0x0) 05:59:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) [ 805.909487][T12948] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=12948,uid=0 05:59:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) [ 805.947140][T12948] Memory cgroup out of memory: Killed process 12948 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 806.007782][T12978] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 806.064234][T12978] CPU: 0 PID: 12978 Comm: syz-executor.4 Not tainted 5.3.0+ #0 [ 806.072198][T12978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.082270][T12978] Call Trace: [ 806.085591][T12978] dump_stack+0x172/0x1f0 [ 806.089954][T12978] dump_header+0x10b/0x82d [ 806.094404][T12978] oom_kill_process.cold+0x10/0x15 [ 806.099556][T12978] out_of_memory+0x79a/0x12c0 [ 806.104276][T12978] ? oom_killer_disable+0x280/0x280 [ 806.109522][T12978] mem_cgroup_out_of_memory+0x1d8/0x240 [ 806.115094][T12978] ? PageTransHuge+0xc0/0xc0 [ 806.119718][T12978] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 806.125552][T12978] ? cgroup_file_notify+0x140/0x1b0 [ 806.130791][T12978] memory_max_write+0x262/0x3a0 [ 806.135676][T12978] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 806.142459][T12978] ? lock_acquire+0x190/0x410 [ 806.147158][T12978] ? kernfs_fop_write+0x227/0x480 [ 806.152220][T12978] cgroup_file_write+0x241/0x790 [ 806.157186][T12978] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 806.166917][T12978] ? cgroup_migrate_add_task+0x890/0x890 [ 806.172596][T12978] ? cgroup_migrate_add_task+0x890/0x890 [ 806.178266][T12978] kernfs_fop_write+0x2b8/0x480 [ 806.183157][T12978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 806.189435][T12978] __vfs_write+0x8a/0x110 [ 806.194056][T12978] ? kernfs_fop_open+0xd80/0xd80 [ 806.199022][T12978] vfs_write+0x268/0x5d0 [ 806.203475][T12978] ksys_write+0x14f/0x290 [ 806.208009][T12978] ? __ia32_sys_read+0xb0/0xb0 [ 806.212973][T12978] ? do_syscall_64+0x26/0x760 [ 806.217670][T12978] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.223764][T12978] ? do_syscall_64+0x26/0x760 [ 806.228482][T12978] __x64_sys_write+0x73/0xb0 [ 806.233109][T12978] do_syscall_64+0xfa/0x760 [ 806.237639][T12978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.243635][T12978] RIP: 0033:0x459a09 [ 806.247546][T12978] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 806.267165][T12978] RSP: 002b:00007fb3441b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 806.275596][T12978] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 806.283584][T12978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 806.291568][T12978] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 806.299547][T12978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3441b76d4 [ 806.307526][T12978] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 806.423912][T12978] memory: usage 6340kB, limit 0kB, failcnt 130 [ 806.430300][T12978] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 806.437148][T12978] Memory cgroup stats for /syz4: [ 806.437252][T12978] anon 4452352 [ 806.437252][T12978] file 0 [ 806.437252][T12978] kernel_stack 131072 [ 806.437252][T12978] slab 2048000 [ 806.437252][T12978] sock 0 [ 806.437252][T12978] shmem 0 [ 806.437252][T12978] file_mapped 0 [ 806.437252][T12978] file_dirty 0 [ 806.437252][T12978] file_writeback 0 [ 806.437252][T12978] anon_thp 4194304 [ 806.437252][T12978] inactive_anon 0 [ 806.437252][T12978] active_anon 4382720 [ 806.437252][T12978] inactive_file 0 [ 806.437252][T12978] active_file 12288 [ 806.437252][T12978] unevictable 0 [ 806.437252][T12978] slab_reclaimable 946176 [ 806.437252][T12978] slab_unreclaimable 1101824 [ 806.437252][T12978] pgfault 84744 [ 806.437252][T12978] pgmajfault 0 [ 806.437252][T12978] workingset_refault 0 [ 806.437252][T12978] workingset_activate 0 [ 806.437252][T12978] workingset_nodereclaim 0 [ 806.437252][T12978] pgrefill 278 [ 806.437252][T12978] pgscan 297 [ 806.437252][T12978] pgsteal 127 [ 806.437252][T12978] pgactivate 132 [ 806.540435][T12978] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=12977,uid=0 [ 806.580270][T12978] Memory cgroup out of memory: Killed process 12977 (syz-executor.4) total-vm:72708kB, anon-rss:4248kB, file-rss:35836kB, shmem-rss:0kB [ 806.597436][ T1065] oom_reaper: reaped process 12977 (syz-executor.4), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB 05:59:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:59:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) 05:59:08 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6e04, 0x0) 05:59:08 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x476, 0x0) 05:59:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) [ 807.032258][T12811] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 807.070400][T12811] CPU: 1 PID: 12811 Comm: syz-executor.4 Not tainted 5.3.0+ #0 [ 807.078002][T12811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.088058][T12811] Call Trace: [ 807.091355][T12811] dump_stack+0x172/0x1f0 [ 807.095693][T12811] dump_header+0x10b/0x82d [ 807.100116][T12811] ? oom_kill_process+0x94/0x3f0 [ 807.105055][T12811] oom_kill_process.cold+0x10/0x15 [ 807.110168][T12811] out_of_memory+0x79a/0x12c0 [ 807.114847][T12811] ? lock_downgrade+0x920/0x920 [ 807.119704][T12811] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 807.125517][T12811] ? oom_killer_disable+0x280/0x280 [ 807.130738][T12811] mem_cgroup_out_of_memory+0x1d8/0x240 [ 807.136283][T12811] ? PageTransHuge+0xc0/0xc0 [ 807.140876][T12811] ? do_raw_spin_unlock+0x57/0x270 [ 807.146009][T12811] ? _raw_spin_unlock+0x2d/0x50 [ 807.150846][T12811] try_charge+0xf4b/0x1440 [ 807.155252][T12811] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 807.160804][T12811] ? find_held_lock+0x35/0x130 [ 807.165816][T12811] ? get_mem_cgroup_from_mm+0x139/0x320 [ 807.171359][T12811] ? lock_downgrade+0x920/0x920 [ 807.176194][T12811] ? percpu_ref_tryget_live+0x111/0x290 [ 807.181726][T12811] __memcg_kmem_charge_memcg+0x71/0xf0 [ 807.187173][T12811] ? memcg_kmem_put_cache+0x50/0x50 [ 807.192355][T12811] ? get_mem_cgroup_from_mm+0x156/0x320 [ 807.197935][T12811] __memcg_kmem_charge+0x13a/0x3a0 [ 807.203035][T12811] __alloc_pages_nodemask+0x4f4/0x900 [ 807.208393][T12811] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 807.213936][T12811] ? __alloc_pages_slowpath+0x2520/0x2520 [ 807.219634][T12811] ? percpu_ref_put_many+0xb6/0x190 [ 807.224827][T12811] ? lockdep_hardirqs_on+0x418/0x5d0 [ 807.230096][T12811] ? trace_hardirqs_on+0x67/0x240 [ 807.235104][T12811] ? __kasan_check_read+0x11/0x20 [ 807.240114][T12811] copy_process+0x3f8/0x67e0 [ 807.244687][T12811] ? __kasan_check_read+0x11/0x20 [ 807.249700][T12811] ? __lock_acquire+0x1703/0x4e70 [ 807.254717][T12811] ? __kasan_check_read+0x11/0x20 [ 807.259732][T12811] ? mark_lock+0xc2/0x1220 [ 807.264145][T12811] ? __cleanup_sighand+0x60/0x60 [ 807.269064][T12811] ? find_held_lock+0x35/0x130 [ 807.273822][T12811] _do_fork+0x146/0xfa0 [ 807.277960][T12811] ? copy_init_mm+0x20/0x20 [ 807.282449][T12811] ? __kasan_check_read+0x11/0x20 [ 807.287453][T12811] ? _copy_to_user+0x118/0x160 [ 807.292201][T12811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 807.298512][T12811] ? put_timespec64+0xda/0x140 [ 807.303260][T12811] __x64_sys_clone+0x18d/0x250 [ 807.308015][T12811] ? __ia32_sys_vfork+0xc0/0xc0 [ 807.312861][T12811] ? lockdep_hardirqs_on+0x418/0x5d0 [ 807.318129][T12811] ? trace_hardirqs_on+0x67/0x240 [ 807.323138][T12811] do_syscall_64+0xfa/0x760 [ 807.327648][T12811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.333521][T12811] RIP: 0033:0x457fda [ 807.337403][T12811] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 807.356990][T12811] RSP: 002b:00007ffcda215550 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 807.365383][T12811] RAX: ffffffffffffffda RBX: 00007ffcda215550 RCX: 0000000000457fda [ 807.373338][T12811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 807.381308][T12811] RBP: 00007ffcda215590 R08: 0000000000000001 R09: 000055555564f940 [ 807.389260][T12811] R10: 000055555564fc10 R11: 0000000000000246 R12: 0000000000000001 [ 807.397245][T12811] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcda2155e0 05:59:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) 05:59:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) [ 807.498497][T12811] memory: usage 1900kB, limit 0kB, failcnt 142 [ 807.528442][T12811] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 807.581915][T12811] Memory cgroup stats for /syz4: [ 807.582019][T12811] anon 184320 [ 807.582019][T12811] file 0 [ 807.582019][T12811] kernel_stack 65536 [ 807.582019][T12811] slab 1912832 [ 807.582019][T12811] sock 0 [ 807.582019][T12811] shmem 0 [ 807.582019][T12811] file_mapped 0 [ 807.582019][T12811] file_dirty 0 [ 807.582019][T12811] file_writeback 0 [ 807.582019][T12811] anon_thp 0 [ 807.582019][T12811] inactive_anon 0 [ 807.582019][T12811] active_anon 114688 [ 807.582019][T12811] inactive_file 0 [ 807.582019][T12811] active_file 12288 [ 807.582019][T12811] unevictable 0 [ 807.582019][T12811] slab_reclaimable 811008 [ 807.582019][T12811] slab_unreclaimable 1101824 [ 807.582019][T12811] pgfault 84777 [ 807.582019][T12811] pgmajfault 0 [ 807.582019][T12811] workingset_refault 0 [ 807.582019][T12811] workingset_activate 0 [ 807.582019][T12811] workingset_nodereclaim 0 [ 807.582019][T12811] pgrefill 278 [ 807.582019][T12811] pgscan 297 [ 807.582019][T12811] pgsteal 127 [ 807.582019][T12811] pgactivate 132 05:59:09 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6f04, 0x0) [ 807.680559][T12811] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=12811,uid=0 [ 807.715218][T12811] Memory cgroup out of memory: Killed process 12811 (syz-executor.4) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB 05:59:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) [ 807.770785][ T1065] oom_reaper: reaped process 12811 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 05:59:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) 05:59:09 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x477, 0x0) 05:59:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) 05:59:09 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7004, 0x0) 05:59:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) 05:59:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7104, 0x0) 05:59:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 05:59:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) 05:59:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) 05:59:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:59:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7204, 0x0) [ 809.811134][T13108] IPVS: ftp: loaded support on port[0] = 21 [ 810.144330][T13108] chnl_net:caif_netlink_parms(): no params data found [ 810.314411][T13108] bridge0: port 1(bridge_slave_0) entered blocking state [ 810.321807][T13108] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.329476][T13108] device bridge_slave_0 entered promiscuous mode [ 810.337281][T13108] bridge0: port 2(bridge_slave_1) entered blocking state [ 810.344736][T13108] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.352796][T13108] device bridge_slave_1 entered promiscuous mode [ 810.370700][T13108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 810.380364][ T968] device bridge_slave_1 left promiscuous mode [ 810.386538][ T968] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.431224][ T968] device bridge_slave_0 left promiscuous mode [ 810.437463][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.501351][ T968] device bridge_slave_1 left promiscuous mode [ 810.507518][ T968] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.541314][ T968] device bridge_slave_0 left promiscuous mode [ 810.547549][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 814.420539][ T968] device hsr_slave_0 left promiscuous mode [ 814.460269][ T968] device hsr_slave_1 left promiscuous mode [ 814.524248][ T968] team0 (unregistering): Port device team_slave_1 removed [ 814.537357][ T968] team0 (unregistering): Port device team_slave_0 removed [ 814.554748][ T968] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 814.597211][ T968] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 814.699613][ T968] bond0 (unregistering): Released all slaves [ 814.860743][ T968] device hsr_slave_0 left promiscuous mode [ 814.920295][ T968] device hsr_slave_1 left promiscuous mode [ 814.983411][ T968] team0 (unregistering): Port device team_slave_1 removed [ 814.995364][ T968] team0 (unregistering): Port device team_slave_0 removed [ 815.008293][ T968] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 815.049400][ T968] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 815.127892][ T968] bond0 (unregistering): Released all slaves [ 815.244538][T13108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 815.265922][T13108] team0: Port device team_slave_0 added [ 815.272998][T13108] team0: Port device team_slave_1 added [ 815.333213][T13108] device hsr_slave_0 entered promiscuous mode [ 815.370546][T13108] device hsr_slave_1 entered promiscuous mode [ 815.410230][T13108] debugfs: Directory 'hsr0' with parent '/' already present! [ 815.461047][T13108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 815.477711][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 815.486236][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 815.496955][T13108] 8021q: adding VLAN 0 to HW filter on device team0 [ 815.509612][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 815.518564][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 815.527341][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.534457][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 815.554137][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 815.562284][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 815.571888][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 815.580899][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.587961][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 815.596148][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 815.604752][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 815.625896][T13108] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 815.636682][T13108] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 815.656119][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 815.666016][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 815.674921][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 815.684938][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 815.693290][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 815.701072][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 815.718997][T13108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 816.152500][T13116] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 816.171888][T13116] CPU: 1 PID: 13116 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 816.179455][T13116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.189505][T13116] Call Trace: [ 816.192806][T13116] dump_stack+0x172/0x1f0 [ 816.197141][T13116] dump_header+0x10b/0x82d [ 816.201561][T13116] oom_kill_process.cold+0x10/0x15 [ 816.206671][T13116] out_of_memory+0x79a/0x12c0 [ 816.211355][T13116] ? __sched_text_start+0x8/0x8 [ 816.216207][T13116] ? oom_killer_disable+0x280/0x280 [ 816.221417][T13116] mem_cgroup_out_of_memory+0x1d8/0x240 [ 816.227144][T13116] ? PageTransHuge+0xc0/0xc0 [ 816.231738][T13116] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 816.237541][T13116] ? cgroup_file_notify+0x140/0x1b0 [ 816.242755][T13116] memory_max_write+0x262/0x3a0 [ 816.247608][T13116] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 816.254372][T13116] ? lock_acquire+0x190/0x410 [ 816.259043][T13116] ? kernfs_fop_write+0x227/0x480 [ 816.264073][T13116] cgroup_file_write+0x241/0x790 [ 816.269009][T13116] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 816.275767][T13116] ? cgroup_migrate_add_task+0x890/0x890 [ 816.281404][T13116] ? cgroup_migrate_add_task+0x890/0x890 [ 816.287033][T13116] kernfs_fop_write+0x2b8/0x480 [ 816.291884][T13116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 816.298126][T13116] __vfs_write+0x8a/0x110 [ 816.302451][T13116] ? kernfs_fop_open+0xd80/0xd80 [ 816.307390][T13116] vfs_write+0x268/0x5d0 [ 816.311638][T13116] ksys_write+0x14f/0x290 [ 816.315972][T13116] ? __ia32_sys_read+0xb0/0xb0 [ 816.320733][T13116] ? do_syscall_64+0x26/0x760 [ 816.325405][T13116] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.331472][T13116] ? do_syscall_64+0x26/0x760 [ 816.336153][T13116] __x64_sys_write+0x73/0xb0 [ 816.340741][T13116] do_syscall_64+0xfa/0x760 [ 816.345247][T13116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.351135][T13116] RIP: 0033:0x459a09 [ 816.355026][T13116] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 816.374624][T13116] RSP: 002b:00007f4f6dcedc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 816.383037][T13116] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 816.391002][T13116] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 816.398969][T13116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 816.406953][T13116] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f6dcee6d4 [ 816.414916][T13116] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 816.455137][T13116] memory: usage 5156kB, limit 0kB, failcnt 235050 [ 816.464155][T13116] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 816.477627][T13116] Memory cgroup stats for /syz5: [ 816.477758][T13116] anon 4313088 [ 816.477758][T13116] file 69632 [ 816.477758][T13116] kernel_stack 65536 [ 816.477758][T13116] slab 794624 [ 816.477758][T13116] sock 0 [ 816.477758][T13116] shmem 0 [ 816.477758][T13116] file_mapped 0 [ 816.477758][T13116] file_dirty 0 [ 816.477758][T13116] file_writeback 0 [ 816.477758][T13116] anon_thp 4194304 [ 816.477758][T13116] inactive_anon 0 [ 816.477758][T13116] active_anon 4313088 [ 816.477758][T13116] inactive_file 0 [ 816.477758][T13116] active_file 61440 [ 816.477758][T13116] unevictable 0 [ 816.477758][T13116] slab_reclaimable 270336 [ 816.477758][T13116] slab_unreclaimable 524288 [ 816.477758][T13116] pgfault 69696 [ 816.477758][T13116] pgmajfault 0 [ 816.477758][T13116] workingset_refault 0 [ 816.477758][T13116] workingset_activate 0 [ 816.477758][T13116] workingset_nodereclaim 0 [ 816.477758][T13116] pgrefill 171 [ 816.477758][T13116] pgscan 183 [ 816.477758][T13116] pgsteal 84 [ 816.477758][T13116] pgactivate 66 [ 816.583354][T13116] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13115,uid=0 [ 816.609138][T13116] Memory cgroup out of memory: Killed process 13115 (syz-executor.5) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 816.633770][ T1065] oom_reaper: reaped process 13115 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 05:59:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:18 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x478, 0x0) 05:59:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) 05:59:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) 05:59:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7304, 0x0) [ 816.724380][T13108] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 816.801918][T13108] CPU: 1 PID: 13108 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 816.809510][T13108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.819575][T13108] Call Trace: [ 816.822879][T13108] dump_stack+0x172/0x1f0 [ 816.827225][T13108] dump_header+0x10b/0x82d [ 816.831653][T13108] ? oom_kill_process+0x94/0x3f0 [ 816.836601][T13108] oom_kill_process.cold+0x10/0x15 [ 816.841722][T13108] out_of_memory+0x79a/0x12c0 [ 816.846408][T13108] ? lock_downgrade+0x920/0x920 [ 816.851266][T13108] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 816.857074][T13108] ? oom_killer_disable+0x280/0x280 [ 816.862293][T13108] mem_cgroup_out_of_memory+0x1d8/0x240 [ 816.867826][T13108] ? PageTransHuge+0xc0/0xc0 [ 816.872410][T13108] ? do_raw_spin_unlock+0x57/0x270 [ 816.877508][T13108] ? _raw_spin_unlock+0x2d/0x50 [ 816.882346][T13108] try_charge+0xf4b/0x1440 [ 816.886753][T13108] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 816.892284][T13108] ? percpu_ref_tryget_live+0x111/0x290 [ 816.897827][T13108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 816.904054][T13108] ? __kasan_check_read+0x11/0x20 [ 816.909088][T13108] ? get_mem_cgroup_from_mm+0x156/0x320 [ 816.914621][T13108] mem_cgroup_try_charge+0x136/0x590 [ 816.919893][T13108] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 816.926134][T13108] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 816.931756][T13108] wp_page_copy+0x41e/0x15e0 [ 816.936342][T13108] ? find_held_lock+0x35/0x130 [ 816.941270][T13108] ? pmd_pfn+0x1d0/0x1d0 [ 816.945506][T13108] ? lock_downgrade+0x920/0x920 [ 816.950355][T13108] ? swp_swapcount+0x540/0x540 [ 816.955107][T13108] ? __kasan_check_read+0x11/0x20 [ 816.960153][T13108] ? do_raw_spin_unlock+0x57/0x270 [ 816.965255][T13108] do_wp_page+0x499/0x14d0 [ 816.969672][T13108] ? finish_mkwrite_fault+0x570/0x570 [ 816.975039][T13108] __handle_mm_fault+0x22c7/0x3ef0 [ 816.980153][T13108] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 816.985698][T13108] ? __kasan_check_read+0x11/0x20 [ 816.990720][T13108] handle_mm_fault+0x1b5/0x6b0 [ 816.995486][T13108] __do_page_fault+0x536/0xdd0 [ 817.000252][T13108] do_page_fault+0x38/0x590 [ 817.004745][T13108] page_fault+0x39/0x40 [ 817.008882][T13108] RIP: 0033:0x430ae6 [ 817.012775][T13108] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 7c 44 64 00 85 c0 0f 84 [ 817.032369][T13108] RSP: 002b:00007ffdac78a570 EFLAGS: 00010206 [ 817.038418][T13108] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 05:59:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 817.046375][T13108] RDX: 0000555556834930 RSI: 000055555683c970 RDI: 0000000000000003 [ 817.054330][T13108] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556833940 [ 817.062285][T13108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 817.070257][T13108] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 05:59:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7400, 0x0) [ 817.281255][T13108] memory: usage 720kB, limit 0kB, failcnt 235058 [ 817.318311][T13108] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 05:59:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 817.383672][T13108] Memory cgroup stats for /syz5: [ 817.383778][T13108] anon 61440 [ 817.383778][T13108] file 69632 [ 817.383778][T13108] kernel_stack 0 [ 817.383778][T13108] slab 794624 [ 817.383778][T13108] sock 0 [ 817.383778][T13108] shmem 0 [ 817.383778][T13108] file_mapped 0 [ 817.383778][T13108] file_dirty 0 [ 817.383778][T13108] file_writeback 0 [ 817.383778][T13108] anon_thp 0 [ 817.383778][T13108] inactive_anon 0 [ 817.383778][T13108] active_anon 61440 [ 817.383778][T13108] inactive_file 0 [ 817.383778][T13108] active_file 61440 [ 817.383778][T13108] unevictable 0 [ 817.383778][T13108] slab_reclaimable 270336 [ 817.383778][T13108] slab_unreclaimable 524288 [ 817.383778][T13108] pgfault 69696 [ 817.383778][T13108] pgmajfault 0 [ 817.383778][T13108] workingset_refault 0 [ 817.383778][T13108] workingset_activate 0 [ 