffdf09f907f R14: 00007f46fba759c0 R15: 000000000075c07c [ 3570.377089][T29921] memory: usage 307200kB, limit 307200kB, failcnt 22582 [ 3570.394822][T29921] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:34:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3570.453606][T29921] Memory cgroup stats for /syz4: [ 3570.453847][T29921] anon 240431104 [ 3570.453847][T29921] file 516096 [ 3570.453847][T29921] kernel_stack 6414336 [ 3570.453847][T29921] slab 13963264 [ 3570.453847][T29921] sock 0 [ 3570.453847][T29921] shmem 696320 [ 3570.453847][T29921] file_mapped 0 [ 3570.453847][T29921] file_dirty 0 [ 3570.453847][T29921] file_writeback 0 [ 3570.453847][T29921] anon_thp 182452224 [ 3570.453847][T29921] inactive_anon 0 [ 3570.453847][T29921] active_anon 241025024 [ 3570.453847][T29921] inactive_file 61440 [ 3570.453847][T29921] active_file 0 [ 3570.453847][T29921] unevictable 0 [ 3570.453847][T29921] slab_reclaimable 1892352 [ 3570.453847][T29921] slab_unreclaimable 12070912 [ 3570.453847][T29921] pgfault 239646 [ 3570.453847][T29921] pgmajfault 0 [ 3570.453847][T29921] workingset_refault 495 [ 3570.453847][T29921] workingset_activate 165 [ 3570.453847][T29921] workingset_nodereclaim 0 [ 3570.453847][T29921] pgrefill 8227 [ 3570.453847][T29921] pgscan 35661 [ 3570.453847][T29921] pgsteal 14304 23:34:30 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3570.841465][T29921] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=29921,uid=0 23:34:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') [ 3571.403018][T29921] Memory cgroup out of memory: Killed process 29921 (syz-executor.4) total-vm:72848kB, anon-rss:4268kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 3571.454613][ T1061] oom_reaper: reaped process 29921 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3571.479277][T30065] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 23:34:30 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:30 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:30 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3571.623174][T30065] CPU: 0 PID: 30065 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3571.631148][T30065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3571.641215][T30065] Call Trace: [ 3571.644538][T30065] dump_stack+0xf5/0x159 [ 3571.648809][T30065] dump_header+0xaa/0x449 [ 3571.653224][T30065] oom_kill_process.cold+0x10/0x15 [ 3571.658377][T30065] out_of_memory+0x231/0xa00 [ 3571.663029][T30065] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3571.668709][T30065] mem_cgroup_out_of_memory+0x128/0x150 [ 3571.674301][T30065] try_charge+0x8c1/0xbc0 [ 3571.678661][T30065] ? get_page_from_freelist+0x8c0/0x1650 [ 3571.684378][T30065] ? __tsan_write4+0x32/0x40 [ 3571.689000][T30065] ? __rcu_read_unlock+0x66/0x3c0 [ 3571.694087][T30065] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3571.699568][T30065] __memcg_kmem_charge+0xde/0x240 [ 3571.704670][T30065] __alloc_pages_nodemask+0x26c/0x310 [ 3571.710083][T30065] alloc_pages_current+0xd1/0x170 [ 3571.715130][T30065] pte_alloc_one+0x30/0xa0 [ 3571.719572][T30065] __handle_mm_fault+0x296f/0x2cb0 [ 3571.724727][T30065] handle_mm_fault+0x21b/0x530 [ 3571.729582][T30065] __do_page_fault+0x3fb/0x9e0 [ 3571.734383][T30065] do_page_fault+0x54/0x233 [ 3571.738971][T30065] ? syscall_return_slowpath+0x1b8/0x220 [ 3571.744622][T30065] page_fault+0x34/0x40 [ 3571.748785][T30065] RIP: 0033:0x459f49 [ 3571.752699][T30065] Code: Bad RIP value. [ 3571.756771][T30065] RSP: 002b:00007f46fba95c78 EFLAGS: 00010246 [ 3571.762848][T30065] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000459f49 [ 3571.770831][T30065] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 3571.778820][T30065] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 3571.786804][T30065] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46fba966d4 [ 3571.794793][T30065] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:34:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') 23:34:31 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, 0x0) 23:34:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, 0x0) 23:34:32 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3573.678693][T30065] memory: usage 307200kB, limit 307200kB, failcnt 22625 [ 3573.692436][T30065] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3573.703950][T30065] Memory cgroup stats for /syz4: [ 3573.704191][T30065] anon 240431104 [ 3573.704191][T30065] file 516096 [ 3573.704191][T30065] kernel_stack 6377472 [ 3573.704191][T30065] slab 13963264 [ 3573.704191][T30065] sock 0 [ 3573.704191][T30065] shmem 696320 [ 3573.704191][T30065] file_mapped 0 [ 3573.704191][T30065] file_dirty 0 [ 3573.704191][T30065] file_writeback 0 [ 3573.704191][T30065] anon_thp 182452224 [ 3573.704191][T30065] inactive_anon 0 [ 3573.704191][T30065] active_anon 241025024 [ 3573.704191][T30065] inactive_file 61440 [ 3573.704191][T30065] active_file 0 [ 3573.704191][T30065] unevictable 0 [ 3573.704191][T30065] slab_reclaimable 1892352 [ 3573.704191][T30065] slab_unreclaimable 12070912 [ 3573.704191][T30065] pgfault 239712 [ 3573.704191][T30065] pgmajfault 0 [ 3573.704191][T30065] workingset_refault 495 [ 3573.704191][T30065] workingset_activate 165 [ 3573.704191][T30065] workingset_nodereclaim 0 [ 3573.704191][T30065] pgrefill 8227 [ 3573.704191][T30065] pgscan 35661 [ 3573.704191][T30065] pgsteal 