817.383778][T13108] workingset_nodereclaim 0 [ 817.383778][T13108] pgrefill 171 [ 817.383778][T13108] pgscan 183 [ 817.383778][T13108] pgsteal 84 [ 817.383778][T13108] pgactivate 66 05:59:19 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x479, 0x0) 05:59:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0xa, 0x922000000003, 0x11) 05:59:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7404, 0x0) [ 817.880283][T13108] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13108,uid=0 [ 817.908023][T13108] Memory cgroup out of memory: Killed process 13108 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 817.923881][ T1065] oom_reaper: reaped process 13108 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 05:59:20 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x47a, 0x0) 05:59:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:59:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:20 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7504, 0x0) [ 818.910176][T13194] IPVS: ftp: loaded support on port[0] = 21 [ 818.976702][T13194] chnl_net:caif_netlink_parms(): no params data found [ 819.008441][T13194] bridge0: port 1(bridge_slave_0) entered blocking state [ 819.015942][T13194] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.024088][T13194] device bridge_slave_0 entered promiscuous mode [ 819.032232][T13194] bridge0: port 2(bridge_slave_1) entered blocking state [ 819.045092][T13194] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.053096][T13194] device bridge_slave_1 entered promiscuous mode [ 819.071983][T13194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 819.083460][T13194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 819.508911][T13194] team0: Port device team_slave_0 added [ 819.516048][T13194] team0: Port device team_slave_1 added [ 819.782255][T13194] device hsr_slave_0 entered promiscuous mode [ 819.820453][T13194] device hsr_slave_1 entered promiscuous mode [ 819.870404][T13194] debugfs: Directory 'hsr0' with parent '/' already present! [ 820.112818][T13194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 820.329337][T13194] 8021q: adding VLAN 0 to HW filter on device team0 [ 820.338190][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 820.346914][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 820.357366][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 820.366168][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 820.375038][T10802] bridge0: port 1(bridge_slave_0) entered blocking state [ 820.382158][T10802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 820.395982][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 820.404402][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 820.413906][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 820.422387][T12841] bridge0: port 2(bridge_slave_1) entered blocking state [ 820.429455][T12841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 820.437496][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 820.652771][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 820.662465][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 820.672972][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 820.683009][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 820.900148][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 820.908781][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 820.925071][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 820.934199][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 820.946549][T13194] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 820.959230][T13194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 820.967748][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 820.977133][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 821.207118][T13194] 8021q: adding VLAN 0 to HW filter on device batadv0 05:59:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) 05:59:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0xa, 0x922000000003, 0x11) 05:59:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) 05:59:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:23 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x47b, 0x0) 05:59:23 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7604, 0x0) [ 821.862500][ T968] device bridge_slave_1 left promiscuous mode [ 821.868768][ T968] bridge0: port 2(bridge_slave_1) entered disabled state 05:59:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0xa, 0x922000000003, 0x11) 05:59:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) [ 821.987560][ T968] device bridge_slave_0 left promiscuous mode [ 822.016717][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.101959][ T968] device bridge_slave_1 left promiscuous mode [ 822.109080][ T968] bridge0: port 2(bridge_slave_1) entered disabled state 05:59:23 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7704, 0x0) 05:59:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0xa, 0x922000000003, 0x11) 05:59:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) [ 822.255942][ T968] device bridge_slave_0 left promiscuous mode [ 822.270555][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.361609][ T968] device bridge_slave_1 left promiscuous mode [ 822.367826][ T968] bridge0: port 2(bridge_slave_1) entered disabled state 05:59:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0xa, 0x922000000003, 0x11) [ 822.530896][ T968] device bridge_slave_0 left promiscuous mode [ 822.537179][ T968] bridge0: port 1(bridge_slave_0) entered disabled state 05:59:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:24 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7804, 0x0) [ 828.562152][ T968] device hsr_slave_0 left promiscuous mode [ 828.630152][ T968] device hsr_slave_1 left promiscuous mode [ 828.697605][ T968] team0 (unregistering): Port device team_slave_1 removed [ 828.711517][ T968] team0 (unregistering): Port device team_slave_0 removed [ 828.722604][ T968] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 828.764152][ T968] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 828.838706][ T968] bond0 (unregistering): Released all slaves [ 828.981219][ T968] device hsr_slave_0 left promiscuous mode [ 829.020214][ T968] device hsr_slave_1 left promiscuous mode [ 829.095059][ T968] team0 (unregistering): Port device team_slave_1 removed [ 829.107327][ T968] team0 (unregistering): Port device team_slave_0 removed [ 829.118794][ T968] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 829.185795][ T968] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 829.277493][ T968] bond0 (unregistering): Released all slaves [ 829.451854][ T968] device hsr_slave_0 left promiscuous mode [ 829.510289][ T968] device hsr_slave_1 left promiscuous mode [ 829.587998][ T968] team0 (unregistering): Port device team_slave_1 removed [ 829.602076][ T968] team0 (unregistering): Port device team_slave_0 removed [ 829.613084][ T968] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 829.654261][ T968] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 829.745214][ T968] bond0 (unregistering): Released all slaves [ 829.877361][T13271] IPVS: ftp: loaded support on port[0] = 21 [ 829.994544][T13271] chnl_net:caif_netlink_parms(): no params data found [ 830.022049][T13271] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.029192][T13271] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.037238][T13271] device bridge_slave_0 entered promiscuous mode [ 830.045130][T13271] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.052320][T13271] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.060357][T13271] device bridge_slave_1 entered promiscuous mode [ 830.079815][T13271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 830.092738][T13271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 830.114050][T13271] team0: Port device team_slave_0 added [ 830.121513][T13271] team0: Port device team_slave_1 added [ 830.183079][T13271] device hsr_slave_0 entered promiscuous mode [ 830.240522][T13271] device hsr_slave_1 entered promiscuous mode [ 830.300172][T13271] debugfs: Directory 'hsr0' with parent '/' already present! [ 830.461346][T13271] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.468433][T13271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 830.475828][T13271] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.482958][T13271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 830.528096][T13271] 8021q: adding VLAN 0 to HW filter on device bond0 [ 830.543246][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 830.553032][ T8663] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.563103][ T8663] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.576980][T13271] 8021q: adding VLAN 0 to HW filter on device team0 [ 830.589493][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 830.599171][ T8663] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.606288][ T8663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 830.624351][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 830.633192][T12841] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.640312][T12841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 830.664048][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 830.673405][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 830.682431][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 830.698029][T13271] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 830.710343][T13271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 830.718471][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 830.727240][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 830.755607][T13271] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 830.974498][T13280] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 830.990892][T13280] CPU: 1 PID: 13280 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 830.998451][T13280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.008505][T13280] Call Trace: [ 831.011812][T13280] dump_stack+0x172/0x1f0 [ 831.016147][T13280] dump_header+0x10b/0x82d [ 831.020573][T13280] oom_kill_process.cold+0x10/0x15 [ 831.025683][T13280] out_of_memory+0x79a/0x12c0 [ 831.030366][T13280] ? __sched_text_start+0x8/0x8 [ 831.035216][T13280] ? oom_killer_disable+0x280/0x280 [ 831.040428][T13280] mem_cgroup_out_of_memory+0x1d8/0x240 [ 831.045975][T13280] ? PageTransHuge+0xc0/0xc0 [ 831.050575][T13280] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 831.056380][T13280] ? cgroup_file_notify+0x140/0x1b0 [ 831.061579][T13280] memory_max_write+0x262/0x3a0 [ 831.066433][T13280] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 831.073192][T13280] ? lock_acquire+0x190/0x410 [ 831.077867][T13280] ? kernfs_fop_write+0x227/0x480 [ 831.082895][T13280] cgroup_file_write+0x241/0x790 [ 831.087835][T13280] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 831.094600][T13280] ? cgroup_migrate_add_task+0x890/0x890 [ 831.100239][T13280] ? cgroup_migrate_add_task+0x890/0x890 [ 831.105865][T13280] kernfs_fop_write+0x2b8/0x480 [ 831.110714][T13280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 831.116958][T13280] __vfs_write+0x8a/0x110 [ 831.121282][T13280] ? kernfs_fop_open+0xd80/0xd80 [ 831.126217][T13280] vfs_write+0x268/0x5d0 [ 831.130465][T13280] ksys_write+0x14f/0x290 [ 831.134795][T13280] ? __ia32_sys_read+0xb0/0xb0 [ 831.139555][T13280] ? do_syscall_64+0x26/0x760 [ 831.144232][T13280] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.150299][T13280] ? do_syscall_64+0x26/0x760 [ 831.155001][T13280] __x64_sys_write+0x73/0xb0 [ 831.159591][T13280] do_syscall_64+0xfa/0x760 [ 831.164100][T13280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.169986][T13280] RIP: 0033:0x459a09 [ 831.173875][T13280] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.193482][T13280] RSP: 002b:00007f890d23fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 831.201896][T13280] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 831.209861][T13280] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 831.217834][T13280] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 831.225800][T13280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f890d2406d4 [ 831.233864][T13280] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 831.243469][T13280] memory: usage 5132kB, limit 0kB, failcnt 235059 [ 831.250340][T13280] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 831.257347][T13280] Memory cgroup stats for /syz5: [ 831.257468][T13280] anon 4313088 [ 831.257468][T13280] file 69632 [ 831.257468][T13280] kernel_stack 65536 [ 831.257468][T13280] slab 794624 [ 831.257468][T13280] sock 0 [ 831.257468][T13280] shmem 0 [ 831.257468][T13280] file_mapped 0 [ 831.257468][T13280] file_dirty 0 [ 831.257468][T13280] file_writeback 0 [ 831.257468][T13280] anon_thp 4194304 [ 831.257468][T13280] inactive_anon 0 [ 831.257468][T13280] active_anon 4313088 [ 831.257468][T13280] inactive_file 0 [ 831.257468][T13280] active_file 61440 [ 831.257468][T13280] unevictable 0 [ 831.257468][T13280] slab_reclaimable 270336 [ 831.257468][T13280] slab_unreclaimable 524288 [ 831.257468][T13280] pgfault 69762 [ 831.257468][T13280] pgmajfault 0 [ 831.257468][T13280] workingset_refault 0 [ 831.257468][T13280] workingset_activate 0 [ 831.257468][T13280] workingset_nodereclaim 0 [ 831.257468][T13280] pgrefill 171 [ 831.257468][T13280] pgscan 183 [ 831.257468][T13280] pgsteal 84 [ 831.257468][T13280] pgactivate 66 [ 831.352806][T13280] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13279,uid=0 [ 831.369233][T13280] Memory cgroup out of memory: Killed process 13279 (syz-executor.5) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 831.387099][ T1065] oom_reaper: reaped process 13279 (syz-executor.5), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB 05:59:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) 05:59:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) 05:59:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7904, 0x0) 05:59:33 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x47c, 0x0) [ 831.473993][T13271] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 831.542997][T13271] CPU: 0 PID: 13271 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 831.550578][T13271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.560636][T13271] Call Trace: [ 831.563933][T13271] dump_stack+0x172/0x1f0 [ 831.568286][T13271] dump_header+0x10b/0x82d [ 831.572711][T13271] ? oom_kill_process+0x94/0x3f0 [ 831.577658][T13271] oom_kill_process.cold+0x10/0x15 [ 831.583299][T13271] out_of_memory+0x79a/0x12c0 [ 831.589491][T13271] ? lock_downgrade+0x920/0x920 [ 831.594353][T13271] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 831.600163][T13271] ? oom_killer_disable+0x280/0x280 [ 831.605379][T13271] mem_cgroup_out_of_memory+0x1d8/0x240 [ 831.610928][T13271] ? PageTransHuge+0xc0/0xc0 [ 831.615528][T13271] ? do_raw_spin_unlock+0x57/0x270 [ 831.620643][T13271] ? _raw_spin_unlock+0x2d/0x50 [ 831.625500][T13271] try_charge+0xf4b/0x1440 [ 831.629933][T13271] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 831.635592][T13271] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 831.641578][T13271] ? cache_grow_begin+0x122/0xd20 [ 831.646608][T13271] ? find_held_lock+0x35/0x130 [ 831.651379][T13271] ? cache_grow_begin+0x122/0xd20 [ 831.656400][T13271] __memcg_kmem_charge_memcg+0x71/0xf0 [ 831.661846][T13271] ? memcg_kmem_put_cache+0x50/0x50 [ 831.667037][T13271] ? __kasan_check_read+0x11/0x20 [ 831.672490][T13271] cache_grow_begin+0x627/0xd20 [ 831.677330][T13271] ? write_comp_data+0x61/0x70 [ 831.682199][T13271] ? mempolicy_slab_node+0x139/0x390 [ 831.687505][T13271] fallback_alloc+0x1fd/0x2d0 [ 831.692208][T13271] ____cache_alloc_node+0x1bc/0x1d0 [ 831.697407][T13271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.704365][T13271] kmem_cache_alloc+0x1ef/0x710 [ 831.709214][T13271] ? stack_trace_save+0xac/0xe0 [ 831.715664][T13271] __alloc_file+0x27/0x340 [ 831.720536][T13271] alloc_empty_file+0x72/0x170 [ 831.725644][T13271] path_openat+0xef/0x4630 [ 831.730048][T13271] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 831.735840][T13271] ? kasan_slab_alloc+0xf/0x20 [ 831.740773][T13271] ? kmem_cache_alloc+0x121/0x710 [ 831.745830][T13271] ? getname_flags+0xd6/0x5b0 [ 831.750512][T13271] ? getname+0x1a/0x20 [ 831.754582][T13271] ? do_sys_open+0x2c9/0x5d0 [ 831.759156][T13271] ? __x64_sys_open+0x7e/0xc0 [ 831.763818][T13271] ? do_syscall_64+0xfa/0x760 [ 831.768495][T13271] ? mark_lock+0xc2/0x1220 [ 831.772900][T13271] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 831.779737][T13271] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 831.785104][T13271] ? sctp_data_ready+0x370/0x500 [ 831.790030][T13271] ? __alloc_fd+0x487/0x620 [ 831.794524][T13271] do_filp_open+0x1a1/0x280 [ 831.799015][T13271] ? may_open_dev+0x100/0x100 [ 831.803684][T13271] ? lock_downgrade+0x920/0x920 [ 831.808519][T13271] ? rwlock_bug.part.0+0x90/0x90 [ 831.813448][T13271] ? __kasan_check_read+0x11/0x20 [ 831.818629][T13271] ? do_raw_spin_unlock+0x57/0x270 [ 831.823734][T13271] ? _raw_spin_unlock+0x2d/0x50 [ 831.828569][T13271] ? __alloc_fd+0x487/0x620 [ 831.833073][T13271] do_sys_open+0x3fe/0x5d0 [ 831.837480][T13271] ? filp_open+0x80/0x80 [ 831.841709][T13271] ? __detach_mounts+0x2a0/0x2a0 [ 831.846636][T13271] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 831.852087][T13271] ? do_syscall_64+0x26/0x760 [ 831.856747][T13271] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.862799][T13271] ? do_syscall_64+0x26/0x760 [ 831.867467][T13271] __x64_sys_open+0x7e/0xc0 [ 831.871961][T13271] do_syscall_64+0xfa/0x760 [ 831.876451][T13271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.882326][T13271] RIP: 0033:0x457980 [ 831.886208][T13271] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 831.905800][T13271] RSP: 002b:00007ffd33284770 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 831.914204][T13271] RAX: ffffffffffffffda RBX: 00000000000cadef RCX: 0000000000457980 [ 831.922174][T13271] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffd33285950 [ 831.930149][T13271] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555e80940 05:59:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) 05:59:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 831.938196][T13271] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffd33285950 [ 831.946159][T13271] R13: 00007ffd33285940 R14: 0000000000000000 R15: 00007ffd33285950 [ 831.974179][T13271] memory: usage 700kB, limit 0kB, failcnt 235071 [ 831.990098][T13271] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 831.997928][T13271] Memory cgroup stats for /syz5: [ 831.998040][T13271] anon 69632 [ 831.998040][T13271] file 69632 [ 831.998040][T13271] kernel_stack 0 [ 831.998040][T13271] slab 794624 [ 831.998040][T13271] sock 0 [ 831.998040][T13271] shmem 0 [ 831.998040][T13271] file_mapped 0 [ 831.998040][T13271] file_dirty 0 [ 831.998040][T13271] file_writeback 0 [ 831.998040][T13271] anon_thp 0 [ 831.998040][T13271] inactive_anon 0 [ 831.998040][T13271] active_anon 69632 [ 831.998040][T13271] inactive_file 0 [ 831.998040][T13271] active_file 61440 [ 831.998040][T13271] unevictable 0 [ 831.998040][T13271] slab_reclaimable 270336 [ 831.998040][T13271] slab_unreclaimable 524288 [ 831.998040][T13271] pgfault 69762 [ 831.998040][T13271] pgmajfault 0 [ 831.998040][T13271] workingset_refault 0 [ 831.998040][T13271] workingset_activate 0 [ 831.998040][T13271] workingset_nodereclaim 0 [ 831.998040][T13271] pgrefill 171 [ 831.998040][T13271] pgscan 183 [ 831.998040][T13271] pgsteal 84 05:59:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) [ 831.998040][T13271] pgactivate 66 [ 832.113557][T13271] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13271,uid=0 [ 832.133180][T13271] Memory cgroup out of memory: Killed process 13271 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 05:59:33 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x500, 0x0) 05:59:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7a00, 0x0) 05:59:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 832.609455][T13325] __ntfs_error: 2 callbacks suppressed [ 832.609465][T13325] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 832.690112][T13325] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 832.760187][T13325] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 05:59:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 05:59:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:59:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 05:59:34 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7a04, 0x0) 05:59:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 833.035669][T13322] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 833.051947][T13322] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 833.113123][T13322] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 05:59:34 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x600, 0x0) 05:59:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 05:59:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:59:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:59:35 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7b04, 0x0) [ 833.508049][T13357] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 833.591553][T13357] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 05:59:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 833.674883][T13357] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 05:59:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:59:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:35 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xedc0, 0x0) 05:59:35 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x700, 0x0) 05:59:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 834.218259][T13390] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 835.598783][T13418] IPVS: ftp: loaded support on port[0] = 21 [ 835.734863][T13418] chnl_net:caif_netlink_parms(): no params data found [ 835.828166][T13418] bridge0: port 1(bridge_slave_0) entered blocking state [ 835.836241][T13418] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.844059][T13418] device bridge_slave_0 entered promiscuous mode [ 835.917630][T13418] bridge0: port 2(bridge_slave_1) entered blocking state [ 835.925255][T13418] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.933038][T13418] device bridge_slave_1 entered promiscuous mode [ 835.951312][T13418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 835.964326][T13418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 836.052875][T13418] team0: Port device team_slave_0 added [ 836.059764][T13418] team0: Port device team_slave_1 added [ 836.113454][T13418] device hsr_slave_0 entered promiscuous mode [ 836.180391][T13418] device hsr_slave_1 entered promiscuous mode [ 836.240202][T13418] debugfs: Directory 'hsr0' with parent '/' already present! [ 836.323674][T13418] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.330783][T13418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 836.338062][T13418] bridge0: port 1(bridge_slave_0) entered blocking state [ 836.345155][T13418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 836.447633][T13418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 836.462184][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 836.470918][ T8655] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.478608][ T8655] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.487471][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 836.498836][ T968] device bridge_slave_1 left promiscuous mode [ 836.505798][ T968] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.561186][ T968] device bridge_slave_0 left promiscuous mode [ 836.567516][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.440831][ T968] device hsr_slave_0 left promiscuous mode [ 838.510229][ T968] device hsr_slave_1 left promiscuous mode [ 838.578584][ T968] team0 (unregistering): Port device team_slave_1 removed [ 838.592939][ T968] team0 (unregistering): Port device team_slave_0 removed [ 838.603653][ T968] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 838.666803][ T968] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 838.759677][ T968] bond0 (unregistering): Released all slaves [ 838.866524][T13418] 8021q: adding VLAN 0 to HW filter on device team0 [ 838.892614][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 838.901822][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 838.911484][T12739] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.918544][T12739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 838.927079][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 838.936068][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 838.944570][T12739] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.951924][T12739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.959475][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 838.968675][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 838.977349][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 838.987394][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 838.996032][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 839.004965][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 839.013613][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 839.022378][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 839.034656][T13418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 839.047288][T13418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 839.055538][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 839.064423][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 839.073118][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 839.096665][T13418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 839.406348][T13426] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 839.425117][T13426] CPU: 0 PID: 13426 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 839.432712][T13426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.442770][T13426] Call Trace: [ 839.446072][T13426] dump_stack+0x172/0x1f0 [ 839.450421][T13426] dump_header+0x10b/0x82d [ 839.454850][T13426] oom_kill_process.cold+0x10/0x15 [ 839.459975][T13426] out_of_memory+0x79a/0x12c0 [ 839.464666][T13426] ? __sched_text_start+0x8/0x8 [ 839.469528][T13426] ? oom_killer_disable+0x280/0x280 [ 839.474850][T13426] mem_cgroup_out_of_memory+0x1d8/0x240 [ 839.480401][T13426] ? PageTransHuge+0xc0/0xc0 [ 839.485008][T13426] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 839.490818][T13426] ? cgroup_file_notify+0x140/0x1b0 [ 839.496040][T13426] memory_max_write+0x262/0x3a0 [ 839.500912][T13426] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 839.507707][T13426] ? lock_acquire+0x190/0x410 [ 839.512400][T13426] ? kernfs_fop_write+0x227/0x480 [ 839.517449][T13426] cgroup_file_write+0x241/0x790 [ 839.522410][T13426] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 839.529184][T13426] ? cgroup_migrate_add_task+0x890/0x890 [ 839.534839][T13426] ? cgroup_migrate_add_task+0x890/0x890 [ 839.540479][T13426] kernfs_fop_write+0x2b8/0x480 [ 839.545337][T13426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 839.551591][T13426] __vfs_write+0x8a/0x110 [ 839.555929][T13426] ? kernfs_fop_open+0xd80/0xd80 [ 839.560878][T13426] vfs_write+0x268/0x5d0 [ 839.565139][T13426] ksys_write+0x14f/0x290 [ 839.569481][T13426] ? __ia32_sys_read+0xb0/0xb0 [ 839.574253][T13426] ? do_syscall_64+0x26/0x760 [ 839.578932][T13426] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.585004][T13426] ? do_syscall_64+0x26/0x760 [ 839.589700][T13426] __x64_sys_write+0x73/0xb0 [ 839.594303][T13426] do_syscall_64+0xfa/0x760 [ 839.598821][T13426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.604717][T13426] RIP: 0033:0x459a09 [ 839.608618][T13426] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 839.628237][T13426] RSP: 002b:00007f6922a94c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 839.636653][T13426] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 839.644624][T13426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 839.652596][T13426] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 839.660571][T13426] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6922a956d4 [ 839.668673][T13426] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 839.692122][T13426] memory: usage 5108kB, limit 0kB, failcnt 235072 [ 839.699328][T13426] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 839.716211][T13426] Memory cgroup stats for /syz5: [ 839.717348][T13426] anon 4349952 [ 839.717348][T13426] file 69632 [ 839.717348][T13426] kernel_stack 0 [ 839.717348][T13426] slab 794624 [ 839.717348][T13426] sock 0 [ 839.717348][T13426] shmem 0 [ 839.717348][T13426] file_mapped 0 [ 839.717348][T13426] file_dirty 0 [ 839.717348][T13426] file_writeback 0 [ 839.717348][T13426] anon_thp 4194304 [ 839.717348][T13426] inactive_anon 0 [ 839.717348][T13426] active_anon 4349952 [ 839.717348][T13426] inactive_file 0 [ 839.717348][T13426] active_file 61440 [ 839.717348][T13426] unevictable 0 [ 839.717348][T13426] slab_reclaimable 270336 [ 839.717348][T13426] slab_unreclaimable 524288 [ 839.717348][T13426] pgfault 69828 [ 839.717348][T13426] pgmajfault 0 [ 839.717348][T13426] workingset_refault 0 [ 839.717348][T13426] workingset_activate 0 [ 839.717348][T13426] workingset_nodereclaim 0 [ 839.717348][T13426] pgrefill 171 [ 839.717348][T13426] pgscan 183 [ 839.717348][T13426] pgsteal 84 [ 839.717348][T13426] pgactivate 66 [ 839.821608][T13426] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13424,uid=0 [ 839.838428][T13426] Memory cgroup out of memory: Killed process 13424 (syz-executor.5) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 839.856524][ T1065] oom_reaper: reaped process 13424 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 05:59:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 05:59:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:41 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xfc25, 0x0) 05:59:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:41 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x900, 0x0) [ 840.153586][T13418] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 840.214058][T13418] CPU: 1 PID: 13418 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 840.221668][T13418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.231743][T13418] Call Trace: [ 840.235045][T13418] dump_stack+0x172/0x1f0 [ 840.239390][T13418] dump_header+0x10b/0x82d [ 840.243808][T13418] ? oom_kill_process+0x94/0x3f0 [ 840.248758][T13418] oom_kill_process.cold+0x10/0x15 [ 840.253883][T13418] out_of_memory+0x79a/0x12c0 [ 840.258568][T13418] ? lock_downgrade+0x920/0x920 05:59:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0xa, 0x922000000003, 0x11) [ 840.263425][T13418] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 840.269232][T13418] ? oom_killer_disable+0x280/0x280 [ 840.274446][T13418] mem_cgroup_out_of_memory+0x1d8/0x240 [ 840.279992][T13418] ? PageTransHuge+0xc0/0xc0 [ 840.284591][T13418] ? do_raw_spin_unlock+0x57/0x270 [ 840.289707][T13418] ? _raw_spin_unlock+0x2d/0x50 [ 840.294559][T13418] try_charge+0xf4b/0x1440 [ 840.298988][T13418] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 840.304541][T13418] ? percpu_ref_tryget_live+0x111/0x290 [ 840.310102][T13418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.316353][T13418] ? __kasan_check_read+0x11/0x20 [ 840.321382][T13418] ? get_mem_cgroup_from_mm+0x156/0x320 [ 840.326932][T13418] mem_cgroup_try_charge+0x136/0x590 [ 840.332222][T13418] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 840.338468][T13418] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 840.344111][T13418] wp_page_copy+0x41e/0x15e0 [ 840.348701][T13418] ? find_held_lock+0x35/0x130 [ 840.353477][T13418] ? pmd_pfn+0x1d0/0x1d0 [ 840.357728][T13418] ? lock_downgrade+0x920/0x920 [ 840.362580][T13418] ? swp_swapcount+0x540/0x540 [ 840.367351][T13418] ? __kasan_check_read+0x11/0x20 [ 840.372381][T13418] ? do_raw_spin_unlock+0x57/0x270 [ 840.377504][T13418] do_wp_page+0x499/0x14d0 [ 840.381936][T13418] ? finish_mkwrite_fault+0x570/0x570 [ 840.387315][T13418] __handle_mm_fault+0x22c7/0x3ef0 [ 840.392419][T13418] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 840.397983][T13418] ? __kasan_check_read+0x11/0x20 [ 840.403003][T13418] handle_mm_fault+0x1b5/0x6b0 [ 840.407760][T13418] __do_page_fault+0x536/0xdd0 [ 840.412532][T13418] do_page_fault+0x38/0x590 [ 840.417027][T13418] page_fault+0x39/0x40 [ 840.421176][T13418] RIP: 0033:0x430ae6 [ 840.425055][T13418] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 7c 44 64 00 85 c0 0f 84 [ 840.444659][T13418] RSP: 002b:00007ffc2ecd36b0 EFLAGS: 00010206 [ 840.450724][T13418] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 05:59:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 840.458679][T13418] RDX: 00005555568b7930 RSI: 00005555568bf970 RDI: 0000000000000003 [ 840.466648][T13418] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555568b6940 [ 840.474864][T13418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 840.482831][T13418] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 840.580503][T13433] __ntfs_error: 5 callbacks suppressed [ 840.580514][T13433] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 05:59:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 840.631446][T13433] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 840.675617][T13433] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 840.680169][T13418] memory: usage 720kB, limit 0kB, failcnt 235080 [ 840.693597][T13418] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 840.736918][T13418] Memory cgroup stats for /syz5: [ 840.737100][T13418] anon 90112 [ 840.737100][T13418] file 69632 [ 840.737100][T13418] kernel_stack 0 [ 840.737100][T13418] slab 794624 [ 840.737100][T13418] sock 0 [ 840.737100][T13418] shmem 0 [ 840.737100][T13418] file_mapped 0 [ 840.737100][T13418] file_dirty 0 [ 840.737100][T13418] file_writeback 0 [ 840.737100][T13418] anon_thp 0 [ 840.737100][T13418] inactive_anon 0 [ 840.737100][T13418] active_anon 90112 [ 840.737100][T13418] inactive_file 0 05:59:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xff00, 0x0) [ 840.737100][T13418] active_file 61440 [ 840.737100][T13418] unevictable 0 [ 840.737100][T13418] slab_reclaimable 270336 [ 840.737100][T13418] slab_unreclaimable 524288 [ 840.737100][T13418] pgfault 69828 [ 840.737100][T13418] pgmajfault 0 [ 840.737100][T13418] workingset_refault 0 [ 840.737100][T13418] workingset_activate 0 [ 840.737100][T13418] workingset_nodereclaim 0 [ 840.737100][T13418] pgrefill 171 [ 840.737100][T13418] pgscan 183 [ 840.737100][T13418] pgsteal 84 [ 840.737100][T13418] pgactivate 66 05:59:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0xa, 0x922000000003, 0x11) [ 840.862358][T13418] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13418,uid=0 05:59:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 840.941428][T13456] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 840.949604][T13418] Memory cgroup out of memory: Killed process 13418 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 841.024156][ T1065] oom_reaper: reaped process 13418 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 841.044276][T13456] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 841.078116][T13456] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 05:59:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:43 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xa00, 0x0) 05:59:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) socket$kcm(0xa, 0x922000000003, 0x11) 05:59:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xff0f, 0x0) [ 841.876993][T13493] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 05:59:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 841.927269][T13493] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 05:59:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xa0000, 0x0) 05:59:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) [ 842.020502][T13493] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 05:59:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:43 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xe00, 0x0) 05:59:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 842.415694][T13523] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 05:59:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xe0000, 0x0) 05:59:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x1000000, 0x0) 05:59:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 844.262273][T13581] IPVS: ftp: loaded support on port[0] = 21 [ 844.388516][T13581] chnl_net:caif_netlink_parms(): no params data found [ 844.405297][ T968] device bridge_slave_1 left promiscuous mode [ 844.411638][ T968] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.481260][ T968] device bridge_slave_0 left promiscuous mode [ 844.487473][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 846.320679][ T968] device hsr_slave_0 left promiscuous mode [ 846.370213][ T968] device hsr_slave_1 left promiscuous mode [ 846.437730][ T968] team0 (unregistering): Port device team_slave_1 removed [ 846.451145][ T968] team0 (unregistering): Port device team_slave_0 removed [ 846.463201][ T968] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 846.523785][ T968] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 846.618082][ T968] bond0 (unregistering): Released all slaves [ 846.804237][T13581] bridge0: port 1(bridge_slave_0) entered blocking state [ 846.811893][T13581] bridge0: port 1(bridge_slave_0) entered disabled state [ 846.819576][T13581] device bridge_slave_0 entered promiscuous mode [ 846.827987][T13581] bridge0: port 2(bridge_slave_1) entered blocking state [ 846.835646][T13581] bridge0: port 2(bridge_slave_1) entered disabled state [ 846.843449][T13581] device bridge_slave_1 entered promiscuous mode [ 846.867462][T13581] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 846.878672][T13581] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 846.898636][T13581] team0: Port device team_slave_0 added [ 846.906120][T13581] team0: Port device team_slave_1 added [ 846.951978][T13581] device hsr_slave_0 entered promiscuous mode [ 847.000535][T13581] device hsr_slave_1 entered promiscuous mode [ 847.040179][T13581] debugfs: Directory 'hsr0' with parent '/' already present! [ 847.116243][T13581] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.123391][T13581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 847.188388][T13581] 8021q: adding VLAN 0 to HW filter on device bond0 [ 847.209027][T10802] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.225456][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 847.238518][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 847.252808][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 847.266892][T13581] 8021q: adding VLAN 0 to HW filter on device team0 [ 847.285438][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 847.297867][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 847.312608][ T8663] bridge0: port 1(bridge_slave_0) entered blocking state [ 847.319678][ T8663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 847.344637][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 847.353733][T10802] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.360841][T10802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 847.377786][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 847.400690][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 847.408791][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 847.418245][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 847.432671][T13581] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 847.444437][T13581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 847.454563][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 847.483481][T13581] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 847.892739][T13589] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 847.903430][T13589] CPU: 1 PID: 13589 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 847.910985][T13589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.921041][T13589] Call Trace: [ 847.924338][T13589] dump_stack+0x172/0x1f0 [ 847.928676][T13589] dump_header+0x10b/0x82d [ 847.933358][T13589] oom_kill_process.cold+0x10/0x15 [ 847.938476][T13589] out_of_memory+0x79a/0x12c0 [ 847.943157][T13589] ? __sched_text_start+0x8/0x8 [ 847.948010][T13589] ? oom_killer_disable+0x280/0x280 [ 847.953225][T13589] mem_cgroup_out_of_memory+0x1d8/0x240 [ 847.958865][T13589] ? PageTransHuge+0xc0/0xc0 [ 847.963473][T13589] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 847.969280][T13589] ? cgroup_file_notify+0x140/0x1b0 [ 847.974487][T13589] memory_max_write+0x262/0x3a0 [ 847.979346][T13589] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 847.986110][T13589] ? lock_acquire+0x190/0x410 [ 847.990788][T13589] ? kernfs_fop_write+0x227/0x480 [ 847.995823][T13589] cgroup_file_write+0x241/0x790 [ 848.000770][T13589] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 848.007535][T13589] ? cgroup_migrate_add_task+0x890/0x890 [ 848.013180][T13589] ? cgroup_migrate_add_task+0x890/0x890 [ 848.018835][T13589] kernfs_fop_write+0x2b8/0x480 [ 848.023689][T13589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.029940][T13589] __vfs_write+0x8a/0x110 [ 848.034359][T13589] ? kernfs_fop_open+0xd80/0xd80 [ 848.039304][T13589] vfs_write+0x268/0x5d0 [ 848.043555][T13589] ksys_write+0x14f/0x290 [ 848.047894][T13589] ? __ia32_sys_read+0xb0/0xb0 [ 848.052665][T13589] ? do_syscall_64+0x26/0x760 [ 848.057340][T13589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.063403][T13589] ? do_syscall_64+0x26/0x760 [ 848.068088][T13589] __x64_sys_write+0x73/0xb0 [ 848.072680][T13589] do_syscall_64+0xfa/0x760 [ 848.077190][T13589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.083078][T13589] RIP: 0033:0x459a09 [ 848.086972][T13589] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 848.106576][T13589] RSP: 002b:00007f2946819c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 848.114990][T13589] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 848.122964][T13589] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 848.130938][T13589] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 848.138908][T13589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f294681a6d4 [ 848.146880][T13589] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 848.159115][T13589] memory: usage 5144kB, limit 0kB, failcnt 235081 [ 848.168163][T13589] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 848.182970][T13589] Memory cgroup stats for /syz5: [ 848.183583][T13589] anon 4415488 [ 848.183583][T13589] file 69632 [ 848.183583][T13589] kernel_stack 131072 [ 848.183583][T13589] slab 794624 [ 848.183583][T13589] sock 0 [ 848.183583][T13589] shmem 0 [ 848.183583][T13589] file_mapped 0 [ 848.183583][T13589] file_dirty 0 [ 848.183583][T13589] file_writeback 0 [ 848.183583][T13589] anon_thp 4194304 [ 848.183583][T13589] inactive_anon 0 [ 848.183583][T13589] active_anon 4415488 [ 848.183583][T13589] inactive_file 0 [ 848.183583][T13589] active_file 61440 [ 848.183583][T13589] unevictable 0 [ 848.183583][T13589] slab_reclaimable 270336 [ 848.183583][T13589] slab_unreclaimable 524288 [ 848.183583][T13589] pgfault 69894 [ 848.183583][T13589] pgmajfault 0 [ 848.183583][T13589] workingset_refault 0 [ 848.183583][T13589] workingset_activate 0 [ 848.183583][T13589] workingset_nodereclaim 0 [ 848.183583][T13589] pgrefill 171 [ 848.183583][T13589] pgscan 183 [ 848.183583][T13589] pgsteal 84 [ 848.183583][T13589] pgactivate 66 [ 848.281252][T13589] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13588,uid=0 [ 848.299707][T13589] Memory cgroup out of memory: Killed process 13588 (syz-executor.5) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 848.318284][ T1065] oom_reaper: reaped process 13588 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 05:59:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:50 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2000000, 0x0) 05:59:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:50 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x1020, 0x0) [ 848.718848][T13581] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 848.721484][T13596] __ntfs_error: 11 callbacks suppressed [ 848.721495][T13596] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 848.738548][T13581] CPU: 0 PID: 13581 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 848.751072][T13581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.761125][T13581] Call Trace: [ 848.764418][T13581] dump_stack+0x172/0x1f0 [ 848.768754][T13581] dump_header+0x10b/0x82d [ 848.773168][T13581] ? oom_kill_process+0x94/0x3f0 [ 848.778108][T13581] oom_kill_process.cold+0x10/0x15 [ 848.781328][T13596] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 848.783220][T13581] out_of_memory+0x79a/0x12c0 [ 848.783240][T13581] ? lock_downgrade+0x920/0x920 [ 848.805492][T13581] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 848.811319][T13581] ? oom_killer_disable+0x280/0x280 [ 848.816538][T13581] mem_cgroup_out_of_memory+0x1d8/0x240 [ 848.819128][T13596] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 848.822089][T13581] ? PageTransHuge+0xc0/0xc0 [ 848.822111][T13581] ? do_raw_spin_unlock+0x57/0x270 [ 848.822126][T13581] ? _raw_spin_unlock+0x2d/0x50 [ 848.822143][T13581] try_charge+0xf4b/0x1440 [ 848.848577][T13581] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 848.854111][T13581] ? percpu_ref_tryget_live+0x111/0x290 [ 848.859651][T13581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.865892][T13581] ? __kasan_check_read+0x11/0x20 [ 848.870909][T13581] ? get_mem_cgroup_from_mm+0x156/0x320 [ 848.876446][T13581] mem_cgroup_try_charge+0x136/0x590 [ 848.881806][T13581] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 848.888036][T13581] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 848.893656][T13581] __handle_mm_fault+0x1e0c/0x3ef0 [ 848.898763][T13581] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 848.904308][T13581] ? __kasan_check_read+0x11/0x20 [ 848.909326][T13581] handle_mm_fault+0x1b5/0x6b0 [ 848.914090][T13581] __do_page_fault+0x536/0xdd0 [ 848.918845][T13581] do_page_fault+0x38/0x590 [ 848.923338][T13581] page_fault+0x39/0x40 [ 848.927476][T13581] RIP: 0033:0x4579a1 [ 848.931357][T13581] Code: 48 81 ec 98 00 00 00 0f 05 48 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 00 48 89 e2 89 de bf 01 00 00 00 ba 13 00 00 85 c0 0f 88 98 00 00 00 8b 44 24 18 25 00 f0 00 00 [ 848.950946][T13581] RSP: 002b:00007ffd3e0fbfb0 EFLAGS: 00010206 [ 848.956996][T13581] RAX: 0000000000000003 RBX: 0000000000000003 RCX: 0000000000457980 05:59:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 848.964953][T13581] RDX: 00007ffd3e0fbfb0 RSI: 0000000000000003 RDI: 0000000000000001 [ 848.972906][T13581] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555c1c940 [ 848.980862][T13581] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffd3e0fd190 [ 848.988818][T13581] R13: 00007ffd3e0fd180 R14: 0000000000000000 R15: 00007ffd3e0fd190 [ 849.002046][T13581] memory: usage 704kB, limit 0kB, failcnt 235089 [ 849.008448][T13581] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 849.030157][T13581] Memory cgroup stats for /syz5: [ 849.030265][T13581] anon 65536 [ 849.030265][T13581] file 69632 [ 849.030265][T13581] kernel_stack 65536 [ 849.030265][T13581] slab 794624 [ 849.030265][T13581] sock 0 [ 849.030265][T13581] shmem 0 [ 849.030265][T13581] file_mapped 0 [ 849.030265][T13581] file_dirty 0 [ 849.030265][T13581] file_writeback 0 [ 849.030265][T13581] anon_thp 0 [ 849.030265][T13581] inactive_anon 0 [ 849.030265][T13581] active_anon 65536 [ 849.030265][T13581] inactive_file 0 05:59:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 849.030265][T13581] active_file 61440 [ 849.030265][T13581] unevictable 0 [ 849.030265][T13581] slab_reclaimable 270336 [ 849.030265][T13581] slab_unreclaimable 524288 [ 849.030265][T13581] pgfault 69894 [ 849.030265][T13581] pgmajfault 0 [ 849.030265][T13581] workingset_refault 0 [ 849.030265][T13581] workingset_activate 0 [ 849.030265][T13581] workingset_nodereclaim 0 [ 849.030265][T13581] pgrefill 171 [ 849.030265][T13581] pgscan 183 [ 849.030265][T13581] pgsteal 84 [ 849.030265][T13581] pgactivate 66 05:59:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:50 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x3000000, 0x0) 05:59:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:51 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2000, 0x0) 05:59:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 849.449067][T13625] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 05:59:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 849.530547][T13625] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 849.602885][T13625] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 849.619470][T13581] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13581,uid=0 [ 849.635704][T13581] Memory cgroup out of memory: Killed process 13581 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 05:59:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 849.716362][T13625] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 849.761251][T13625] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 05:59:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 849.850951][T13625] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 05:59:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:51 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2010, 0x0) 05:59:51 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x4000000, 0x0) 05:59:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 850.443428][T13676] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 05:59:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:52 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2300, 0x0) 05:59:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:52 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x5000000, 0x0) 05:59:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:52 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6000000, 0x0) 05:59:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:53 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7000000, 0x0) 05:59:53 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x25fb, 0x0) [ 852.651746][T13765] IPVS: ftp: loaded support on port[0] = 21 [ 852.778288][T13765] chnl_net:caif_netlink_parms(): no params data found [ 852.872975][T13765] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.880192][T13765] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.887767][T13765] device bridge_slave_0 entered promiscuous mode [ 852.896068][T13765] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.903259][T13765] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.912102][T13765] device bridge_slave_1 entered promiscuous mode [ 852.919569][ T7] device bridge_slave_1 left promiscuous mode [ 852.926320][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.981260][ T7] device bridge_slave_0 left promiscuous mode [ 852.987465][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 854.850409][ T7] device hsr_slave_0 left promiscuous mode [ 854.900343][ T7] device hsr_slave_1 left promiscuous mode [ 854.977600][ T7] team0 (unregistering): Port device team_slave_1 removed [ 854.991264][ T7] team0 (unregistering): Port device team_slave_0 removed [ 855.002273][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 855.054087][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 855.158382][ T7] bond0 (unregistering): Released all slaves [ 855.306835][T13765] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 855.317901][T13765] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 855.341156][T13765] team0: Port device team_slave_0 added [ 855.347834][T13765] team0: Port device team_slave_1 added [ 855.411888][T13765] device hsr_slave_0 entered promiscuous mode [ 855.470521][T13765] device hsr_slave_1 entered promiscuous mode [ 855.530141][T13765] debugfs: Directory 'hsr0' with parent '/' already present! [ 855.576063][T13765] 8021q: adding VLAN 0 to HW filter on device bond0 [ 855.589598][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 855.600877][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 855.608504][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 855.654470][T13765] 8021q: adding VLAN 0 to HW filter on device team0 [ 855.666862][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 855.676147][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 855.685102][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 855.692222][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 855.714343][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 855.722981][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 855.738281][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 855.747866][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 855.754973][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 855.770239][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 855.792251][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 855.801100][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 855.809671][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 855.823099][T13765] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 855.835155][T13765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 855.844842][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 855.853517][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 855.878758][T13765] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 856.218579][T13773] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 856.237348][T13773] CPU: 1 PID: 13773 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 856.244925][T13773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.254979][T13773] Call Trace: [ 856.258279][T13773] dump_stack+0x172/0x1f0 [ 856.262618][T13773] dump_header+0x10b/0x82d [ 856.267038][T13773] oom_kill_process.cold+0x10/0x15 [ 856.272149][T13773] out_of_memory+0x79a/0x12c0 [ 856.276827][T13773] ? retint_kernel+0x2b/0x2b [ 856.281435][T13773] ? oom_killer_disable+0x280/0x280 [ 856.286635][T13773] ? mem_cgroup_out_of_memory+0x16a/0x240 [ 856.292356][T13773] mem_cgroup_out_of_memory+0x1d8/0x240 [ 856.297904][T13773] ? PageTransHuge+0xc0/0xc0 [ 856.302496][T13773] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 856.308296][T13773] ? cgroup_file_notify+0x140/0x1b0 [ 856.313497][T13773] memory_max_write+0x262/0x3a0 [ 856.318348][T13773] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 856.325110][T13773] ? cgroup_file_write+0x86/0x790 [ 856.330136][T13773] cgroup_file_write+0x241/0x790 [ 856.335076][T13773] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 856.341840][T13773] ? cgroup_migrate_add_task+0x890/0x890 [ 856.347475][T13773] ? cgroup_migrate_add_task+0x890/0x890 [ 856.353100][T13773] kernfs_fop_write+0x2b8/0x480 [ 856.357948][T13773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 856.364187][T13773] __vfs_write+0x8a/0x110 [ 856.368508][T13773] ? kernfs_fop_open+0xd80/0xd80 [ 856.373446][T13773] vfs_write+0x268/0x5d0 [ 856.377693][T13773] ksys_write+0x14f/0x290 [ 856.382022][T13773] ? __ia32_sys_read+0xb0/0xb0 [ 856.386786][T13773] ? do_syscall_64+0x26/0x760 [ 856.391458][T13773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.397516][T13773] ? do_syscall_64+0x26/0x760 [ 856.402191][T13773] __x64_sys_write+0x73/0xb0 [ 856.406778][T13773] do_syscall_64+0xfa/0x760 [ 856.411285][T13773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.417170][T13773] RIP: 0033:0x459a09 [ 856.421062][T13773] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 856.440656][T13773] RSP: 002b:00007f28b1d9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 856.449063][T13773] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 856.457026][T13773] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 856.464991][T13773] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 856.472955][T13773] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28b1d9b6d4 [ 856.480918][T13773] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 856.504750][T13773] memory: usage 5064kB, limit 0kB, failcnt 235090 [ 856.513595][T13773] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 856.520901][T13773] Memory cgroup stats for /syz5: [ 856.521688][T13773] anon 4263936 [ 856.521688][T13773] file 69632 [ 856.521688][T13773] kernel_stack 65536 [ 856.521688][T13773] slab 794624 [ 856.521688][T13773] sock 0 [ 856.521688][T13773] shmem 0 [ 856.521688][T13773] file_mapped 0 [ 856.521688][T13773] file_dirty 0 [ 856.521688][T13773] file_writeback 0 [ 856.521688][T13773] anon_thp 4194304 [ 856.521688][T13773] inactive_anon 0 [ 856.521688][T13773] active_anon 4263936 [ 856.521688][T13773] inactive_file 0 [ 856.521688][T13773] active_file 61440 [ 856.521688][T13773] unevictable 0 [ 856.521688][T13773] slab_reclaimable 270336 [ 856.521688][T13773] slab_unreclaimable 524288 [ 856.521688][T13773] pgfault 69993 [ 856.521688][T13773] pgmajfault 0 [ 856.521688][T13773] workingset_refault 0 [ 856.521688][T13773] workingset_activate 0 [ 856.521688][T13773] workingset_nodereclaim 0 [ 856.521688][T13773] pgrefill 171 [ 856.521688][T13773] pgscan 183 [ 856.521688][T13773] pgsteal 84 [ 856.521688][T13773] pgactivate 66 [ 856.624034][T13773] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13772,uid=0 [ 856.649003][T13773] Memory cgroup out of memory: Killed process 13772 (syz-executor.5) total-vm:72580kB, anon-rss:4232kB, file-rss:35812kB, shmem-rss:0kB [ 856.675075][ T1065] oom_reaper: reaped process 13772 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 05:59:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:58 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x8000000, 0x0) 05:59:58 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x25ff, 0x0) [ 856.752006][T13765] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 856.848404][T13765] CPU: 0 PID: 13765 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 856.856002][T13765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.866498][T13765] Call Trace: [ 856.869801][T13765] dump_stack+0x172/0x1f0 [ 856.874141][T13765] dump_header+0x10b/0x82d [ 856.878568][T13765] ? oom_kill_process+0x94/0x3f0 [ 856.883689][T13765] oom_kill_process.cold+0x10/0x15 [ 856.888819][T13765] out_of_memory+0x79a/0x12c0 [ 856.893504][T13765] ? lock_downgrade+0x920/0x920 [ 856.898356][T13765] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 856.904159][T13765] ? oom_killer_disable+0x280/0x280 [ 856.909392][T13765] mem_cgroup_out_of_memory+0x1d8/0x240 [ 856.914949][T13765] ? PageTransHuge+0xc0/0xc0 [ 856.919552][T13765] ? do_raw_spin_unlock+0x57/0x270 [ 856.924671][T13765] ? _raw_spin_unlock+0x2d/0x50 [ 856.929532][T13765] try_charge+0xf4b/0x1440 [ 856.933960][T13765] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 856.939515][T13765] ? rcu_read_lock_any_held.part.0+0x50/0x50 05:59:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 856.945500][T13765] ? cache_grow_begin+0x122/0xd20 [ 856.950531][T13765] ? find_held_lock+0x35/0x130 [ 856.955298][T13765] ? cache_grow_begin+0x122/0xd20 [ 856.960335][T13765] __memcg_kmem_charge_memcg+0x71/0xf0 [ 856.965965][T13765] ? memcg_kmem_put_cache+0x50/0x50 [ 856.971171][T13765] ? __kasan_check_read+0x11/0x20 [ 856.976200][T13765] cache_grow_begin+0x627/0xd20 [ 856.981047][T13765] ? write_comp_data+0x61/0x70 [ 856.985810][T13765] ? mempolicy_slab_node+0x139/0x390 [ 856.991100][T13765] fallback_alloc+0x1fd/0x2d0 [ 856.995791][T13765] ____cache_alloc_node+0x1bc/0x1d0 [ 857.000996][T13765] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 857.007247][T13765] kmem_cache_alloc+0x1ef/0x710 [ 857.012102][T13765] ? stack_trace_save+0xac/0xe0 [ 857.016960][T13765] __alloc_file+0x27/0x340 [ 857.021379][T13765] alloc_empty_file+0x72/0x170 [ 857.026165][T13765] path_openat+0xef/0x4630 [ 857.030588][T13765] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 857.036393][T13765] ? kasan_slab_alloc+0xf/0x20 [ 857.041171][T13765] ? kmem_cache_alloc+0x121/0x710 [ 857.046809][T13765] ? getname_flags+0xd6/0x5b0 [ 857.051485][T13765] ? getname+0x1a/0x20 [ 857.055559][T13765] ? do_sys_open+0x2c9/0x5d0 [ 857.060148][T13765] ? __x64_sys_open+0x7e/0xc0 [ 857.064831][T13765] ? do_syscall_64+0xfa/0x760 [ 857.069517][T13765] ? mark_lock+0xc2/0x1220 [ 857.073940][T13765] ? __kasan_check_read+0x11/0x20 [ 857.078980][T13765] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 857.084392][T13765] ? __alloc_fd+0x487/0x620 [ 857.088901][T13765] do_filp_open+0x1a1/0x280 [ 857.093406][T13765] ? may_open_dev+0x100/0x100 [ 857.098081][T13765] ? lock_downgrade+0x920/0x920 [ 857.102929][T13765] ? rwlock_bug.part.0+0x90/0x90 [ 857.107860][T13765] ? __kasan_check_read+0x11/0x20 [ 857.112872][T13765] ? do_raw_spin_unlock+0x57/0x270 [ 857.117978][T13765] ? _raw_spin_unlock+0x2d/0x50 [ 857.122824][T13765] ? __alloc_fd+0x487/0x620 [ 857.127335][T13765] do_sys_open+0x3fe/0x5d0 [ 857.131744][T13765] ? filp_open+0x80/0x80 [ 857.135970][T13765] ? __detach_mounts+0x2a0/0x2a0 [ 857.140901][T13765] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 857.146342][T13765] ? do_syscall_64+0x26/0x760 [ 857.151009][T13765] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 857.157060][T13765] ? do_syscall_64+0x26/0x760 [ 857.161746][T13765] __x64_sys_open+0x7e/0xc0 [ 857.166250][T13765] do_syscall_64+0xfa/0x760 [ 857.170780][T13765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 857.176676][T13765] RIP: 0033:0x457980 [ 857.180581][T13765] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 857.200170][T13765] RSP: 002b:00007ffcde645840 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 857.208592][T13765] RAX: ffffffffffffffda RBX: 00000000000d1073 RCX: 0000000000457980 [ 857.217591][T13765] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffcde646a20 [ 857.225560][T13765] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555557049940 [ 857.233517][T13765] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffcde646a20 [ 857.241475][T13765] R13: 00007ffcde646a10 R14: 0000000000000000 R15: 00007ffcde646a20 [ 857.259215][T13765] memory: usage 668kB, limit 0kB, failcnt 235102 [ 857.265896][T13765] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 857.273005][T13765] Memory cgroup stats for /syz5: [ 857.273107][T13765] anon 61440 [ 857.273107][T13765] file 69632 [ 857.273107][T13765] kernel_stack 65536 [ 857.273107][T13765] slab 794624 [ 857.273107][T13765] sock 0 [ 857.273107][T13765] shmem 0 [ 857.273107][T13765] file_mapped 0 [ 857.273107][T13765] file_dirty 0 [ 857.273107][T13765] file_writeback 0 [ 857.273107][T13765] anon_thp 0 [ 857.273107][T13765] inactive_anon 0 [ 857.273107][T13765] active_anon 61440 [ 857.273107][T13765] inactive_file 0 [ 857.273107][T13765] active_file 61440 [ 857.273107][T13765] unevictable 0 [ 857.273107][T13765] slab_reclaimable 270336 [ 857.273107][T13765] slab_unreclaimable 524288 [ 857.273107][T13765] pgfault 69993 [ 857.273107][T13765] pgmajfault 0 [ 857.273107][T13765] workingset_refault 0 [ 857.273107][T13765] workingset_activate 0 [ 857.273107][T13765] workingset_nodereclaim 0 [ 857.273107][T13765] pgrefill 171 [ 857.273107][T13765] pgscan 183 [ 857.273107][T13765] pgsteal 84 [ 857.273107][T13765] pgactivate 66 [ 857.278327][T13765] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13765,uid=0 [ 857.410218][T13780] __ntfs_error: 20 callbacks suppressed [ 857.410230][T13780] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 857.440129][T13765] Memory cgroup out of memory: Killed process 13765 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 857.469193][T13780] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 857.510840][ T1065] oom_reaper: reaped process 13765 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 857.515114][T13780] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 05:59:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:59 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x9000000, 0x0) 05:59:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 857.950903][T13819] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 858.005957][T13819] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 858.030206][T13819] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 858.140083][T13819] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 858.160094][T13819] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 858.189573][T13819] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 05:59:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 05:59:59 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2804, 0x0) 05:59:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 05:59:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 05:59:59 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xa000000, 0x0) 06:00:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 858.453944][T13844] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:00:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:00:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:00 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x3f00, 0x0) 06:00:00 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x10000000, 0x0) 06:00:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:00 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:00 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x4000, 0x0) 06:00:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:00 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x20000000, 0x0) 06:00:00 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 860.759810][T13922] IPVS: ftp: loaded support on port[0] = 21 [ 860.886273][ T7] device bridge_slave_1 left promiscuous mode [ 860.895909][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.960911][ T7] device bridge_slave_0 left promiscuous mode [ 860.967098][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.760411][ T7] device hsr_slave_0 left promiscuous mode [ 862.810328][ T7] device hsr_slave_1 left promiscuous mode [ 862.887651][ T7] team0 (unregistering): Port device team_slave_1 removed [ 862.902347][ T7] team0 (unregistering): Port device team_slave_0 removed [ 862.914023][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 862.956543][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 863.027556][ T7] bond0 (unregistering): Released all slaves [ 863.148455][T13922] chnl_net:caif_netlink_parms(): no params data found [ 863.174811][T13922] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.182011][T13922] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.189622][T13922] device bridge_slave_0 entered promiscuous mode [ 863.197571][T13922] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.204753][T13922] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.212486][T13922] device bridge_slave_1 entered promiscuous mode [ 863.229820][T13922] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 863.241121][T13922] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 863.264677][T13922] team0: Port device team_slave_0 added [ 863.271538][T13922] team0: Port device team_slave_1 added [ 863.331931][T13922] device hsr_slave_0 entered promiscuous mode [ 863.390509][T13922] device hsr_slave_1 entered promiscuous mode [ 863.440177][T13922] debugfs: Directory 'hsr0' with parent '/' already present! [ 863.522914][T13922] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.530082][T13922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.537478][T13922] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.544598][T13922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.617782][T13922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 863.643527][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 863.658810][T12841] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.667316][T12841] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.683911][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 863.704659][T13922] 8021q: adding VLAN 0 to HW filter on device team0 [ 863.724327][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 863.738895][ T8663] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.746023][ T8663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.777983][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 863.788116][T10802] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.795275][T10802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.825942][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 863.838964][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 863.861977][T13922] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 863.879379][T13922] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 863.900814][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 863.909323][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 863.926510][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 863.954666][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 863.974073][T13922] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 864.213554][T13930] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 864.223830][T13930] CPU: 1 PID: 13930 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 864.231376][T13930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.241439][T13930] Call Trace: [ 