14304 [ 3573.846628][T30065] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=30065,uid=0 [ 3573.887213][T30065] Memory cgroup out of memory: Killed process 30065 (syz-executor.4) total-vm:72716kB, anon-rss:4264kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 3574.009258][ T1061] oom_reaper: reaped process 30065 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 3574.022921][T30428] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 3574.181827][T30428] CPU: 1 PID: 30428 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3574.189790][T30428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3574.199853][T30428] Call Trace: [ 3574.203222][T30428] dump_stack+0xf5/0x159 [ 3574.207562][T30428] dump_header+0xaa/0x449 [ 3574.211915][T30428] oom_kill_process.cold+0x10/0x15 [ 3574.217115][T30428] out_of_memory+0x231/0xa00 [ 3574.221727][T30428] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3574.227396][T30428] mem_cgroup_out_of_memory+0x128/0x150 [ 3574.232994][T30428] try_charge+0xb3a/0xbc0 [ 3574.237370][T30428] ? get_page_from_freelist+0x8c0/0x1650 [ 3574.243077][T30428] ? __tsan_write4+0x32/0x40 [ 3574.247691][T30428] ? __rcu_read_unlock+0x66/0x3c0 [ 3574.252806][T30428] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3574.258346][T30428] __memcg_kmem_charge+0xde/0x240 [ 3574.263394][T30428] __alloc_pages_nodemask+0x26c/0x310 [ 3574.268801][T30428] alloc_pages_current+0xd1/0x170 [ 3574.273850][T30428] pte_alloc_one+0x30/0xa0 [ 3574.278289][T30428] __pte_alloc+0x2d/0x220 [ 3574.282639][T30428] __handle_mm_fault+0x29c7/0x2cb0 [ 3574.287788][T30428] handle_mm_fault+0x21b/0x530 [ 3574.292651][T30428] __do_page_fault+0x3fb/0x9e0 [ 3574.297449][T30428] do_page_fault+0x54/0x233 [ 3574.301980][T30428] ? do_syscall_64+0x270/0x370 [ 3574.306817][T30428] page_fault+0x34/0x40 [ 3574.310993][T30428] RIP: 0033:0x40d107 [ 3574.314923][T30428] Code: 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 49 63 c6 0f b6 4c 24 5b 48 69 c0 a8 00 00 00 88 88 c0 bf 75 00 e8 19 60 ff ff <83> 05 f6 2e 55 00 01 80 7c 24 59 00 74 0b f6 44 24 18 01 0f 84 e5 [ 3574.334539][T30428] RSP: 002b:00007ffdf09f9100 EFLAGS: 00010217 [ 3574.340616][T30428] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000459f49 [ 3574.348600][T30428] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 3574.356585][T30428] RBP: 000000000075bf2c R08: 00007f46fbab7700 R09: ffffffffffffffff [ 3574.364610][T30428] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 3574.372676][T30428] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3574.437718][T30428] memory: usage 302840kB, limit 307200kB, failcnt 22626 [ 3574.445200][T30428] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3574.455638][T30428] Memory cgroup stats for /syz4: [ 3574.455927][T30428] anon 236142592 [ 3574.455927][T30428] file 516096 [ 3574.455927][T30428] kernel_stack 6377472 [ 3574.455927][T30428] slab 13963264 [ 3574.455927][T30428] sock 0 [ 3574.455927][T30428] shmem 696320 [ 3574.455927][T30428] file_mapped 0 [ 3574.455927][T30428] file_dirty 0 [ 3574.455927][T30428] file_writeback 0 [ 3574.455927][T30428] anon_thp 178257920 [ 3574.455927][T30428] inactive_anon 0 [ 3574.455927][T30428] active_anon 236732416 [ 3574.455927][T30428] inactive_file 61440 [ 3574.455927][T30428] active_file 0 [ 3574.455927][T30428] unevictable 0 [ 3574.455927][T30428] slab_reclaimable 1892352 [ 3574.455927][T30428] slab_unreclaimable 12070912 [ 3574.455927][T30428] pgfault 239712 [ 3574.455927][T30428] pgmajfault 0 [ 3574.455927][T30428] workingset_refault 495 [ 3574.455927][T30428] workingset_activate 165 [ 3574.455927][T30428] workingset_nodereclaim 0 [ 3574.455927][T30428] pgrefill 8227 [ 3574.455927][T30428] pgscan 35661 [ 3574.455927][T30428] pgsteal 14304 [ 3574.550944][T30428] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=5857,uid=0 [ 3574.566412][T30428] Memory cgroup out of memory: Killed process 5857 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 23:34:34 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) sendfile(r0, r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') syz_open_procfs(0x0, 0x0) 23:34:34 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:34 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:34 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3575.489592][T30585] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3575.536997][T30585] CPU: 0 PID: 30585 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3575.544937][T30585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3575.555079][T30585] Call Trace: [ 3575.558401][T30585] dump_stack+0xf5/0x159 [ 3575.562681][T30585] dump_header+0xaa/0x449 [ 3575.567101][T30585] oom_kill_process.cold+0x10/0x15 [ 3575.572433][T30585] out_of_memory+0x231/0xa00 [ 3575.577045][T30585] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3575.582716][T30585] mem_cgroup_out_of_memory+0x128/0x150 [ 3575.588295][T30585] try_charge+0xb3a/0xbc0 [ 3575.592670][T30585] ? rcu_note_context_switch+0x700/0x760 [ 3575.598357][T30585] mem_cgroup_try_charge+0xd2/0x260 [ 3575.603604][T30585] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3575.609285][T30585] wp_page_copy+0x322/0x1160 [ 3575.613884][T30585] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3575.619533][T30585] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3575.625193][T30585] do_wp_page+0x192/0x11f0 [ 3575.629660][T30585] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3575.635352][T30585] __handle_mm_fault+0x1c07/0x2cb0 [ 3575.640585][T30585] handle_mm_fault+0x21b/0x530 [ 3575.645383][T30585] __do_page_fault+0x3fb/0x9e0 [ 3575.650223][T30585] do_page_fault+0x54/0x233 [ 3575.654774][T30585] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3575.660520][T30585] page_fault+0x34/0x40 [ 3575.664677][T30585] RIP: 0033:0x40ef98 [ 3575.668604][T30585] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf e1 f6 4b 00 31 c0 e8 63 2e ff ff 31 ff e8 ac 2a ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 32 66 00 [ 3575.688281][T30585] RSP: 002b:00007fff25964970 EFLAGS: 00010246 [ 3575.694364][T30585] RAX: 000000009a7ca75c RBX: 000000008997ccea RCX: 0000001b34120000 [ 3575.702341][T30585] RDX: 0000000000000000 RSI: 000000000000075c RDI: ffffffff9a7ca759 [ 3575.710348][T30585] RBP: 0000000000000001 R08: 000000009a7ca759 R09: 000000009a7ca75d [ 3575.718341][T30585] R10: 00007fff25964b10 R11: 0000000000000246 R12: 000000000075c050 [ 3575.726353][T30585] R13: 0000000080000000 R14: 00007fa90aed9008 R15: 0000000000000006 [ 3575.852091][T30585] memory: usage 307200kB, limit 307200kB, failcnt 9958 [ 3575.859574][T30585] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3575.866426][T30585] Memory cgroup stats for /syz0: [ 3575.866715][T30585] anon 262512640 [ 3575.866715][T30585] file 36864 [ 3575.866715][T30585] kernel_stack 4571136 [ 3575.866715][T30585] slab 10674176 [ 3575.866715][T30585] sock 0 [ 3575.866715][T30585] shmem 73728 [ 3575.866715][T30585] file_mapped 135168 [ 3575.866715][T30585] file_dirty 0 [ 3575.866715][T30585] file_writeback 0 [ 3575.866715][T30585] anon_thp 228589568 [ 3575.866715][T30585] inactive_anon 0 [ 3575.866715][T30585] active_anon 262516736 [ 3575.866715][T30585] inactive_file 45056 [ 3575.866715][T30585] active_file 28672 [ 3575.866715][T30585] unevictable 0 [ 3575.866715][T30585] slab_reclaimable 1486848 [ 3575.866715][T30585] slab_unreclaimable 9187328 [ 3575.866715][T30585] pgfault 239415 [ 3575.866715][T30585] pgmajfault 0 [ 3575.866715][T30585] workingset_refault 198 [ 3575.866715][T30585] workingset_activate 66 [ 3575.866715][T30585] workingset_nodereclaim 0 23:34:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3575.866715][T30585] pgrefill 3865 [ 3575.866715][T30585] pgscan 15782 [ 3575.866715][T30585] pgsteal 11741 [ 3575.983573][T30585] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=28712,uid=0 23:34:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3576.011036][T30585] Memory cgroup out of memory: Killed process 28712 (syz-executor.0) total-vm:72584kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 23:34:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3576.152273][T30584] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3576.183817][T30584] CPU: 1 PID: 30584 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3576.191771][T30584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:34:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3576.201848][T30584] Call Trace: [ 3576.205163][T30584] dump_stack+0xf5/0x159 [ 3576.209431][T30584] dump_header+0xaa/0x449 [ 3576.213806][T30584] oom_kill_process.cold+0x10/0x15 [ 3576.218954][T30584] out_of_memory+0x231/0xa00 [ 3576.223621][T30584] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3576.229285][T30584] mem_cgroup_out_of_memory+0x128/0x150 [ 3576.234908][T30584] try_charge+0xb3a/0xbc0 [ 3576.239271][T30584] ? rcu_note_context_switch+0x700/0x760 [ 3576.245018][T30584] mem_cgroup_try_charge+0xd2/0x260 [ 3576.250276][T30584] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3576.255944][T30584] wp_page_copy+0x322/0x1160 [ 3576.260614][T30584] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3576.266294][T30584] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3576.272036][T30584] do_wp_page+0x192/0x11f0 [ 3576.276474][T30584] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3576.282144][T30584] __handle_mm_fault+0x1c07/0x2cb0 [ 3576.287317][T30584] handle_mm_fault+0x21b/0x530 [ 3576.292167][T30584] __do_page_fault+0x3fb/0x9e0 [ 3576.296965][T30584] do_page_fault+0x54/0x233 [ 3576.301622][T30584] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3576.307369][T30584] page_fault+0x34/0x40 [ 3576.311535][T30584] RIP: 0033:0x40ef98 [ 3576.315457][T30584] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf e1 f6 4b 00 31 c0 e8 63 2e ff ff 31 ff e8 ac 2a ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 32 66 00 [ 3576.335121][T30584] RSP: 002b:00007ffdf09f9030 EFLAGS: 00010246 [ 3576.341211][T30584] RAX: 00000000d06dd21a RBX: 00000000f406baae RCX: 0000001b2f220000 [ 3576.349286][T30584] RDX: 0000000000000000 RSI: 000000000000121a RDI: ffffffffd06dd21a [ 3576.357273][T30584] RBP: 000000000000000a R08: 00000000d06dd21a R09: 00000000d06dd21e [ 3576.365256][T30584] R10: 00007ffdf09f91d0 R11: 0000000000000246 R12: 000000000075c050 [ 3576.373240][T30584] R13: 0000000080000000 R14: 00007f46fd8b8008 R15: 000000000000000a [ 3576.403398][T30584] memory: usage 307200kB, limit 307200kB, failcnt 22687 [ 3576.414263][T30584] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3576.423440][T30584] Memory cgroup stats for /syz4: [ 3576.423662][T30584] anon 240447488 [ 3576.423662][T30584] file 516096 [ 3576.423662][T30584] kernel_stack 6414336 [ 3576.423662][T30584] slab 