864.244740][T13930] dump_stack+0x172/0x1f0 [ 864.249093][T13930] dump_header+0x10b/0x82d [ 864.253528][T13930] oom_kill_process.cold+0x10/0x15 [ 864.258645][T13930] out_of_memory+0x79a/0x12c0 [ 864.263334][T13930] ? __sched_text_start+0x8/0x8 [ 864.268189][T13930] ? oom_killer_disable+0x280/0x280 [ 864.273412][T13930] mem_cgroup_out_of_memory+0x1d8/0x240 [ 864.278985][T13930] ? PageTransHuge+0xc0/0xc0 [ 864.283759][T13930] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 864.289571][T13930] ? cgroup_file_notify+0x140/0x1b0 [ 864.294782][T13930] memory_max_write+0x262/0x3a0 [ 864.299642][T13930] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 864.306414][T13930] ? lock_acquire+0x190/0x410 [ 864.311095][T13930] ? kernfs_fop_write+0x227/0x480 [ 864.316567][T13930] cgroup_file_write+0x241/0x790 [ 864.321511][T13930] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 864.328272][T13930] ? cgroup_migrate_add_task+0x890/0x890 [ 864.333917][T13930] ? cgroup_migrate_add_task+0x890/0x890 [ 864.339553][T13930] kernfs_fop_write+0x2b8/0x480 [ 864.344405][T13930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.350653][T13930] __vfs_write+0x8a/0x110 [ 864.354986][T13930] ? kernfs_fop_open+0xd80/0xd80 [ 864.359930][T13930] vfs_write+0x268/0x5d0 [ 864.364186][T13930] ksys_write+0x14f/0x290 [ 864.368524][T13930] ? __ia32_sys_read+0xb0/0xb0 [ 864.373290][T13930] ? do_syscall_64+0x26/0x760 [ 864.377969][T13930] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 864.384033][T13930] ? do_syscall_64+0x26/0x760 [ 864.388732][T13930] __x64_sys_write+0x73/0xb0 [ 864.393325][T13930] do_syscall_64+0xfa/0x760 [ 864.397833][T13930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 864.403727][T13930] RIP: 0033:0x459a09 [ 864.407624][T13930] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 864.427245][T13930] RSP: 002b:00007f66e0d60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 864.435654][T13930] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 864.443703][T13930] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 864.451923][T13930] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 864.459895][T13930] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66e0d616d4 [ 864.468171][T13930] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 864.480264][T13930] memory: usage 5128kB, limit 0kB, failcnt 235103 [ 864.488211][T13930] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 864.496139][T13930] Memory cgroup stats for /syz5: [ 864.496251][T13930] anon 4329472 [ 864.496251][T13930] file 69632 [ 864.496251][T13930] kernel_stack 65536 [ 864.496251][T13930] slab 794624 [ 864.496251][T13930] sock 0 [ 864.496251][T13930] shmem 0 [ 864.496251][T13930] file_mapped 0 [ 864.496251][T13930] file_dirty 0 [ 864.496251][T13930] file_writeback 0 [ 864.496251][T13930] anon_thp 4194304 [ 864.496251][T13930] inactive_anon 0 [ 864.496251][T13930] active_anon 4329472 [ 864.496251][T13930] inactive_file 0 [ 864.496251][T13930] active_file 61440 [ 864.496251][T13930] unevictable 0 [ 864.496251][T13930] slab_reclaimable 270336 [ 864.496251][T13930] slab_unreclaimable 524288 [ 864.496251][T13930] pgfault 70059 [ 864.496251][T13930] pgmajfault 0 [ 864.496251][T13930] workingset_refault 0 [ 864.496251][T13930] workingset_activate 0 [ 864.496251][T13930] workingset_nodereclaim 0 [ 864.496251][T13930] pgrefill 171 [ 864.496251][T13930] pgscan 183 [ 864.496251][T13930] pgsteal 84 [ 864.496251][T13930] pgactivate 66 [ 864.596321][T13930] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13929,uid=0 [ 864.618274][T13930] Memory cgroup out of memory: Killed process 13929 (syz-executor.5) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 864.638558][ T1065] oom_reaper: reaped process 13929 (syz-executor.5), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB 06:00:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:00:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:06 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x20100000, 0x0) 06:00:06 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x4800, 0x0) [ 864.750769][T13922] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 864.795927][T13922] CPU: 1 PID: 13922 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 864.803517][T13922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.813582][T13922] Call Trace: [ 864.816887][T13922] dump_stack+0x172/0x1f0 [ 864.821243][T13922] dump_header+0x10b/0x82d [ 864.825665][T13922] ? oom_kill_process+0x94/0x3f0 [ 864.830627][T13922] oom_kill_process.cold+0x10/0x15 [ 864.835756][T13922] out_of_memory+0x79a/0x12c0 [ 864.840618][T13922] ? lock_downgrade+0x920/0x920 [ 864.845484][T13922] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 864.851303][T13922] ? oom_killer_disable+0x280/0x280 [ 864.856525][T13922] mem_cgroup_out_of_memory+0x1d8/0x240 [ 864.862084][T13922] ? PageTransHuge+0xc0/0xc0 [ 864.866688][T13922] ? do_raw_spin_unlock+0x57/0x270 [ 864.871806][T13922] ? _raw_spin_unlock+0x2d/0x50 [ 864.876672][T13922] try_charge+0xf4b/0x1440 [ 864.881101][T13922] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 864.886629][T13922] ? percpu_ref_tryget_live+0x111/0x290 [ 864.892421][T13922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.898659][T13922] ? __kasan_check_read+0x11/0x20 [ 864.903674][T13922] ? get_mem_cgroup_from_mm+0x156/0x320 [ 864.909219][T13922] mem_cgroup_try_charge+0x136/0x590 [ 864.914493][T13922] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 864.920724][T13922] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 864.926345][T13922] wp_page_copy+0x41e/0x15e0 [ 864.930925][T13922] ? find_held_lock+0x35/0x130 [ 864.935684][T13922] ? pmd_pfn+0x1d0/0x1d0 [ 864.939914][T13922] ? lock_downgrade+0x920/0x920 [ 864.944753][T13922] ? swp_swapcount+0x540/0x540 [ 864.949503][T13922] ? __kasan_check_read+0x11/0x20 [ 864.954511][T13922] ? do_raw_spin_unlock+0x57/0x270 [ 864.959612][T13922] do_wp_page+0x499/0x14d0 [ 864.964020][T13922] ? finish_mkwrite_fault+0x570/0x570 [ 864.969394][T13922] __handle_mm_fault+0x22c7/0x3ef0 [ 864.974504][T13922] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 864.980049][T13922] ? __kasan_check_read+0x11/0x20 [ 864.985062][T13922] handle_mm_fault+0x1b5/0x6b0 [ 864.989816][T13922] __do_page_fault+0x536/0xdd0 [ 864.994575][T13922] do_page_fault+0x38/0x590 [ 864.999068][T13922] page_fault+0x39/0x40 [ 865.003206][T13922] RIP: 0033:0x430ae6 [ 865.007085][T13922] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 7c 44 64 00 85 c0 0f 84 [ 865.026673][T13922] RSP: 002b:00007ffdc987b960 EFLAGS: 00010206 [ 865.032723][T13922] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 06:00:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 865.040676][T13922] RDX: 00005555566fd930 RSI: 0000555556705970 RDI: 0000000000000003 [ 865.048632][T13922] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555566fc940 [ 865.056597][T13922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 865.064552][T13922] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 06:00:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 865.092588][T13936] __ntfs_error: 20 callbacks suppressed [ 865.092661][T13936] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 865.151969][T13936] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 865.153450][T13922] memory: usage 696kB, limit 0kB, failcnt 235115 [ 865.179607][T13922] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 865.201421][T13936] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 865.268763][T13922] Memory cgroup stats for /syz5: [ 865.268869][T13922] anon 65536 [ 865.268869][T13922] file 69632 [ 865.268869][T13922] kernel_stack 65536 [ 865.268869][T13922] slab 794624 [ 865.268869][T13922] sock 0 [ 865.268869][T13922] shmem 0 [ 865.268869][T13922] file_mapped 0 [ 865.268869][T13922] file_dirty 0 [ 865.268869][T13922] file_writeback 0 [ 865.268869][T13922] anon_thp 0 [ 865.268869][T13922] inactive_anon 0 [ 865.268869][T13922] active_anon 65536 [ 865.268869][T13922] inactive_file 0 06:00:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 865.268869][T13922] active_file 61440 [ 865.268869][T13922] unevictable 0 [ 865.268869][T13922] slab_reclaimable 270336 [ 865.268869][T13922] slab_unreclaimable 524288 [ 865.268869][T13922] pgfault 70059 [ 865.268869][T13922] pgmajfault 0 [ 865.268869][T13922] workingset_refault 0 [ 865.268869][T13922] workingset_activate 0 [ 865.268869][T13922] workingset_nodereclaim 0 [ 865.268869][T13922] pgrefill 171 [ 865.268869][T13922] pgscan 183 [ 865.268869][T13922] pgsteal 84 [ 865.268869][T13922] pgactivate 66 06:00:07 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x23000000, 0x0) [ 865.388588][T13922] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13922,uid=0 [ 865.440289][T13922] Memory cgroup out of memory: Killed process 13922 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 865.458609][T13957] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:00:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 865.513873][ T1065] oom_reaper: reaped process 13922 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 865.514579][T13957] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:00:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 865.628318][T13965] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 865.675338][T13965] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 865.703817][T13957] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 865.780772][T13965] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 865.917439][T13965] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:00:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:00:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:07 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x4c00, 0x0) 06:00:07 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2a040000, 0x0) 06:00:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:08 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x3f000000, 0x0) 06:00:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:00:08 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6800, 0x0) 06:00:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:08 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6c00, 0x0) 06:00:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:08 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x40000000, 0x0) 06:00:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 868.665755][T14077] IPVS: ftp: loaded support on port[0] = 21 [ 868.792109][T14077] chnl_net:caif_netlink_parms(): no params data found [ 868.804710][ T7] device bridge_slave_1 left promiscuous mode [ 868.811114][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.871165][ T7] device bridge_slave_0 left promiscuous mode [ 868.877469][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.740721][ T7] device hsr_slave_0 left promiscuous mode [ 870.800283][ T7] device hsr_slave_1 left promiscuous mode [ 870.857567][ T7] team0 (unregistering): Port device team_slave_1 removed [ 870.873169][ T7] team0 (unregistering): Port device team_slave_0 removed [ 870.886245][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 870.934103][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 871.024417][ T7] bond0 (unregistering): Released all slaves [ 871.140697][T14077] bridge0: port 1(bridge_slave_0) entered blocking state [ 871.149219][T14077] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.157035][T14077] device bridge_slave_0 entered promiscuous mode [ 871.165244][T14077] bridge0: port 2(bridge_slave_1) entered blocking state [ 871.174357][T14077] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.182898][T14077] device bridge_slave_1 entered promiscuous mode [ 871.203680][T14077] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 871.214987][T14077] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 871.235945][T14077] team0: Port device team_slave_0 added [ 871.259373][T14077] team0: Port device team_slave_1 added [ 871.322352][T14077] device hsr_slave_0 entered promiscuous mode [ 871.360586][T14077] device hsr_slave_1 entered promiscuous mode [ 871.420124][T14077] debugfs: Directory 'hsr0' with parent '/' already present! [ 871.482772][T14077] bridge0: port 2(bridge_slave_1) entered blocking state [ 871.489906][T14077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 871.497425][T14077] bridge0: port 1(bridge_slave_0) entered blocking state [ 871.504547][T14077] bridge0: port 1(bridge_slave_0) entered forwarding state [ 871.566931][T14077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 871.582948][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 871.592395][T12841] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.607050][T12841] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.615977][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 871.639569][T14077] 8021q: adding VLAN 0 to HW filter on device team0 [ 871.658723][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 871.674658][T12841] bridge0: port 1(bridge_slave_0) entered blocking state [ 871.681843][T12841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 871.717598][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 871.726636][T12841] bridge0: port 2(bridge_slave_1) entered blocking state [ 871.733856][T12841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 871.770216][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 871.779379][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 871.797955][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 871.808981][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 871.826892][T14077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 871.838019][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 871.866507][T14077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 872.171233][T14085] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 872.182481][T14085] CPU: 1 PID: 14085 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 872.190817][T14085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.201488][T14085] Call Trace: [ 872.205014][T14085] dump_stack+0x172/0x1f0 [ 872.209638][T14085] dump_header+0x10b/0x82d [ 872.214356][T14085] oom_kill_process.cold+0x10/0x15 [ 872.223824][T14085] out_of_memory+0x79a/0x12c0 [ 872.228590][T14085] ? retint_kernel+0x2b/0x2b [ 872.233182][T14085] ? oom_killer_disable+0x280/0x280 [ 872.238390][T14085] mem_cgroup_out_of_memory+0x1d8/0x240 [ 872.243937][T14085] ? PageTransHuge+0xc0/0xc0 [ 872.251060][T14085] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 872.256870][T14085] ? cgroup_file_notify+0x140/0x1b0 [ 872.262076][T14085] memory_max_write+0x262/0x3a0 [ 872.266933][T14085] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 872.273698][T14085] ? lock_acquire+0x20b/0x410 [ 872.278387][T14085] cgroup_file_write+0x241/0x790 [ 872.283330][T14085] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 872.290091][T14085] ? cgroup_migrate_add_task+0x890/0x890 [ 872.295731][T14085] ? cgroup_migrate_add_task+0x890/0x890 [ 872.301363][T14085] kernfs_fop_write+0x2b8/0x480 [ 872.306208][T14085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.312450][T14085] __vfs_write+0x8a/0x110 [ 872.316774][T14085] ? kernfs_fop_open+0xd80/0xd80 [ 872.321717][T14085] vfs_write+0x268/0x5d0 [ 872.326168][T14085] ksys_write+0x14f/0x290 [ 872.330503][T14085] ? __ia32_sys_read+0xb0/0xb0 [ 872.335269][T14085] ? do_syscall_64+0x26/0x760 [ 872.339941][T14085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.346011][T14085] ? do_syscall_64+0x26/0x760 [ 872.350700][T14085] __x64_sys_write+0x73/0xb0 [ 872.355295][T14085] do_syscall_64+0xfa/0x760 [ 872.359803][T14085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.365689][T14085] RIP: 0033:0x459a09 [ 872.369581][T14085] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 872.389186][T14085] RSP: 002b:00007f04725a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 872.397599][T14085] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 872.405565][T14085] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 872.413534][T14085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 872.421506][T14085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f04725a46d4 [ 872.429471][T14085] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 872.441537][T14085] memory: usage 5096kB, limit 0kB, failcnt 235116 [ 872.448268][T14085] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 872.456199][T14085] Memory cgroup stats for /syz5: [ 872.456883][T14085] anon 4313088 [ 872.456883][T14085] file 69632 [ 872.456883][T14085] kernel_stack 65536 [ 872.456883][T14085] slab 794624 [ 872.456883][T14085] sock 0 [ 872.456883][T14085] shmem 0 [ 872.456883][T14085] file_mapped 0 [ 872.456883][T14085] file_dirty 0 [ 872.456883][T14085] file_writeback 0 [ 872.456883][T14085] anon_thp 4194304 [ 872.456883][T14085] inactive_anon 0 [ 872.456883][T14085] active_anon 4313088 [ 872.456883][T14085] inactive_file 0 [ 872.456883][T14085] active_file 61440 [ 872.456883][T14085] unevictable 0 [ 872.456883][T14085] slab_reclaimable 270336 [ 872.456883][T14085] slab_unreclaimable 524288 [ 872.456883][T14085] pgfault 70125 [ 872.456883][T14085] pgmajfault 0 [ 872.456883][T14085] workingset_refault 0 [ 872.456883][T14085] workingset_activate 0 [ 872.456883][T14085] workingset_nodereclaim 0 [ 872.456883][T14085] pgrefill 171 [ 872.456883][T14085] pgscan 183 [ 872.456883][T14085] pgsteal 84 [ 872.456883][T14085] pgactivate 66 [ 872.553645][T14085] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14084,uid=0 [ 872.570589][T14085] Memory cgroup out of memory: Killed process 14084 (syz-executor.5) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 872.589303][ T1065] oom_reaper: reaped process 14084 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 06:00:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:00:14 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x48000000, 0x0) 06:00:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:14 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7104, 0x0) [ 872.939067][T14077] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 872.980278][T14077] CPU: 0 PID: 14077 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 872.987856][T14077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.997912][T14077] Call Trace: [ 873.001207][T14077] dump_stack+0x172/0x1f0 [ 873.005544][T14077] dump_header+0x10b/0x82d [ 873.009962][T14077] ? oom_kill_process+0x94/0x3f0 [ 873.014899][T14077] oom_kill_process.cold+0x10/0x15 [ 873.020012][T14077] out_of_memory+0x79a/0x12c0 [ 873.024692][T14077] ? lock_downgrade+0x920/0x920 06:00:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 873.029544][T14077] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 873.035355][T14077] ? oom_killer_disable+0x280/0x280 [ 873.040567][T14077] mem_cgroup_out_of_memory+0x1d8/0x240 [ 873.046114][T14077] ? PageTransHuge+0xc0/0xc0 [ 873.050720][T14077] ? do_raw_spin_unlock+0x57/0x270 [ 873.055836][T14077] ? _raw_spin_unlock+0x2d/0x50 [ 873.060680][T14077] try_charge+0xf4b/0x1440 [ 873.065091][T14077] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 873.070624][T14077] ? percpu_ref_tryget_live+0x111/0x290 [ 873.076156][T14077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 873.082383][T14077] ? __kasan_check_read+0x11/0x20 [ 873.087398][T14077] ? get_mem_cgroup_from_mm+0x156/0x320 [ 873.092931][T14077] mem_cgroup_try_charge+0x136/0x590 [ 873.098201][T14077] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 873.104432][T14077] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 873.110053][T14077] wp_page_copy+0x41e/0x15e0 [ 873.114628][T14077] ? find_held_lock+0x35/0x130 [ 873.119383][T14077] ? pmd_pfn+0x1d0/0x1d0 [ 873.123621][T14077] ? lock_downgrade+0x920/0x920 [ 873.128463][T14077] ? swp_swapcount+0x540/0x540 [ 873.133214][T14077] ? __kasan_check_read+0x11/0x20 [ 873.138230][T14077] ? do_raw_spin_unlock+0x57/0x270 [ 873.143334][T14077] do_wp_page+0x499/0x14d0 [ 873.147742][T14077] ? finish_mkwrite_fault+0x570/0x570 [ 873.153121][T14077] __handle_mm_fault+0x22c7/0x3ef0 [ 873.158226][T14077] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 873.163784][T14077] ? __kasan_check_read+0x11/0x20 [ 873.168801][T14077] handle_mm_fault+0x1b5/0x6b0 [ 873.173564][T14077] __do_page_fault+0x536/0xdd0 [ 873.178410][T14077] do_page_fault+0x38/0x590 [ 873.182898][T14077] page_fault+0x39/0x40 [ 873.187212][T14077] RIP: 0033:0x430ae6 [ 873.191092][T14077] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 7c 44 64 00 85 c0 0f 84 [ 873.210681][T14077] RSP: 002b:00007ffd5eb5c050 EFLAGS: 00010206 [ 873.216730][T14077] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 873.224688][T14077] RDX: 0000555556b21930 RSI: 0000555556b29970 RDI: 0000000000000003 [ 873.232642][T14077] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556b20940 [ 873.240594][T14077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 873.248550][T14077] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 873.264107][T14077] memory: usage 712kB, limit 0kB, failcnt 235124 [ 873.281483][T14077] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 873.311561][T14091] __ntfs_error: 17 callbacks suppressed [ 873.311572][T14091] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 873.349014][T14077] Memory cgroup stats for /syz5: [ 873.349121][T14077] anon 57344 [ 873.349121][T14077] file 69632 [ 873.349121][T14077] kernel_stack 65536 [ 873.349121][T14077] slab 794624 [ 873.349121][T14077] sock 0 [ 873.349121][T14077] shmem 0 [ 873.349121][T14077] file_mapped 0 [ 873.349121][T14077] file_dirty 0 [ 873.349121][T14077] file_writeback 0 [ 873.349121][T14077] anon_thp 0 [ 873.349121][T14077] inactive_anon 0 [ 873.349121][T14077] active_anon 57344 [ 873.349121][T14077] inactive_file 0 [ 873.349121][T14077] active_file 61440 [ 873.349121][T14077] unevictable 0 [ 873.349121][T14077] slab_reclaimable 270336 [ 873.349121][T14077] slab_unreclaimable 524288 [ 873.349121][T14077] pgfault 70125 [ 873.349121][T14077] pgmajfault 0 [ 873.349121][T14077] workingset_refault 0 [ 873.349121][T14077] workingset_activate 0 [ 873.349121][T14077] workingset_nodereclaim 0 [ 873.349121][T14077] pgrefill 171 [ 873.349121][T14077] pgscan 183 [ 873.349121][T14077] pgsteal 84 [ 873.349121][T14077] pgactivate 66 06:00:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 873.373874][T14091] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 873.460270][T14077] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14077,uid=0 06:00:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 873.494250][T14077] Memory cgroup out of memory: Killed process 14077 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 06:00:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 873.603955][ T1065] oom_reaper: reaped process 14077 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 06:00:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 873.793008][T14091] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 06:00:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:00:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:15 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x4c000000, 0x0) 06:00:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:15 