13963264 [ 3576.423662][T30584] sock 0 [ 3576.423662][T30584] shmem 696320 [ 3576.423662][T30584] file_mapped 0 [ 3576.423662][T30584] file_dirty 0 [ 3576.423662][T30584] file_writeback 0 [ 3576.423662][T30584] anon_thp 182452224 [ 3576.423662][T30584] inactive_anon 0 [ 3576.423662][T30584] active_anon 240992256 [ 3576.423662][T30584] inactive_file 61440 [ 3576.423662][T30584] active_file 0 [ 3576.423662][T30584] unevictable 0 [ 3576.423662][T30584] slab_reclaimable 1892352 [ 3576.423662][T30584] slab_unreclaimable 12070912 [ 3576.423662][T30584] pgfault 239844 [ 3576.423662][T30584] pgmajfault 0 [ 3576.423662][T30584] workingset_refault 495 [ 3576.423662][T30584] workingset_activate 165 [ 3576.423662][T30584] workingset_nodereclaim 0 [ 3576.423662][T30584] pgrefill 8227 [ 3576.423662][T30584] pgscan 35661 [ 3576.423662][T30584] pgsteal 14304 [ 3576.624082][T30584] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=30584,uid=0 [ 3576.674744][T30584] Memory cgroup out of memory: Killed process 30584 (syz-executor.4) total-vm:72716kB, anon-rss:4264kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 3576.758852][ T1061] oom_reaper: reaped process 30584 (syz-executor.4), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3576.783309][T30733] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3576.941106][T30733] CPU: 0 PID: 30733 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3576.949067][T30733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3576.959183][T30733] Call Trace: [ 3576.962495][T30733] dump_stack+0xf5/0x159 [ 3576.966771][T30733] dump_header+0xaa/0x449 [ 3576.971174][T30733] oom_kill_process.cold+0x10/0x15 [ 3576.976347][T30733] out_of_memory+0x231/0xa00 [ 3576.980953][T30733] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3576.986614][T30733] mem_cgroup_out_of_memory+0x128/0x150 [ 3576.992192][T30733] try_charge+0x8c1/0xbc0 [ 3576.996617][T30733] ? rcu_note_context_switch+0x700/0x760 [ 3577.002285][T30733] mem_cgroup_try_charge+0xd2/0x260 [ 3577.007505][T30733] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3577.013239][T30733] wp_page_copy+0x322/0x1160 [ 3577.017842][T30733] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3577.023502][T30733] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3577.029179][T30733] do_wp_page+0x192/0x11f0 [ 3577.033613][T30733] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3577.039342][T30733] __handle_mm_fault+0x1c07/0x2cb0 [ 3577.044523][T30733] handle_mm_fault+0x21b/0x530 [ 3577.049335][T30733] __do_page_fault+0x3fb/0x9e0 [ 3577.054138][T30733] do_page_fault+0x54/0x233 [ 3577.058667][T30733] ? prepare_exit_to_usermode+0x154/0x1a0 [ 3577.064414][T30733] page_fault+0x34/0x40 [ 3577.068578][T30733] RIP: 0033:0x405308 23:34:36 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3577.072533][T30733] Code: 85 02 00 00 80 3d 0f cf 66 00 00 c6 85 84 00 00 00 00 74 0f 8b 05 fc ce 66 00 39 45 24 0f 84 e7 01 00 00 44 8b a5 80 00 00 00 b3 d2 ff ff 48 2b 05 fc 2c 33 00 8b 75 00 49 89 d8 45 89 e1 4c [ 3577.092236][T30733] RSP: 002b:00007f46fbab6c90 EFLAGS: 00010246 [ 3577.098317][T30733] RAX: 00007f46fdab8000 RBX: 0000000000000000 RCX: 0000000000459f49 [ 3577.106346][T30733] RDX: 000000000003ffff RSI: 0000000000000000 RDI: 0000000000000000 [ 3577.114395][T30733] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 3577.122471][T30733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3577.130541][T30733] R13: 00000000004c05df R14: 00000000004d2bf0 R15: 00000000ffffffff 23:34:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:36 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:36 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, 0x0) 23:34:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3577.522673][T30733] memory: usage 307116kB, limit 307200kB, failcnt 22692 [ 3577.637201][T30733] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3577.644091][T30733] Memory cgroup stats for /syz4: [ 3577.644371][T30733] anon 240447488 [ 3577.644371][T30733] file 516096 [ 3577.644371][T30733] kernel_stack 6414336 [ 3577.644371][T30733] slab 13963264 [ 3577.644371][T30733] sock 0 [ 3577.644371][T30733] shmem 696320 [ 3577.644371][T30733] file_mapped 0 [ 3577.644371][T30733] file_dirty 0 [ 3577.644371][T30733] file_writeback 0 [ 3577.644371][T30733] anon_thp 182452224 [ 3577.644371][T30733] inactive_anon 0 [ 3577.644371][T30733] active_anon 240992256 [ 3577.644371][T30733] inactive_file 61440 [ 3577.644371][T30733] active_file 0 [ 3577.644371][T30733] unevictable 0 [ 3577.644371][T30733] slab_reclaimable 1892352 [ 3577.644371][T30733] slab_unreclaimable 12070912 [ 3577.644371][T30733] pgfault 239877 [ 3577.644371][T30733] pgmajfault 0 [ 3577.644371][T30733] workingset_refault 495 [ 3577.644371][T30733] workingset_activate 165 [ 3577.644371][T30733] workingset_nodereclaim 0 [ 3577.644371][T30733] pgrefill 8227 [ 3577.644371][T30733] pgscan 35661 [ 3577.644371][T30733] pgsteal 14304 23:34:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3578.544448][T30733] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=30733,uid=0 [ 3578.634996][T30733] Memory cgroup out of memory: Killed process 30733 (syz-executor.4) total-vm:72716kB, anon-rss:4264kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 23:34:38 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, 0xffffffffffffffff, 0x0) [ 3578.765893][ T1061] oom_reaper: reaped process 30733 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 3578.779324][T31087] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3578.830633][T31087] CPU: 1 PID: 31087 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3578.838609][T31087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3578.848678][T31087] Call Trace: [ 3578.851992][T31087] dump_stack+0xf5/0x159 [ 3578.856266][T31087] dump_header+0xaa/0x449 [ 3578.860631][T31087] oom_kill_process.cold+0x10/0x15 [ 3578.865768][T31087] out_of_memory+0x231/0xa00 [ 3578.870427][T31087] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3578.876131][T31087] mem_cgroup_out_of_memory+0x128/0x150 [ 3578.881711][T31087] try_charge+0xb3a/0xbc0 [ 3578.886075][T31087] ? rcu_note_context_switch+0x700/0x760 [ 3578.891792][T31087] mem_cgroup_try_charge+0xd2/0x260 [ 3578.897064][T31087] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3578.902728][T31087] __handle_mm_fault+0x179a/0x2cb0 [ 3578.907885][T31087] handle_mm_fault+0x21b/0x530 [ 3578.912772][T31087] __do_page_fault+0x3fb/0x9e0 [ 3578.917570][T31087] do_page_fault+0x54/0x233 [ 3578.922172][T31087] ? do_syscall_64+0x270/0x370 [ 3578.926953][T31087] page_fault+0x34/0x40 [ 3578.931140][T31087] RIP: 0033:0x40d107 [ 3578.935187][T31087] Code: 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 49 63 c6 0f b6 4c 24 5b 48 69 c0 a8 00 00 00 88 88 c0 bf 75 00 e8 19 60 ff ff <83> 05 f6 2e 55 00 01 80 7c 24 59 00 74 0b f6 44 24 18 01 0f 84 e5 [ 3578.954807][T31087] RSP: 002b:00007ffdf09f9100 EFLAGS: 00010217 [ 3578.960889][T31087] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000459f49 [ 3578.968878][T31087] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 3578.976862][T31087] RBP: 000000000075bf2c R08: 00007f46fbab7700 R09: ffffffffffffffff [ 3578.984838][T31087] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 3578.992859][T31087] R13: 0000000000000005 R14: 0000000000000000 R15: 000000000075bf2c [ 3579.008653][T31087] memory: usage 302856kB, limit 307200kB, failcnt 22723 [ 3579.016068][T31087] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3579.023729][T31087] Memory cgroup stats for /syz4: [ 3579.024038][T31087] anon 236154880 [ 3579.024038][T31087] file 516096 [ 3579.024038][T31087] kernel_stack 6414336 [ 3579.024038][T31087] slab 13963264 [ 3579.024038][T31087] sock 0 [ 3579.024038][T31087] shmem 696320 [ 3579.024038][T31087] file_mapped 0 [ 3579.024038][T31087] file_dirty 0 [ 3579.024038][T31087] file_writeback 0 [ 3579.024038][T31087] anon_thp 178257920 [ 3579.024038][T31087] inactive_anon 0 [ 3579.024038][T31087] active_anon 236699648 [ 3579.024038][T31087] inactive_file 61440 [ 3579.024038][T31087] active_file 0 [ 3579.024038][T31087] unevictable 0 [ 3579.024038][T31087] slab_reclaimable 1892352 [ 3579.024038][T31087] slab_unreclaimable 12070912 [ 3579.024038][T31087] pgfault 239877 [ 3579.024038][T31087] pgmajfault 0 [ 3579.024038][T31087] workingset_refault 495 [ 3579.024038][T31087] workingset_activate 165 [ 3579.024038][T31087] workingset_nodereclaim 0 [ 3579.024038][T31087] pgrefill 8260 [ 3579.024038][T31087] pgscan 35694 [ 3579.024038][T31087] pgsteal 14304 [ 3579.123486][T31087] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=5568,uid=0 [ 3579.139968][T31087] Memory cgroup out of memory: Killed process 5568 (syz-executor.4) total-vm:72584kB, anon-rss:2200kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3579.173540][T31089] syz-executor.0 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=1000 [ 3579.200040][T31089] CPU: 0 PID: 31089 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 3579.207972][T31089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3579.218056][T31089] Call Trace: [ 3579.221379][T31089] dump_stack+0xf5/0x159 [ 3579.225651][T31089] dump_header+0xaa/0x449 [ 3579.230077][T31089] oom_kill_process.cold+0x10/0x15 [ 3579.235218][T31089] out_of_memory+0x231/0xa00 [ 3579.239837][T31089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3579.245510][T31089] mem_cgroup_out_of_memory+0x128/0x150 [ 3579.251085][T31089] try_charge+0xb3a/0xbc0 [ 3579.255444][T31089] ? __tsan_read4+0x2c/0x30 [ 3579.260015][T31089] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3579.265548][T31089] cache_grow_begin+0x3ed/0x670 [ 3579.270447][T31089] fallback_alloc+0x161/0x1f0 [ 3579.275237][T31089] ____cache_alloc_node+0x1b1/0x1c0 [ 3579.280457][T31089] ? debug_smp_processor_id+0x4c/0x172 [ 3579.285952][T31089] kmem_cache_alloc_node+0xbb/0x660 [ 3579.291251][T31089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3579.296971][T31089] copy_process+0x2dd/0x3b50 [ 3579.301579][T31089] ? record_times+0x16/0x90 [ 3579.306102][T31089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3579.311784][T31089] ? set_task_reclaim_state+0x64/0x80 [ 3579.317190][T31089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3579.322851][T31089] _do_fork+0xfe/0x6e0 [ 3579.326948][T31089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3579.332644][T31089] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3579.338320][T31089] ? blkcg_maybe_throttle_current+0x472/0x610 [ 3579.344495][T31089] __x64_sys_clone+0x12b/0x160 [ 3579.349307][T31089] do_syscall_64+0xcc/0x370 [ 3579.353847][T31089] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3579.359757][T31089] RIP: 0033:0x45c919 [ 