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7204, 0x0) [ 874.377065][T14137] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:00:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) [ 874.430451][T14137] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:00:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 874.485990][T14137] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 06:00:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 874.643903][T14137] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:00:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 874.715293][T14137] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:00:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 874.808182][T14137] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 06:00:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:16 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x68000000, 0x0) 06:00:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:16 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 875.228917][T14183] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:00:17 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7304, 0x0) 06:00:17 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 876.546098][T14215] IPVS: ftp: loaded support on port[0] = 21 [ 876.679287][T14215] chnl_net:caif_netlink_parms(): no params data found [ 876.709022][ T7] device bridge_slave_1 left promiscuous mode [ 876.715684][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.781158][ T7] device bridge_slave_0 left promiscuous mode [ 876.787436][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 878.650389][ T7] device hsr_slave_0 left promiscuous mode [ 878.690183][ T7] device hsr_slave_1 left promiscuous mode [ 878.774659][ T7] team0 (unregistering): Port device team_slave_1 removed [ 878.787750][ T7] team0 (unregistering): Port device team_slave_0 removed [ 878.800829][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 878.868451][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 878.958623][ T7] bond0 (unregistering): Released all slaves [ 879.054551][T14215] bridge0: port 1(bridge_slave_0) entered blocking state [ 879.062851][T14215] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.074033][T14215] device bridge_slave_0 entered promiscuous mode [ 879.082605][T14215] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.089701][T14215] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.098470][T14215] device bridge_slave_1 entered promiscuous mode [ 879.119038][T14215] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 879.131124][T14215] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 879.155269][T14215] team0: Port device team_slave_0 added [ 879.162806][T14215] team0: Port device team_slave_1 added [ 879.232535][T14215] device hsr_slave_0 entered promiscuous mode [ 879.270485][T14215] device hsr_slave_1 entered promiscuous mode [ 879.310208][T14215] debugfs: Directory 'hsr0' with parent '/' already present! [ 879.438147][T14215] 8021q: adding VLAN 0 to HW filter on device bond0 [ 879.467504][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 879.488273][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 879.498456][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 879.516585][T14215] 8021q: adding VLAN 0 to HW filter on device team0 [ 879.535530][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 879.547993][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 879.564386][ T8663] bridge0: port 1(bridge_slave_0) entered blocking state [ 879.572752][ T8663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 879.610651][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 879.619139][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 879.628682][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 879.644893][ T8663] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.652142][ T8663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 879.681566][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 879.691136][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 879.699692][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 879.713078][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 879.724068][T14215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 879.735229][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 879.758940][T14215] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 880.165701][T14223] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 880.189058][T14223] CPU: 0 PID: 14223 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 880.196660][T14223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.206751][T14223] Call Trace: [ 880.210186][T14223] dump_stack+0x172/0x1f0 [ 880.215071][T14223] dump_header+0x10b/0x82d [ 880.219524][T14223] oom_kill_process.cold+0x10/0x15 [ 880.224667][T14223] out_of_memory+0x79a/0x12c0 [ 880.229384][T14223] ? __sched_text_start+0x8/0x8 [ 880.234272][T14223] ? oom_killer_disable+0x280/0x280 [ 880.239516][T14223] mem_cgroup_out_of_memory+0x1d8/0x240 [ 880.245256][T14223] ? PageTransHuge+0xc0/0xc0 [ 880.249903][T14223] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 880.255758][T14223] ? cgroup_file_notify+0x140/0x1b0 [ 880.261138][T14223] memory_max_write+0x262/0x3a0 [ 880.266015][T14223] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 880.272790][T14223] ? lock_acquire+0x190/0x410 [ 880.277602][T14223] ? kernfs_fop_write+0x227/0x480 [ 880.282646][T14223] cgroup_file_write+0x241/0x790 [ 880.287927][T14223] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 880.294696][T14223] ? cgroup_migrate_add_task+0x890/0x890 [ 880.300555][T14223] ? cgroup_migrate_add_task+0x890/0x890 [ 880.306191][T14223] kernfs_fop_write+0x2b8/0x480 [ 880.311217][T14223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 880.317469][T14223] __vfs_write+0x8a/0x110 [ 880.321856][T14223] ? kernfs_fop_open+0xd80/0xd80 [ 880.326806][T14223] vfs_write+0x268/0x5d0 [ 880.331064][T14223] ksys_write+0x14f/0x290 [ 880.335415][T14223] ? __ia32_sys_read+0xb0/0xb0 [ 880.340721][T14223] __x64_sys_write+0x73/0xb0 [ 880.345406][T14223] do_syscall_64+0xfa/0x760 [ 880.350748][T14223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 880.356648][T14223] RIP: 0033:0x459a09 [ 880.360639][T14223] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 880.380707][T14223] RSP: 002b:00007f6ae9029c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 880.389193][T14223] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 880.397866][T14223] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 880.405893][T14223] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 880.414100][T14223] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ae902a6d4 [ 880.422080][T14223] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 880.475739][T14223] memory: usage 5080kB, limit 0kB, failcnt 235125 [ 880.482661][T14223] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 880.489794][T14223] Memory cgroup stats for /syz5: [ 880.490752][T14223] anon 4263936 [ 880.490752][T14223] file 69632 [ 880.490752][T14223] kernel_stack 65536 [ 880.490752][T14223] slab 794624 [ 880.490752][T14223] sock 0 [ 880.490752][T14223] shmem 0 [ 880.490752][T14223] file_mapped 0 [ 880.490752][T14223] file_dirty 0 [ 880.490752][T14223] file_writeback 0 [ 880.490752][T14223] anon_thp 4194304 [ 880.490752][T14223] inactive_anon 0 [ 880.490752][T14223] active_anon 4263936 [ 880.490752][T14223] inactive_file 0 [ 880.490752][T14223] active_file 61440 [ 880.490752][T14223] unevictable 0 [ 880.490752][T14223] slab_reclaimable 270336 [ 880.490752][T14223] slab_unreclaimable 524288 [ 880.490752][T14223] pgfault 70191 [ 880.490752][T14223] pgmajfault 0 [ 880.490752][T14223] workingset_refault 0 [ 880.490752][T14223] workingset_activate 0 [ 880.490752][T14223] workingset_nodereclaim 0 [ 880.490752][T14223] pgrefill 171 [ 880.490752][T14223] pgscan 183 [ 880.490752][T14223] pgsteal 84 [ 880.490752][T14223] pgactivate 66 [ 880.607446][T14223] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14222,uid=0 [ 880.629841][T14223] Memory cgroup out of memory: Killed process 14222 (syz-executor.5) total-vm:72580kB, anon-rss:4232kB, file-rss:35812kB, shmem-rss:0kB [ 880.649030][ T1065] oom_reaper: reaped process 14222 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 06:00:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:00:22 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:22 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6c000000, 0x0) 06:00:22 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:22 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7400, 0x0) [ 880.992807][T14215] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 881.062271][T14215] CPU: 1 PID: 14215 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 881.070691][T14215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.081044][T14215] Call Trace: [ 881.084488][T14215] dump_stack+0x172/0x1f0 [ 881.089086][T14215] dump_header+0x10b/0x82d [ 881.093526][T14215] ? oom_kill_process+0x94/0x3f0 [ 881.099478][T14215] oom_kill_process.cold+0x10/0x15 [ 881.104875][T14215] out_of_memory+0x79a/0x12c0 [ 881.112979][T14215] ? lock_downgrade+0x920/0x920 [ 881.121153][T14215] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 881.129927][T14215] ? oom_killer_disable+0x280/0x280 [ 881.138376][T14215] mem_cgroup_out_of_memory+0x1d8/0x240 [ 881.145701][T14215] ? PageTransHuge+0xc0/0xc0 [ 881.155387][T14215] ? do_raw_spin_unlock+0x57/0x270 [ 881.155403][T14215] ? _raw_spin_unlock+0x2d/0x50 [ 881.155419][T14215] try_charge+0xf4b/0x1440 [ 881.155438][T14215] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 881.155452][T14215] ? percpu_ref_tryget_live+0x111/0x290 [ 881.155469][T14215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 06:00:22 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:22 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 881.155486][T14215] ? __kasan_check_read+0x11/0x20 [ 881.155505][T14215] ? get_mem_cgroup_from_mm+0x156/0x320 [ 881.155522][T14215] mem_cgroup_try_charge+0x136/0x590 [ 881.201448][T14215] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 881.201471][T14215] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 881.201487][T14215] wp_page_copy+0x41e/0x15e0 06:00:22 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 881.201502][T14215] ? find_held_lock+0x35/0x130 [ 881.201520][T14215] ? pmd_pfn+0x1d0/0x1d0 [ 881.201534][T14215] ? lock_downgrade+0x920/0x920 [ 881.201556][T14215] ? swp_swapcount+0x540/0x540 [ 881.201573][T14215] ? __kasan_check_read+0x11/0x20 [ 881.201587][T14215] ? do_raw_spin_unlock+0x57/0x270 [ 881.201603][T14215] do_wp_page+0x499/0x14d0 [ 881.201621][T14215] ? finish_mkwrite_fault+0x570/0x570 [ 881.284793][T14215] __handle_mm_fault+0x22c7/0x3ef0 [ 881.321037][T14215] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 881.329234][T14215] ? __kasan_check_read+0x11/0x20 [ 881.334301][T14215] handle_mm_fault+0x1b5/0x6b0 [ 881.334326][T14215] __do_page_fault+0x536/0xdd0 [ 881.344710][T14215] do_page_fault+0x38/0x590 [ 881.349239][T14215] page_fault+0x39/0x40 [ 881.353416][T14215] RIP: 0033:0x430ae6 06:00:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 881.357328][T14215] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 7c 44 64 00 85 c0 0f 84 [ 881.377210][T14215] RSP: 002b:00007fffddd30610 EFLAGS: 00010206 [ 881.383563][T14215] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 881.391673][T14215] RDX: 00005555559bc930 RSI: 00005555559c4970 RDI: 0000000000000003 [ 881.391681][T14215] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555559bb940 [ 881.391688][T14215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 881.391694][T14215] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 881.430686][T14233] __ntfs_error: 5 callbacks suppressed [ 881.430698][T14233] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:00:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 881.487973][T14215] memory: usage 688kB, limit 0kB, failcnt 235133 [ 881.495705][T14215] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 881.503889][T14233] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 881.509409][T14215] Memory cgroup stats for /syz5: [ 881.509523][T14215] anon 4096 [ 881.509523][T14215] file 69632 [ 881.509523][T14215] kernel_stack 0 [ 881.509523][T14215] slab 794624 [ 881.509523][T14215] sock 0 [ 881.509523][T14215] shmem 0 [ 881.509523][T14215] file_mapped 0 [ 881.509523][T14215] file_dirty 0 [ 881.509523][T14215] file_writeback 0 [ 881.509523][T14215] anon_thp 0 [ 881.509523][T14215] inactive_anon 0 [ 881.509523][T14215] active_anon 4096 [ 881.509523][T14215] inactive_file 0 [ 881.509523][T14215] active_file 61440 [ 881.509523][T14215] unevictable 0 [ 881.509523][T14215] slab_reclaimable 270336 [ 881.509523][T14215] slab_unreclaimable 524288 [ 881.509523][T14215] pgfault 70191 [ 881.509523][T14215] pgmajfault 0 06:00:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 881.509523][T14215] workingset_refault 0 [ 881.509523][T14215] workingset_activate 0 [ 881.509523][T14215] workingset_nodereclaim 0 [ 881.509523][T14215] pgrefill 171 [ 881.509523][T14215] pgscan 183 [ 881.509523][T14215] pgsteal 84 [ 881.509523][T14215] pgactivate 66 [ 881.534819][T14233] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 881.614654][T14215] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14215,uid=0 [ 881.674295][T14215] Memory cgroup out of memory: Killed process 14215 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 881.713353][T14233] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 881.808705][T14233] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 881.841344][ T1065] oom_reaper: reaped process 14215 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 881.870250][T14233] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 06:00:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:00:23 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7404, 0x0) 06:00:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:23 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6e040000, 0x0) 06:00:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:24 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7504, 0x0) 06:00:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:00:24 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6f040000, 0x0) 06:00:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:24 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x70040000, 0x0) 06:00:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:25 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7604, 0x0) [ 884.774922][T14364] IPVS: ftp: loaded support on port[0] = 21 [ 884.814214][ T8694] device bridge_slave_1 left promiscuous mode [ 884.821503][ T8694] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.881232][ T8694] device bridge_slave_0 left promiscuous mode [ 884.887901][ T8694] bridge0: port 1(bridge_slave_0) entered disabled state [ 886.650816][ T8694] device hsr_slave_0 left promiscuous mode [ 886.700300][ T8694] device hsr_slave_1 left promiscuous mode [ 886.748468][ T8694] team0 (unregistering): Port device team_slave_1 removed [ 886.762231][ T8694] team0 (unregistering): Port device team_slave_0 removed [ 886.773662][ T8694] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 886.816939][ T8694] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 886.886876][ T8694] bond0 (unregistering): Released all slaves [ 887.012379][T14364] chnl_net:caif_netlink_parms(): no params data found [ 887.044477][T14364] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.051851][T14364] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.060976][T14364] device bridge_slave_0 entered promiscuous mode [ 887.069020][T14364] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.077258][T14364] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.085295][T14364] device bridge_slave_1 entered promiscuous mode [ 887.103933][T14364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 887.114854][T14364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 887.134015][T14364] team0: Port device team_slave_0 added [ 887.187508][T14364] team0: Port device team_slave_1 added [ 887.272923][T14364] device hsr_slave_0 entered promiscuous mode [ 887.360548][T14364] device hsr_slave_1 entered promiscuous mode [ 887.410178][T14364] debugfs: Directory 'hsr0' with parent '/' already present! [ 887.435748][T14364] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.442877][T14364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 887.450271][T14364] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.457329][T14364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 887.532529][T14364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 887.557474][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 887.573069][ T8655] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.585317][ T8655] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.603131][T14364] 8021q: adding VLAN 0 to HW filter on device team0 [ 887.622860][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 887.637892][ T8655] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.645039][ T8655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 887.678149][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 887.686975][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.694098][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 887.730232][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 887.739376][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 887.756680][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 887.767537][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 887.784723][T14364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 887.801518][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 887.827692][T14364] 8021q: adding VLAN 0 to HW filter on device batadv0 06:00:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:00:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:29 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x71040000, 0x0) 06:00:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:29 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7704, 0x0) 06:00:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x72040000, 0x0) 06:00:30 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7804, 0x0) 06:00:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:00:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x73040000, 0x0) 06:00:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:30 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7904, 0x0) 06:00:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x74000000, 0x0) 06:00:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 889.138684][T14423] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 889.211544][T14423] CPU: 0 PID: 14423 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 889.219154][T14423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.229231][T14423] Call Trace: [ 889.232553][T14423] dump_stack+0x172/0x1f0 [ 889.236918][T14423] dump_header+0x10b/0x82d [ 889.241366][T14423] oom_kill_process.cold+0x10/0x15 [ 889.246510][T14423] out_of_memory+0x79a/0x12c0 [ 889.251229][T14423] ? __sched_text_start+0x8/0x8 [ 889.256106][T14423] ? oom_killer_disable+0x280/0x280 [ 889.261351][T14423] mem_cgroup_out_of_memory+0x1d8/0x240 [ 889.266923][T14423] ? PageTransHuge+0xc0/0xc0 [ 889.271549][T14423] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 889.277378][T14423] ? cgroup_file_notify+0x140/0x1b0 [ 889.282608][T14423] memory_max_write+0x262/0x3a0 [ 889.287489][T14423] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 889.294274][T14423] ? lock_acquire+0x190/0x410 [ 889.298971][T14423] ? kernfs_fop_write+0x227/0x480 [ 889.304028][T14423] cgroup_file_write+0x241/0x790 [ 889.308994][T14423] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 889.315780][T14423] ? cgroup_migrate_add_task+0x890/0x890 [ 889.321456][T14423] ? cgroup_migrate_add_task+0x890/0x890 [ 889.327115][T14423] kernfs_fop_write+0x2b8/0x480 [ 889.331987][T14423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.338258][T14423] __vfs_write+0x8a/0x110 [ 889.342610][T14423] ? kernfs_fop_open+0xd80/0xd80 [ 889.347576][T14423] vfs_write+0x268/0x5d0 [ 889.351853][T14423] ksys_write+0x14f/0x290 [ 889.356208][T14423] ? __ia32_sys_read+0xb0/0xb0 [ 889.360995][T14423] ? do_syscall_64+0x26/0x760 [ 889.365687][T14423] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.371770][T14423] ? do_syscall_64+0x26/0x760 [ 889.376483][T14423] __x64_sys_write+0x73/0xb0 [ 889.381099][T14423] do_syscall_64+0xfa/0x760 [ 889.385628][T14423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.391620][T14423] RIP: 0033:0x459a09 [ 889.395529][T14423] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 889.415148][T14423] RSP: 002b:00007f33d2480c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 889.423581][T14423] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 889.431568][T14423] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 889.439559][T14423] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 889.447554][T14423] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f33d24816d4 [ 889.455546][T14423] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff 06:00:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 889.544709][T14456] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 889.562896][T14456] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 889.578345][T14456] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 889.586713][T14423] memory: usage 5304kB, limit 0kB, failcnt 235134 06:00:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 889.612547][T14423] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 889.661736][T14456] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 889.699727][T14423] Memory cgroup stats for /syz5: [ 889.699833][T14423] anon 4435968 [ 889.699833][T14423] file 69632 [ 889.699833][T14423] kernel_stack 65536 [ 889.699833][T14423] slab 794624 [ 889.699833][T14423] sock 0 [ 889.699833][T14423] shmem 0 [ 889.699833][T14423] file_mapped 0 [ 889.699833][T14423] file_dirty 0 [ 889.699833][T14423] file_writeback 0 [ 889.699833][T14423] anon_thp 4194304 [ 889.699833][T14423] inactive_anon 0 [ 889.699833][T14423] active_anon 4366336 [ 889.699833][T14423] inactive_file 0 [ 889.699833][T14423] active_file 61440 [ 889.699833][T14423] unevictable 0 [ 889.699833][T14423] slab_reclaimable 270336 [ 889.699833][T14423] slab_unreclaimable 524288 [ 889.699833][T14423] pgfault 70422 [ 889.699833][T14423] pgmajfault 0 [ 889.699833][T14423] workingset_refault 0 [ 889.699833][T14423] workingset_activate 0 [ 889.699833][T14423] workingset_nodereclaim 0 [ 889.699833][T14423] pgrefill 171 [ 889.699833][T14423] pgscan 183 [ 889.699833][T14423] pgsteal 84 [ 889.699833][T14423] pgactivate 66 [ 889.820200][T14456] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 889.936292][T14423] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14422,uid=0 [ 889.953077][T14423] Memory cgroup out of memory: Killed process 14423 (syz-executor.5) total-vm:72576kB, anon-rss:4236kB, file-rss:35824kB, shmem-rss:0kB 06:00:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:00:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:31 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7a00, 0x0) 06:00:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 890.014413][ T1065] oom_reaper: reaped process 14423 (syz-executor.5), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB [ 890.024123][T14456] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 06:00:31 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x74040000, 0x0) 06:00:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:00:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:00:32 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7a04, 0x0) 06:00:32 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x75040000, 0x0) 06:00:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:01:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:31 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x76040000, 0x0) 06:01:31 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7b04, 0x0) 06:01:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:32 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7c04, 0x0) 06:01:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:32 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x77040000, 0x0) 06:01:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 952.420779][ T968] device bridge_slave_1 left promiscuous mode [ 952.427099][ T968] bridge0: port 2(bridge_slave_1) entered disabled state [ 952.471271][ T968] device bridge_slave_0 left promiscuous mode [ 952.477532][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 954.290858][ T968] device hsr_slave_0 left promiscuous mode [ 954.360193][ T968] device hsr_slave_1 left promiscuous mode [ 954.427456][ T968] team0 (unregistering): Port device team_slave_1 removed [ 954.441364][ T968] team0 (unregistering): Port device team_slave_0 removed [ 954.452518][ T968] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 954.514011][ T968] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 954.606013][ T968] bond0 (unregistering): Released all slaves [ 954.718623][T14611] IPVS: ftp: loaded support on port[0] = 21 [ 954.798546][T14611] chnl_net:caif_netlink_parms(): no params data found [ 954.831117][T14611] bridge0: port 1(bridge_slave_0) entered blocking state [ 954.838300][T14611] bridge0: port 1(bridge_slave_0) entered disabled state [ 954.846206][T14611] device bridge_slave_0 entered promiscuous mode [ 954.854223][T14611] bridge0: port 2(bridge_slave_1) entered blocking state [ 954.861425][T14611] bridge0: port 2(bridge_slave_1) entered disabled state [ 954.869280][T14611] device bridge_slave_1 entered promiscuous mode [ 954.941519][T14611] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 954.953766][T14611] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 954.975932][T14611] team0: Port device team_slave_0 added [ 954.983316][T14611] team0: Port device team_slave_1 added [ 955.049415][T14611] device hsr_slave_0 entered promiscuous mode [ 955.106579][T14611] device hsr_slave_1 entered promiscuous mode [ 955.180212][T14611] debugfs: Directory 'hsr0' with parent '/' already present! [ 955.206037][T14611] bridge0: port 2(bridge_slave_1) entered blocking state [ 955.213175][T14611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 955.220596][T14611] bridge0: port 1(bridge_slave_0) entered blocking state [ 955.227653][T14611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 955.303544][T14611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 955.325010][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 955.338949][T12841] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.349433][T12841] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.370410][T14611] 8021q: adding VLAN 0 to HW filter on device team0 [ 955.390399][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 955.398833][T12841] bridge0: port 1(bridge_slave_0) entered blocking state [ 955.405947][T12841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 955.437024][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 955.447079][T10802] bridge0: port 2(bridge_slave_1) entered blocking state [ 955.454198][T10802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 955.491331][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 955.507542][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 955.517473][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 955.537826][T14611] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 955.557206][T14611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 955.567197][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 955.582831][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 955.608013][T14611] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 955.941095][T14619] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 955.953443][T14619] CPU: 0 PID: 14619 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 955.961136][T14619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.971201][T14619] Call Trace: [ 955.974511][T14619] dump_stack+0x172/0x1f0 [ 955.978862][T14619] dump_header+0x10b/0x82d [ 955.983300][T14619] oom_kill_process.cold+0x10/0x15 [ 955.988538][T14619] out_of_memory+0x79a/0x12c0 [ 955.993210][T14619] ? __sched_text_start+0x8/0x8 [ 955.998126][T14619] ? oom_killer_disable+0x280/0x280 [ 956.003414][T14619] mem_cgroup_out_of_memory+0x1d8/0x240 [ 956.008951][T14619] ? PageTransHuge+0xc0/0xc0 [ 956.013658][T14619] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 956.019458][T14619] ? cgroup_file_notify+0x140/0x1b0 [ 956.024654][T14619] memory_max_write+0x262/0x3a0 [ 956.029501][T14619] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 956.036276][T14619] ? lock_acquire+0x190/0x410 [ 956.040946][T14619] ? kernfs_fop_write+0x227/0x480 [ 956.045980][T14619] cgroup_file_write+0x241/0x790 [ 956.050914][T14619] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 956.057661][T14619] ? cgroup_migrate_add_task+0x890/0x890 [ 956.063392][T14619] ? cgroup_migrate_add_task+0x890/0x890 [ 956.069014][T14619] kernfs_fop_write+0x2b8/0x480 [ 956.073865][T14619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 956.080103][T14619] __vfs_write+0x8a/0x110 [ 956.084416][T14619] ? kernfs_fop_open+0xd80/0xd80 [ 956.089374][T14619] vfs_write+0x268/0x5d0 [ 956.093613][T14619] ksys_write+0x14f/0x290 [ 956.097939][T14619] ? __ia32_sys_read+0xb0/0xb0 [ 956.102696][T14619] ? do_syscall_64+0x26/0x760 [ 956.107380][T14619] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.113440][T14619] ? do_syscall_64+0x26/0x760 [ 956.118108][T14619] __x64_sys_write+0x73/0xb0 [ 956.122687][T14619] do_syscall_64+0xfa/0x760 [ 956.127197][T14619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.133101][T14619] RIP: 0033:0x459a09 [ 956.136992][T14619] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 956.156603][T14619] RSP: 002b:00007fc3d1046c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 956.165017][T14619] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 956.173160][T14619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 956.181121][T14619] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 956.189122][T14619] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3d10476d4 [ 956.197104][T14619] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 956.235341][T14619] memory: usage 5248kB, limit 0kB, failcnt 468993 [ 956.242557][T14619] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 956.249447][T14619] Memory cgroup stats for /syz5: [ 956.251314][T14619] anon 4259840 [ 956.251314][T14619] file 69632 [ 956.251314][T14619] kernel_stack 65536 [ 956.251314][T14619] slab 790528 [ 956.251314][T14619] sock 0 [ 956.251314][T14619] shmem 0 [ 956.251314][T14619] file_mapped 0 [ 956.251314][T14619] file_dirty 0 [ 956.251314][T14619] file_writeback 0 [ 956.251314][T14619] anon_thp 4194304 [ 956.251314][T14619] inactive_anon 0 [ 956.251314][T14619] active_anon 4259840 [ 956.251314][T14619] inactive_file 0 [ 956.251314][T14619] active_file 61440 [ 956.251314][T14619] unevictable 0 [ 956.251314][T14619] slab_reclaimable 270336 [ 956.251314][T14619] slab_unreclaimable 520192 [ 956.251314][T14619] pgfault 70521 [ 956.251314][T14619] pgmajfault 0 [ 956.251314][T14619] workingset_refault 0 [ 956.251314][T14619] workingset_activate 0 [ 956.251314][T14619] workingset_nodereclaim 0 [ 956.251314][T14619] pgrefill 171 [ 956.251314][T14619] pgscan 183 [ 956.251314][T14619] pgsteal 84 [ 956.251314][T14619] pgactivate 66 [ 956.348161][T14619] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14618,uid=0 [ 956.365420][T14619] Memory cgroup out of memory: Killed process 14618 (syz-executor.5) total-vm:72580kB, anon-rss:4228kB, file-rss:35816kB, shmem-rss:0kB [ 956.382973][ T1065] oom_reaper: reaped process 14618 (syz-executor.5), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB 06:01:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:01:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x78040000, 0x0) 06:01:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:38 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xedc0, 0x0) [ 956.483890][T14611] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 956.550379][T14611] CPU: 0 PID: 14611 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 956.557998][T14611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.568059][T14611] Call Trace: [ 956.571366][T14611] dump_stack+0x172/0x1f0 [ 956.575773][T14611] dump_header+0x10b/0x82d [ 956.580173][T14611] ? oom_kill_process+0x94/0x3f0 [ 956.585098][T14611] oom_kill_process.cold+0x10/0x15 [ 956.590195][T14611] out_of_memory+0x79a/0x12c0 [ 956.594859][T14611] ? lock_downgrade+0x920/0x920 [ 956.599695][T14611] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 956.605490][T14611] ? oom_killer_disable+0x280/0x280 [ 956.610686][T14611] mem_cgroup_out_of_memory+0x1d8/0x240 [ 956.616219][T14611] ? PageTransHuge+0xc0/0xc0 [ 956.620816][T14611] ? do_raw_spin_unlock+0x57/0x270 [ 956.625920][T14611] ? _raw_spin_unlock+0x2d/0x50 [ 956.630763][T14611] try_charge+0xf4b/0x1440 [ 956.635172][T14611] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 956.640700][T14611] ? percpu_ref_tryget_live+0x111/0x290 [ 956.646247][T14611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 956.652477][T14611] ? __kasan_check_read+0x11/0x20 [ 956.657496][T14611] ? get_mem_cgroup_from_mm+0x156/0x320 [ 956.663042][T14611] mem_cgroup_try_charge+0x136/0x590 [ 956.668309][T14611] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 956.674656][T14611] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 956.680645][T14611] wp_page_copy+0x41e/0x15e0 [ 956.685236][T14611] ? find_held_lock+0x35/0x130 [ 956.690000][T14611] ? pmd_pfn+0x1d0/0x1d0 [ 956.694237][T14611] ? lock_downgrade+0x920/0x920 [ 956.699078][T14611] ? swp_swapcount+0x540/0x540 [ 956.703853][T14611] ? __kasan_check_read+0x11/0x20 [ 956.708866][T14611] ? do_raw_spin_unlock+0x57/0x270 [ 956.713971][T14611] do_wp_page+0x499/0x14d0 [ 956.718376][T14611] ? finish_mkwrite_fault+0x570/0x570 [ 956.723757][T14611] __handle_mm_fault+0x22c7/0x3ef0 [ 956.728862][T14611] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 956.734656][T14611] ? __kasan_check_read+0x11/0x20 [ 956.739673][T14611] handle_mm_fault+0x1b5/0x6b0 [ 956.744430][T14611] __do_page_fault+0x536/0xdd0 [ 956.749200][T14611] do_page_fault+0x38/0x590 [ 956.753700][T14611] page_fault+0x39/0x40 [ 956.757848][T14611] RIP: 0033:0x430ae6 [ 956.761730][T14611] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 7c 44 64 00 85 c0 0f 84 [ 956.781580][T14611] RSP: 002b:00007ffe175e9120 EFLAGS: 00010206 [ 956.788249][T14611] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 956.796204][T14611] RDX: 0000555556b65930 RSI: 0000555556b6d970 RDI: 0000000000000003 [ 956.804176][T14611] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556b64940 [ 956.812133][T14611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 956.820089][T14611] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 06:01:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x79040000, 0x0) 06:01:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:38 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xfb25, 0x0) 06:01:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 957.290347][T14611] memory: usage 864kB, limit 0kB, failcnt 469001 [ 957.315819][T14611] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 957.337955][T14611] Memory cgroup stats for /syz5: [ 957.338068][T14611] anon 57344 [ 957.338068][T14611] file 69632 [ 957.338068][T14611] kernel_stack 65536 [ 957.338068][T14611] slab 790528 [ 957.338068][T14611] sock 0 [ 957.338068][T14611] shmem 0 [ 957.338068][T14611] file_mapped 0 [ 957.338068][T14611] file_dirty 0 [ 957.338068][T14611] file_writeback 0 [ 957.338068][T14611] anon_thp 0 [ 957.338068][T14611] inactive_anon 0 [ 957.338068][T14611] active_anon 57344 [ 957.338068][T14611] inactive_file 0 [ 957.338068][T14611] active_file 61440 [ 957.338068][T14611] unevictable 0 [ 957.338068][T14611] slab_reclaimable 270336 [ 957.338068][T14611] slab_unreclaimable 520192 [ 957.338068][T14611] pgfault 70521 [ 957.338068][T14611] pgmajfault 0 [ 957.338068][T14611] workingset_refault 0 [ 957.338068][T14611] workingset_activate 0 [ 957.338068][T14611] workingset_nodereclaim 0 [ 957.338068][T14611] pgrefill 171 [ 957.338068][T14611] pgscan 183 [ 957.338068][T14611] pgsteal 84 [ 957.338068][T14611] pgactivate 66 [ 957.351035][T14611] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14611,uid=0 [ 957.487485][T14611] Memory cgroup out of memory: Killed process 14611 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 957.508913][ T1065] oom_reaper: reaped process 14611 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 06:01:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:01:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:39 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7a000000, 0x0) 06:01:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:39 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xff00, 0x0) [ 958.052444][T14687] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:01:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 958.095435][T14687] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 958.127589][T14687] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 06:01:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:01:39 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xff0f, 0x0) [ 958.279069][T14687] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:01:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 958.350124][T14687] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 958.380186][T14687] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 06:01:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7a040000, 0x0) 06:01:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7b040000, 0x0) 06:01:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 960.531310][T16999] device bridge_slave_1 left promiscuous mode [ 960.537538][T16999] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.591507][T16999] device bridge_slave_0 left promiscuous mode [ 960.597745][T16999] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.380767][T16999] device hsr_slave_0 left promiscuous mode [ 962.420275][T16999] device hsr_slave_1 left promiscuous mode [ 962.470150][T16999] team0 (unregistering): Port device team_slave_1 removed [ 962.481779][T16999] team0 (unregistering): Port device team_slave_0 removed [ 962.493607][T16999] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 962.526547][T16999] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 962.594600][T16999] bond0 (unregistering): Released all slaves [ 962.719225][T14778] IPVS: ftp: loaded support on port[0] = 21 [ 962.785561][T14778] chnl_net:caif_netlink_parms(): no params data found [ 962.824081][T14778] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.831739][T14778] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.839389][T14778] device bridge_slave_0 entered promiscuous mode [ 962.847695][T14778] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.855259][T14778] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.863296][T14778] device bridge_slave_1 entered promiscuous mode [ 962.883682][T14778] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 962.895491][T14778] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 962.967559][T14778] team0: Port device team_slave_0 added [ 962.975041][T14778] team0: Port device team_slave_1 added [ 963.043004][T14778] device hsr_slave_0 entered promiscuous mode [ 963.080484][T14778] device hsr_slave_1 entered promiscuous mode [ 963.141031][T14778] debugfs: Directory 'hsr0' with parent '/' already present! [ 963.178334][T14778] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.185481][T14778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.192930][T14778] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.200033][T14778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.277237][T14778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 963.299403][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 963.309181][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.324512][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 963.342036][T14778] 8021q: adding VLAN 0 to HW filter on device team0 [ 963.354341][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 963.363474][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.370587][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.393228][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 963.402783][T12739] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.409842][T12739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.422417][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 963.443515][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 963.461023][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 963.481011][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 963.493856][T14778] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 963.512408][T14778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 963.526313][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 963.559468][T14778] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 963.785259][T14786] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 963.800686][T14786] CPU: 1 PID: 14786 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 963.808250][T14786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.818306][T14786] Call Trace: [ 963.821602][T14786] dump_stack+0x172/0x1f0 [ 963.825932][T14786] dump_header+0x10b/0x82d [ 963.832267][T14786] oom_kill_process.cold+0x10/0x15 [ 963.837365][T14786] out_of_memory+0x79a/0x12c0 [ 963.842033][T14786] ? __sched_text_start+0x8/0x8 [ 963.846869][T14786] ? oom_killer_disable+0x280/0x280 [ 963.852063][T14786] mem_cgroup_out_of_memory+0x1d8/0x240 [ 963.857601][T14786] ? PageTransHuge+0xc0/0xc0 [ 963.862177][T14786] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 963.867969][T14786] ? cgroup_file_notify+0x140/0x1b0 [ 963.873152][T14786] memory_max_write+0x262/0x3a0 [ 963.877988][T14786] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 963.884734][T14786] ? lock_acquire+0x190/0x410 [ 963.889481][T14786] ? kernfs_fop_write+0x227/0x480 [ 963.894493][T14786] cgroup_file_write+0x241/0x790 [ 963.899414][T14786] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 963.906157][T14786] ? cgroup_migrate_add_task+0x890/0x890 [ 963.911777][T14786] ? cgroup_migrate_add_task+0x890/0x890 [ 963.917388][T14786] kernfs_fop_write+0x2b8/0x480 [ 963.922235][T14786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 963.928462][T14786] __vfs_write+0x8a/0x110 [ 963.932772][T14786] ? kernfs_fop_open+0xd80/0xd80 [ 963.937691][T14786] vfs_write+0x268/0x5d0 [ 963.941919][T14786] ksys_write+0x14f/0x290 [ 963.946234][T14786] ? __ia32_sys_read+0xb0/0xb0 [ 963.950986][T14786] ? do_syscall_64+0x26/0x760 [ 963.955648][T14786] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.961705][T14786] ? do_syscall_64+0x26/0x760 [ 963.966369][T14786] __x64_sys_write+0x73/0xb0 [ 963.971030][T14786] do_syscall_64+0xfa/0x760 [ 963.975579][T14786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.981494][T14786] RIP: 0033:0x459a09 [ 963.985375][T14786] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.004965][T14786] RSP: 002b:00007ff4c58b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 964.013358][T14786] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 964.021311][T14786] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 964.029263][T14786] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 964.037216][T14786] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff4c58b16d4 [ 964.045176][T14786] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 964.058704][T14786] memory: usage 5228kB, limit 0kB, failcnt 469002 [ 964.065233][T14786] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 964.072628][T14786] Memory cgroup stats for /syz5: [ 964.072764][T14786] anon 4296704 [ 964.072764][T14786] file 69632 [ 964.072764][T14786] kernel_stack 65536 [ 964.072764][T14786] slab 790528 [ 964.072764][T14786] sock 0 [ 964.072764][T14786] shmem 0 [ 964.072764][T14786] file_mapped 0 [ 964.072764][T14786] file_dirty 0 [ 964.072764][T14786] file_writeback 0 [ 964.072764][T14786] anon_thp 4194304 [ 964.072764][T14786] inactive_anon 0 [ 964.072764][T14786] active_anon 4296704 [ 964.072764][T14786] inactive_file 0 [ 964.072764][T14786] active_file 61440 [ 964.072764][T14786] unevictable 0 [ 964.072764][T14786] slab_reclaimable 270336 [ 964.072764][T14786] slab_unreclaimable 520192 [ 964.072764][T14786] pgfault 70587 [ 964.072764][T14786] pgmajfault 0 [ 964.072764][T14786] workingset_refault 0 [ 964.072764][T14786] workingset_activate 0 [ 964.072764][T14786] workingset_nodereclaim 0 [ 964.072764][T14786] pgrefill 171 [ 964.072764][T14786] pgscan 183 [ 964.072764][T14786] pgsteal 84 [ 964.072764][T14786] pgactivate 66 [ 964.175804][T14786] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14785,uid=0 [ 964.193753][T14786] Memory cgroup out of memory: Killed process 14785 (syz-executor.5) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 964.210239][ T1065] oom_reaper: reaped process 14785 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 06:01:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:01:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x8cffffff, 0x0) 06:01:45 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xff25, 0x0) [ 964.303144][T14778] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 964.345573][T14778] CPU: 0 PID: 14778 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 964.353150][T14778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.363209][T14778] Call Trace: [ 964.366507][T14778] dump_stack+0x172/0x1f0 [ 964.370843][T14778] dump_header+0x10b/0x82d [ 964.375252][T14778] ? oom_kill_process+0x94/0x3f0 [ 964.380188][T14778] oom_kill_process.cold+0x10/0x15 [ 964.385298][T14778] out_of_memory+0x79a/0x12c0 [ 964.389972][T14778] ? lock_downgrade+0x920/0x920 [ 