3579.363684][T31089] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3579.383407][T31089] RSP: 002b:00007fff25964908 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3579.391849][T31089] RAX: ffffffffffffffda RBX: 00007fa9090b7700 RCX: 000000000045c919 [ 3579.399840][T31089] RDX: 00007fa9090b79d0 RSI: 00007fa9090b6db0 RDI: 00000000003d0f00 [ 3579.407831][T31089] RBP: 00007fff25964b20 R08: 00007fa9090b7700 R09: 00007fa9090b7700 [ 3579.415901][T31089] R10: 00007fa9090b79d0 R11: 0000000000000202 R12: 0000000000000000 [ 3579.423946][T31089] R13: 00007fff259649bf R14: 00007fa9090b79c0 R15: 000000000075bfd4 23:34:38 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') 23:34:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3579.522379][T31089] memory: usage 307200kB, limit 307200kB, failcnt 10003 [ 3579.581245][T31089] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3579.595016][T31089] Memory cgroup stats for /syz0: [ 3579.595373][T31089] anon 262447104 [ 3579.595373][T31089] file 36864 [ 3579.595373][T31089] kernel_stack 4571136 [ 3579.595373][T31089] slab 10674176 [ 3579.595373][T31089] sock 0 [ 3579.595373][T31089] shmem 73728 [ 3579.595373][T31089] file_mapped 135168 [ 3579.595373][T31089] file_dirty 0 [ 3579.595373][T31089] file_writeback 0 [ 3579.595373][T31089] anon_thp 228589568 [ 3579.595373][T31089] inactive_anon 0 [ 3579.595373][T31089] active_anon 262451200 [ 3579.595373][T31089] inactive_file 45056 [ 3579.595373][T31089] active_file 28672 [ 3579.595373][T31089] unevictable 0 [ 3579.595373][T31089] slab_reclaimable 1486848 [ 3579.595373][T31089] slab_unreclaimable 9187328 [ 3579.595373][T31089] pgfault 239481 [ 3579.595373][T31089] pgmajfault 0 [ 3579.595373][T31089] workingset_refault 198 [ 3579.595373][T31089] workingset_activate 66 [ 3579.595373][T31089] workingset_nodereclaim 0 [ 3579.595373][T31089] pgrefill 3898 [ 3579.595373][T31089] pgscan 15815 [ 3579.595373][T31089] pgsteal 11741 23:34:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) [ 3579.987181][T31089] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=31089,uid=0 [ 3580.008854][T31089] Memory cgroup out of memory: Killed process 31089 (syz-executor.0) total-vm:72716kB, anon-rss:4252kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3580.075935][ T1061] oom_reaper: reaped process 31089 (syz-executor.0), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3580.091747][T31573] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3580.126362][T31573] CPU: 1 PID: 31573 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3580.134342][T31573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3580.144412][T31573] Call Trace: [ 3580.147794][T31573] dump_stack+0xf5/0x159 [ 3580.152062][T31573] dump_header+0xaa/0x449 [ 3580.156430][T31573] oom_kill_process.cold+0x10/0x15 [ 3580.161633][T31573] out_of_memory+0x231/0xa00 [ 3580.166311][T31573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3580.172034][T31573] mem_cgroup_out_of_memory+0x128/0x150 [ 3580.177653][T31573] try_charge+0xb3a/0xbc0 [ 3580.182003][T31573] ? rcu_note_context_switch+0x700/0x760 [ 3580.187672][T31573] mem_cgroup_try_charge+0xd2/0x260 [ 3580.192928][T31573] mem_cgroup_try_charge_delay+0x3a/0x80 [ 3580.198588][T31573] wp_page_copy+0x322/0x1160 [ 3580.203186][T31573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3580.208871][T31573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3580.214529][T31573] do_wp_page+0x192/0x11f0 [ 3580.218979][T31573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3580.224704][T31573] __handle_mm_fault+0x1c07/0x2cb0 [ 3580.229862][T31573] handle_mm_fault+0x21b/0x530 [ 3580.234657][T31573] __do_page_fault+0x3fb/0x9e0 [ 3580.239522][T31573] do_page_fault+0x54/0x233 [ 3580.244059][T31573] ? do_syscall_64+0x270/0x370 [ 3580.248848][T31573] page_fault+0x34/0x40 [ 3580.253017][T31573] RIP: 0033:0x40d0db [ 3580.256943][T31573] Code: 50 80 60 20 01 48 89 48 10 48 8b 4c 24 60 48 89 48 18 8b 4c 24 68 89 48 24 8b 4c 24 28 89 48 28 31 c0 48 8b 8c 04 20 01 00 00 <48> 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 49 63 c6 0f [ 3580.276570][T31573] RSP: 002b:00007ffdf09f9100 EFLAGS: 00010287 [ 3580.282647][T31573] RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000002 [ 3580.290631][T31573] RDX: 00000000000000a8 RSI: 00007f46fba95db0 RDI: 000000000075bfd0 [ 3580.298652][T31573] RBP: 000000000075bfd4 R08: 0000000000000000 R09: 00007f46fba96700 [ 3580.306634][T31573] R10: 00007f46fba969d0 R11: 0000000000000202 R12: 000000000075bfc8 [ 3580.314694][T31573] R13: 0000000000000004 R14: 0000000000000001 R15: 000000000075bfd4 [ 3580.378473][T31573] memory: usage 307200kB, limit 307200kB, failcnt 22771 [ 3580.386388][T31573] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3580.393840][T31573] Memory cgroup stats for /syz4: [ 3580.394121][T31573] anon 240357376 [ 3580.394121][T31573] file 516096 [ 3580.394121][T31573] kernel_stack 6451200 [ 3580.394121][T31573] slab 13963264 [ 3580.394121][T31573] sock 0 [ 3580.394121][T31573] shmem 696320 [ 3580.394121][T31573] file_mapped 0 [ 3580.394121][T31573] file_dirty 0 [ 3580.394121][T31573] file_writeback 0 [ 3580.394121][T31573] anon_thp 182452224 [ 3580.394121][T31573] inactive_anon 0 [ 3580.394121][T31573] active_anon 240939008 [ 3580.394121][T31573] inactive_file 61440 [ 3580.394121][T31573] active_file 0 [ 3580.394121][T31573] unevictable 0 [ 3580.394121][T31573] slab_reclaimable 1892352 [ 3580.394121][T31573] slab_unreclaimable 12070912 [ 3580.394121][T31573] pgfault 240042 [ 3580.394121][T31573] pgmajfault 0 [ 3580.394121][T31573] workingset_refault 495 [ 3580.394121][T31573] workingset_activate 165 [ 3580.394121][T31573] workingset_nodereclaim 0 [ 3580.394121][T31573] pgrefill 8260 [ 3580.394121][T31573] pgscan 35694 [ 3580.394121][T31573] pgsteal 14304 [ 3580.492898][T31573] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=31573,uid=0 [ 3580.509424][T31573] Memory cgroup out of memory: Killed process 31573 (syz-executor.4) total-vm:72716kB, anon-rss:4264kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 23:34:39 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, 0x0, 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, 0x0, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, 0x0) 23:34:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, 0xffffffffffffffff, 0x0) 23:34:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) 23:34:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) getpid() syz_open_procfs$namespace(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, 0xffffffffffffffff, 0x0) [ 3580.532690][ T1061] oom_reaper: reaped process 31573 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 23:34:40 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1000a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r1, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x10) r2 = getpid() fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r2}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(r1, &(0x7f0000000500)="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", 0xff, 0x51, &(0x7f0000000640)={0x11, 0xf8, r3, 0x1, 0x3d, 0x6, @dev={[], 0x2a}}, 0x14) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e, 0x1000) listen(r4, 0x800001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e92541bbcac1576380d1cdfba33d19c8f46ed224ed90e9ab2182579990c3efa327bc446b0ea109bd72afacbd3f5e990faa05541e5e3ca83b2fa8f989501f9542954a4bf68510c80faad509d3090df3538eaa1586b25bf1475e4d3dd9d6e7bdbbec8888ee414df8abd3bb3f3683036a1a7f2320696e2cf6138ac88840a80d5f90de656f683965b8ac95d0fbb4834eaa23c3a3deef12ab7", &(0x7f00000007c0)=""/4096}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) getgid() preadv(r1, &(0x7f00000017c0), 0x1fe, 0x500) syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') [ 3581.299082][T31815] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3581.331328][T31815] CPU: 0 PID: 31815 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 3581.339318][T31815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3581.349397][T31815] Call Trace: [ 3581.352731][T31815] dump_stack+0xf5/0x159 [ 3581.357016][T31815] dump_header+0xaa/0x449 [ 3581.361406][T31815] oom_kill_process.cold+0x10/0x15 [ 3581.366553][T31815] out_of_memory+0x231/0xa00 [ 3581.371184][T31815] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3581.376859][T31815] mem_cgroup_out_of_memory+0x128/0x150 [ 3581.382439][T31815] try_charge+0xb3a/0xbc0 [ 3581.386800][T31815] ? __tsan_write4+0x32/0x40 [ 3581.391446][T31815] ? __rcu_read_unlock+0x66/0x3c0 [ 3581.396538][T31815] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 3581.402014][T31815] __memcg_kmem_charge+0xde/0x240 [ 3581.407101][T31815] copy_process+0x11d2/0x3b50 [ 3581.411815][T31815] ? record_times+0x16/0x90 [ 3581.416351][T31815] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3581.422011][T31815] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3581.427658][T31815] _do_fork+0xfe/0x6e0 [ 3581.431731][T31815] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3581.437375][T31815] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3581.443123][T31815] ? blkcg_maybe_throttle_current+0x472/0x610 [ 3581.449204][T31815] __x64_sys_clone+0x12b/0x160 [ 3581.453995][T31815] do_syscall_64+0xcc/0x370 [ 3581.458527][T31815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3581.464429][T31815] RIP: 0033:0x45c919 [ 3581.468360][T31815] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 3581.487968][T31815] RSP: 002b:00007ffdf09f8fc8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 3581.496384][T31815] RAX: ffffffffffffffda RBX: 00007f46fbab7700 RCX: 000000000045c919 [ 3581.504431][T31815] RDX: 00007f46fbab79d0 RSI: 00007f46fbab6db0 RDI: 00000000003d0f00 [ 3581.512404][T31815] RBP: 00007ffdf09f91e0 R08: 00007f46fbab7700 R09: 00007f46fbab7700 [ 3581.520383][T31815] R10: 00007f46fbab79d0 R11: 0000000000000202 R12: 0000000000000000 [ 3581.528364][T31815] R13: 00007ffdf09f907f R14: 00007f46fbab79c0 R15: 000000000075bf2c [ 3581.543823][T31815] memory: usage 307200kB, limit 307200kB, failcnt 22814 [ 3581.554856][T31815] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3581.572871][T31693] ================================================================== [ 3581.576427][T31815] Memory cgroup stats for /syz4: [ 3581.576742][T31815] anon 240357376 [ 3581.576742][T31815] file 516096 [ 3581.576742][T31815] kernel_stack 6451200 [ 3581.576742][T31815] slab 13963264 [ 3581.576742][T31815] sock 0 [ 3581.576742][T31815] shmem 696320 [ 3581.576742][T31815] file_mapped 0 [ 3581.576742][T31815] file_dirty 0 [ 3581.576742][T31815] file_writeback 0 [ 3581.576742][T31815] anon_thp 182452224 [ 3581.576742][T31815] inactive_anon 0 [ 3581.576742][T31815] active_anon 240939008 [ 3581.576742][T31815] inactive_file 61440 [ 3581.576742][T31815] active_file 0 [ 3581.576742][T31815] unevictable 0 [ 3581.576742][T31815] slab_reclaimable 1892352 [ 3581.576742][T31815] slab_unreclaimable 12070912 [ 3581.576742][T31815] pgfault 240108 [ 3581.576742][T31815] pgmajfault 0 [ 3581.576742][T31815] workingset_refault 495 [ 3581.576742][T31815] workingset_activate 165 [ 3581.576742][T31815] workingset_nodereclaim 0 [ 3581.576742][T31815] pgrefill 8260 [ 3581.576742][T31815] pgscan 35694 [ 3581.576742][T31815] pgsteal 14304 [ 3581.581015][T31693] BUG: KCSAN: data-race in ext4_setattr / mpage_submit_page [ 3581.581018][T31693] [ 3581.581032][T31693] read to 0xffff888045f7d438 of 8 bytes by task 31698 on cpu 1: [ 3581.581059][T31693] mpage_submit_page+0x81/0x170 [ 3581.586424][T31815] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=31575,uid=0 [ 3581.675224][T31693] mpage_map_and_submit_buffers+0x331/0x520 [ 3581.675237][T31693] ext4_writepages+0x1458/0x2300 [ 3581.675256][T31693] do_writepages+0x6b/0x170 [ 3581.675328][T31693] __filemap_fdatawrite_range+0x1c5/0x230 [ 3581.683093][T31815] Memory cgroup out of memory: Killed process 31575 (syz-executor.4) total-vm:72584kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 3581.684932][T31693] filemap_flush+0x2d/0x40 [ 3581.684946][T31693] ext4_alloc_da_blocks+0x78/0x180 [ 3581.684973][T31693] ext4_release_file+0x10d/0x200 [ 3581.695717][ T1061] oom_reaper: reaped process 31575 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 3581.697416][T31693] __fput+0x1e1/0x520 [ 3581.697429][T31693] ____fput+0x1f/0x30 [ 3581.697460][T31693] task_work_run+0xf6/0x130 [ 3581.789267][T31693] get_signal+0x12c3/0x1320 [ 3581.793763][T31693] do_signal+0x3b/0xc00 [ 3581.797922][T31693] exit_to_usermode_loop+0x250/0x2c0 [ 3581.803187][T31693] [ 3581.805513][T31693] write to 0xffff888045f7d438 of 8 bytes by task 31693 on cpu 0: [ 3581.813236][T31693] ext4_setattr+0xef4/0x1620 [ 3581.817827][T31693] notify_change+0x7e1/0xaa0 [ 3581.822415][T31693] do_truncate+0xfb/0x180 [ 3581.826743][T31693] path_openat+0x2f4a/0x36e0 [ 3581.831328][T31693] do_filp_open+0x11e/0x1b0 [ 3581.835824][T31693] do_sys_open+0x3b3/0x4f0 [ 3581.840404][T31693] __x64_sys_openat+0x62/0x80 [ 3581.845076][T31693] do_syscall_64+0xcc/0x370 23:34:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1000000000000002, 0x0) open(0x0, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8cT', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0xff, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) getpid() syz_open_procfs$namespace(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x0, @rand_addr=0xdc4}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e24, @loopback}, 0x60, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip_vti0\x00', 0x5, 0x0, 0x101}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) [ 3581.849576][T31693] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3581.855455][T31693] [ 3581.857767][T31693] Reported by Kernel Concurrency Sanitizer on: [ 3581.863918][T31693] CPU: 0 PID: 31693 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 3581.871800][T31693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3581.881848][T31693] ================================================================== [ 3581.889904][T31693] Kernel panic - not syncing: panic_on_warn set ... [ 3581.896499][T31693] CPU: 0 PID: 31693 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 3581.904378][T31693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3581.914427][T31693] Call Trace: [ 3581.917742][T31693] dump_stack+0xf5/0x159 [ 3581.921996][T31693] panic+0x210/0x640 [ 3581.925896][T31693] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3581.931962][T31693] ? vprintk_func+0x8d/0x140 [ 3581.936640][T31693] kcsan_report.cold+0xc/0x10 [ 3581.941315][T31693] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 3581.946864][T31693] __tsan_write8+0x32/0x40 [ 3581.951281][T31693] ext4_setattr+0xef4/0x1620 [ 3581.955875][T31693] ? ext4_journalled_write_end+0x9d0/0x9d0 [ 3581.961677][T31693] notify_change+0x7e1/0xaa0 [ 3581.966269][T31693] do_truncate+0xfb/0x180 [ 3581.970611][T31693] path_openat+0x2f4a/0x36e0 [ 3581.975213][T31693] do_filp_open+0x11e/0x1b0 [ 3581.979720][T31693] ? _raw_spin_unlock+0x4b/0x60 [ 3581.984566][T31693] ? __alloc_fd+0x316/0x4c0 [ 3581.989079][T31693] ? get_unused_fd_flags+0x93/0xc0 [ 3581.994186][T31693] do_sys_open+0x3b3/0x4f0 [ 3581.998597][T31693] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 3582.004240][T31693] __x64_sys_openat+0x62/0x80 [ 3582.008921][T31693] do_syscall_64+0xcc/0x370 [ 3582.013430][T31693] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3582.019316][T31693] RIP: 0033:0x459f49 [ 3582.023215][T31693] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3582.042813][T31693] RSP: 002b:00007fc1b80fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 3582.051222][T31693] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459f49 [ 3582.059191][T31693] RDX: 0000000000002761 RSI: 0000000020000200 RDI: ffffffffffffffff [ 3582.067162][T31693] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3582.075128][T31693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1b80fb6d4 [ 3582.083099][T31693] R13: 00000000004c6bd7 R14: 00000000004dc340 R15: 00000000ffffffff [ 3582.092574][T31693] Kernel Offset: disabled [ 3582.096892][T31693] Rebooting in 86400 seconds..