964.394815][T14778] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 964.401052][T14778] ? oom_killer_disable+0x280/0x280 [ 964.406263][T14778] mem_cgroup_out_of_memory+0x1d8/0x240 [ 964.411817][T14778] ? PageTransHuge+0xc0/0xc0 [ 964.416677][T14778] ? do_raw_spin_unlock+0x57/0x270 [ 964.421785][T14778] ? _raw_spin_unlock+0x2d/0x50 [ 964.426634][T14778] try_charge+0xf4b/0x1440 [ 964.431058][T14778] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 964.436610][T14778] ? percpu_ref_tryget_live+0x111/0x290 [ 964.442155][T14778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 964.448443][T14778] ? __kasan_check_read+0x11/0x20 [ 964.448465][T14778] ? get_mem_cgroup_from_mm+0x156/0x320 [ 964.448483][T14778] mem_cgroup_try_charge+0x136/0x590 [ 964.448497][T14778] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 964.448516][T14778] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 964.459103][T14778] wp_page_copy+0x41e/0x15e0 [ 964.459120][T14778] ? find_held_lock+0x35/0x130 [ 964.459139][T14778] ? pmd_pfn+0x1d0/0x1d0 [ 964.459159][T14778] ? lock_downgrade+0x920/0x920 06:01:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 964.495236][T14778] ? swp_swapcount+0x540/0x540 [ 964.500009][T14778] ? __kasan_check_read+0x11/0x20 [ 964.505154][T14778] ? do_raw_spin_unlock+0x57/0x270 [ 964.510278][T14778] do_wp_page+0x499/0x14d0 [ 964.514700][T14778] ? finish_mkwrite_fault+0x570/0x570 [ 964.520072][T14778] __handle_mm_fault+0x22c7/0x3ef0 [ 964.525175][T14778] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 964.530711][T14778] ? __kasan_check_read+0x11/0x20 [ 964.535722][T14778] handle_mm_fault+0x1b5/0x6b0 [ 964.540472][T14778] __do_page_fault+0x536/0xdd0 [ 964.545221][T14778] do_page_fault+0x38/0x590 [ 964.549705][T14778] page_fault+0x39/0x40 [ 964.553881][T14778] RIP: 0033:0x430ae6 [ 964.557769][T14778] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 7c 44 64 00 85 c0 0f 84 [ 964.577509][T14778] RSP: 002b:00007ffd968d7660 EFLAGS: 00010206 [ 964.583558][T14778] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 964.591510][T14778] RDX: 0000555556b5e930 RSI: 0000555556b66970 RDI: 0000000000000003 [ 964.599459][T14778] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556b5d940 [ 964.607421][T14778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 964.615394][T14778] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 964.625920][T14778] memory: usage 844kB, limit 0kB, failcnt 469010 [ 964.632469][T14778] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 964.639875][T14778] Memory cgroup stats for /syz5: [ 964.640103][T14778] anon 57344 [ 964.640103][T14778] file 69632 [ 964.640103][T14778] kernel_stack 0 [ 964.640103][T14778] slab 790528 [ 964.640103][T14778] sock 0 [ 964.640103][T14778] shmem 0 [ 964.640103][T14778] file_mapped 0 [ 964.640103][T14778] file_dirty 0 [ 964.640103][T14778] file_writeback 0 [ 964.640103][T14778] anon_thp 0 [ 964.640103][T14778] inactive_anon 0 [ 964.640103][T14778] active_anon 57344 [ 964.640103][T14778] inactive_file 0 [ 964.640103][T14778] active_file 61440 [ 964.640103][T14778] unevictable 0 [ 964.640103][T14778] slab_reclaimable 270336 [ 964.640103][T14778] slab_unreclaimable 520192 [ 964.640103][T14778] pgfault 70587 [ 964.640103][T14778] pgmajfault 0 [ 964.640103][T14778] workingset_refault 0 [ 964.640103][T14778] workingset_activate 0 [ 964.640103][T14778] workingset_nodereclaim 0 [ 964.640103][T14778] pgrefill 171 [ 964.640103][T14778] pgscan 183 [ 964.640103][T14778] pgsteal 84 [ 964.640103][T14778] pgactivate 66 06:01:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 964.735414][T14778] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14778,uid=0 [ 964.750980][T14778] Memory cgroup out of memory: Killed process 14778 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 964.765627][ T1065] oom_reaper: reaped process 14778 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 06:01:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:46 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xc0ed0000, 0x0) 06:01:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 965.165560][T14826] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 965.212578][T14826] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 965.294228][T14826] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 965.469877][T14826] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 965.486922][T14826] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:01:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:01:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:47 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xa0000, 0x0) [ 965.525617][T14826] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 06:01:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:47 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xf5ffffff, 0x0) 06:01:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:01:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:47 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xe0000, 0x0) 06:01:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:47 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xf6ffffff, 0x0) 06:01:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 967.811617][T14928] IPVS: ftp: loaded support on port[0] = 21 [ 968.001951][T14928] chnl_net:caif_netlink_parms(): no params data found [ 968.029120][T14928] bridge0: port 1(bridge_slave_0) entered blocking state [ 968.036443][T14928] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.045072][T14928] device bridge_slave_0 entered promiscuous mode [ 968.053125][T14928] bridge0: port 2(bridge_slave_1) entered blocking state [ 968.060371][T14928] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.068277][T14928] device bridge_slave_1 entered promiscuous mode [ 968.075816][T16999] device bridge_slave_1 left promiscuous mode [ 968.082213][T16999] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.150882][T16999] device bridge_slave_0 left promiscuous mode [ 968.157085][T16999] bridge0: port 1(bridge_slave_0) entered disabled state [ 970.040761][T16999] device hsr_slave_0 left promiscuous mode [ 970.080342][T16999] device hsr_slave_1 left promiscuous mode [ 970.150398][T16999] team0 (unregistering): Port device team_slave_1 removed [ 970.161934][T16999] team0 (unregistering): Port device team_slave_0 removed [ 970.173056][T16999] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 970.236789][T16999] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 970.326696][T16999] bond0 (unregistering): Released all slaves [ 970.435246][T14928] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 970.447482][T14928] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 970.466902][T14928] team0: Port device team_slave_0 added [ 970.474334][T14928] team0: Port device team_slave_1 added [ 970.533057][T14928] device hsr_slave_0 entered promiscuous mode [ 970.571353][T14928] device hsr_slave_1 entered promiscuous mode [ 970.640145][T14928] debugfs: Directory 'hsr0' with parent '/' already present! [ 970.685863][T14928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 970.698389][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 970.708254][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 970.716282][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 970.781895][T14928] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.799413][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 970.809310][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 970.824551][T12841] bridge0: port 1(bridge_slave_0) entered blocking state [ 970.831666][T12841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 970.869756][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 970.878252][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 970.894964][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 970.908039][ T8663] bridge0: port 2(bridge_slave_1) entered blocking state [ 970.915162][ T8663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 970.931565][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 970.946314][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 970.956583][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 970.979639][T14928] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 970.997446][T14928] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 971.011691][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 971.019598][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 971.036175][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 971.048782][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 971.074881][T14928] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 971.453583][T14936] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 971.464153][T14936] CPU: 1 PID: 14936 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 971.471707][T14936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 971.481768][T14936] Call Trace: [ 971.485069][T14936] dump_stack+0x172/0x1f0 [ 971.489410][T14936] dump_header+0x10b/0x82d [ 971.493848][T14936] oom_kill_process.cold+0x10/0x15 [ 971.499832][T14936] out_of_memory+0x79a/0x12c0 [ 971.504516][T14936] ? retint_kernel+0x2b/0x2b [ 971.509111][T14936] ? oom_killer_disable+0x280/0x280 [ 971.514333][T14936] mem_cgroup_out_of_memory+0x1d8/0x240 [ 971.519884][T14936] ? PageTransHuge+0xc0/0xc0 [ 971.524482][T14936] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 971.530287][T14936] ? cgroup_file_notify+0x140/0x1b0 [ 971.535493][T14936] memory_max_write+0x262/0x3a0 [ 971.540351][T14936] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 971.547122][T14936] ? lock_acquire+0x190/0x410 [ 971.551808][T14936] ? kernfs_fop_write+0x227/0x480 [ 971.556850][T14936] cgroup_file_write+0x241/0x790 [ 971.561797][T14936] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 971.568557][T14936] ? cgroup_migrate_add_task+0x890/0x890 [ 971.574205][T14936] ? cgroup_migrate_add_task+0x890/0x890 [ 971.579837][T14936] kernfs_fop_write+0x2b8/0x480 [ 971.584690][T14936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.590940][T14936] __vfs_write+0x8a/0x110 [ 971.595879][T14936] ? kernfs_fop_open+0xd80/0xd80 [ 971.600820][T14936] vfs_write+0x268/0x5d0 [ 971.605068][T14936] ksys_write+0x14f/0x290 [ 971.609494][T14936] ? __ia32_sys_read+0xb0/0xb0 [ 971.614258][T14936] ? do_syscall_64+0x26/0x760 [ 971.619048][T14936] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.625121][T14936] ? do_syscall_64+0x26/0x760 [ 971.629812][T14936] __x64_sys_write+0x73/0xb0 [ 971.634420][T14936] do_syscall_64+0xfa/0x760 [ 971.638932][T14936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.644822][T14936] RIP: 0033:0x459a09 [ 971.648723][T14936] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 971.668331][T14936] RSP: 002b:00007f325d32bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 971.676859][T14936] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 971.684835][T14936] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 971.692810][T14936] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 971.700781][T14936] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f325d32c6d4 [ 971.708749][T14936] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 971.720756][T14936] memory: usage 5256kB, limit 0kB, failcnt 469011 [ 971.727344][T14936] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 971.734804][T14936] Memory cgroup stats for /syz5: [ 971.735460][T14936] anon 4276224 [ 971.735460][T14936] file 69632 [ 971.735460][T14936] kernel_stack 65536 [ 971.735460][T14936] slab 790528 [ 971.735460][T14936] sock 0 [ 971.735460][T14936] shmem 0 [ 971.735460][T14936] file_mapped 0 [ 971.735460][T14936] file_dirty 0 [ 971.735460][T14936] file_writeback 0 [ 971.735460][T14936] anon_thp 4194304 [ 971.735460][T14936] inactive_anon 0 [ 971.735460][T14936] active_anon 4276224 [ 971.735460][T14936] inactive_file 0 [ 971.735460][T14936] active_file 61440 [ 971.735460][T14936] unevictable 0 [ 971.735460][T14936] slab_reclaimable 270336 [ 971.735460][T14936] slab_unreclaimable 520192 [ 971.735460][T14936] pgfault 70620 [ 971.735460][T14936] pgmajfault 0 [ 971.735460][T14936] workingset_refault 0 [ 971.735460][T14936] workingset_activate 0 [ 971.735460][T14936] workingset_nodereclaim 0 [ 971.735460][T14936] pgrefill 171 [ 971.735460][T14936] pgscan 183 [ 971.735460][T14936] pgsteal 84 [ 971.735460][T14936] pgactivate 66 [ 971.831870][T14936] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14935,uid=0 [ 971.849835][T14936] Memory cgroup out of memory: Killed process 14935 (syz-executor.5) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 971.867556][ T1065] oom_reaper: reaped process 14935 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 06:01:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:01:53 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xf9fdffff, 0x0) 06:01:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:53 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x1000000, 0x0) [ 972.282766][T14928] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 972.335930][T14928] CPU: 0 PID: 14928 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 972.343531][T14928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.353587][T14928] Call Trace: [ 972.356885][T14928] dump_stack+0x172/0x1f0 [ 972.361229][T14928] dump_header+0x10b/0x82d [ 972.365651][T14928] ? oom_kill_process+0x94/0x3f0 [ 972.370604][T14928] oom_kill_process.cold+0x10/0x15 [ 972.375725][T14928] out_of_memory+0x79a/0x12c0 [ 972.380407][T14928] ? lock_downgrade+0x920/0x920 [ 972.385258][T14928] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 972.391068][T14928] ? oom_killer_disable+0x280/0x280 [ 972.396280][T14928] mem_cgroup_out_of_memory+0x1d8/0x240 [ 972.401914][T14928] ? PageTransHuge+0xc0/0xc0 [ 972.406515][T14928] ? do_raw_spin_unlock+0x57/0x270 [ 972.411630][T14928] ? _raw_spin_unlock+0x2d/0x50 [ 972.416485][T14928] try_charge+0xf4b/0x1440 [ 972.420916][T14928] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 972.426464][T14928] ? percpu_ref_tryget_live+0x111/0x290 06:01:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 972.432021][T14928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.438266][T14928] ? __kasan_check_read+0x11/0x20 [ 972.443305][T14928] ? get_mem_cgroup_from_mm+0x156/0x320 [ 972.448853][T14928] mem_cgroup_try_charge+0x136/0x590 [ 972.454142][T14928] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 972.460392][T14928] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 972.466038][T14928] __handle_mm_fault+0x1e0c/0x3ef0 [ 972.471161][T14928] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 972.476729][T14928] ? __kasan_check_read+0x11/0x20 [ 972.481765][T14928] handle_mm_fault+0x1b5/0x6b0 [ 972.486539][T14928] __do_page_fault+0x536/0xdd0 [ 972.491617][T14928] do_page_fault+0x38/0x590 [ 972.496130][T14928] page_fault+0x39/0x40 [ 972.500287][T14928] RIP: 0033:0x4579a1 [ 972.504187][T14928] Code: 48 81 ec 98 00 00 00 0f 05 48 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 00 48 89 e2 89 de bf 01 00 00 00 ba 13 00 00 85 c0 0f 88 98 00 00 00 8b 44 24 18 25 00 f0 00 00 [ 972.523795][T14928] RSP: 002b:00007fffab3b8fd0 EFLAGS: 00010206 [ 972.529861][T14928] RAX: 0000000000000003 RBX: 0000000000000003 RCX: 0000000000457980 [ 972.537836][T14928] RDX: 00007fffab3b8fd0 RSI: 0000000000000003 RDI: 0000000000000001 [ 972.545808][T14928] RBP: 0000000000000002 R08: 0000000000000001 R09: 000055555680d940 [ 972.553778][T14928] R10: 0000000000000000 R11: 0000000000000202 R12: 00007fffab3ba1b0 [ 972.561754][T14928] R13: 00007fffab3ba1a0 R14: 0000000000000000 R15: 00007fffab3ba1b0 [ 972.576247][T14928] memory: usage 868kB, limit 0kB, failcnt 469019 [ 972.584157][T14928] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 972.604704][T14928] Memory cgroup stats for /syz5: [ 972.604910][T14928] anon 16384 [ 972.604910][T14928] file 69632 [ 972.604910][T14928] kernel_stack 65536 [ 972.604910][T14928] slab 790528 [ 972.604910][T14928] sock 0 [ 972.604910][T14928] shmem 0 [ 972.604910][T14928] file_mapped 0 [ 972.604910][T14928] file_dirty 0 [ 972.604910][T14928] file_writeback 0 [ 972.604910][T14928] anon_thp 0 [ 972.604910][T14928] inactive_anon 0 [ 972.604910][T14928] active_anon 16384 [ 972.604910][T14928] inactive_file 0 [ 972.604910][T14928] active_file 61440 [ 972.604910][T14928] unevictable 0 [ 972.604910][T14928] slab_reclaimable 270336 [ 972.604910][T14928] slab_unreclaimable 520192 [ 972.604910][T14928] pgfault 70620 [ 972.604910][T14928] pgmajfault 0 [ 972.604910][T14928] workingset_refault 0 [ 972.604910][T14928] workingset_activate 0 [ 972.604910][T14928] workingset_nodereclaim 0 [ 972.604910][T14928] pgrefill 171 [ 972.604910][T14928] pgscan 183 [ 972.604910][T14928] pgsteal 84 [ 972.604910][T14928] pgactivate 66 [ 972.612976][T14928] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14928,uid=0 [ 972.727366][T14947] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 972.770850][T14947] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 972.810557][T14928] Memory cgroup out of memory: Killed process 14928 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 06:01:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 972.848714][T14947] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:01:54 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xfc250000, 0x0) 06:01:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, 0x0, 0x0) [ 972.898783][ T1065] oom_reaper: reaped process 14928 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 972.967502][T14968] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:01:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 973.035048][T14968] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 973.115905][T14968] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:01:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) 06:01:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, 0x0, 0x0) 06:01:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:55 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2000000, 0x0) 06:01:55 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xff000000, 0x0) 06:01:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, 0x0, 0x0) 06:01:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r4, 0x0, 0x0) [ 973.729905][T15005] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:01:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 973.787696][T15005] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 973.844669][T15005] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:01:55 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xff0f0000, 0x0) 06:01:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 973.990308][T15022] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:01:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) 06:01:56 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x3000000, 0x0) 06:01:56 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xfffdffff, 0x0) 06:01:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:01:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) [ 975.786138][T15085] IPVS: ftp: loaded support on port[0] = 21 [ 975.915291][T15085] chnl_net:caif_netlink_parms(): no params data found [ 976.006758][T15085] bridge0: port 1(bridge_slave_0) entered blocking state [ 976.014785][T15085] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.022605][T15085] device bridge_slave_0 entered promiscuous mode [ 976.030266][T15085] bridge0: port 2(bridge_slave_1) entered blocking state [ 976.037387][T15085] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.045084][T15085] device bridge_slave_1 entered promiscuous mode [ 976.057067][T16999] device bridge_slave_1 left promiscuous mode [ 976.064941][T16999] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.121134][T16999] device bridge_slave_0 left promiscuous mode [ 976.127339][T16999] bridge0: port 1(bridge_slave_0) entered disabled state [ 977.970772][T16999] device hsr_slave_0 left promiscuous mode [ 978.030181][T16999] device hsr_slave_1 left promiscuous mode [ 978.107260][T16999] team0 (unregistering): Port device team_slave_1 removed [ 978.120098][T16999] team0 (unregistering): Port device team_slave_0 removed [ 978.130707][T16999] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 978.167087][T16999] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 978.238056][T16999] bond0 (unregistering): Released all slaves [ 978.357851][T15085] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 978.371927][T15085] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 978.393016][T15085] team0: Port device team_slave_0 added [ 978.399937][T15085] team0: Port device team_slave_1 added [ 978.503172][T15085] device hsr_slave_0 entered promiscuous mode [ 978.540537][T15085] device hsr_slave_1 entered promiscuous mode [ 978.600158][T15085] debugfs: Directory 'hsr0' with parent '/' already present! [ 978.725531][T15085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 978.739617][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 978.751064][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 978.758871][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 978.769896][T15085] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.788439][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 978.797804][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 978.813949][T10802] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.821085][T10802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 978.856782][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 978.865112][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 978.881029][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 978.889470][T10802] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.896682][T10802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 978.913144][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 978.927295][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 978.937793][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 978.962449][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 978.971007][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 978.979513][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 978.992713][T15085] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 979.011005][T15085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 979.021172][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 979.059914][T15085] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 979.289797][T15093] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 979.308328][T15093] CPU: 1 PID: 15093 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 979.315900][T15093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.325959][T15093] Call Trace: [ 979.329254][T15093] dump_stack+0x172/0x1f0 [ 979.333601][T15093] dump_header+0x10b/0x82d [ 979.338024][T15093] oom_kill_process.cold+0x10/0x15 [ 979.343143][T15093] out_of_memory+0x79a/0x12c0 [ 979.347826][T15093] ? __sched_text_start+0x8/0x8 [ 979.352677][T15093] ? oom_killer_disable+0x280/0x280 [ 979.357885][T15093] mem_cgroup_out_of_memory+0x1d8/0x240 [ 979.363437][T15093] ? PageTransHuge+0xc0/0xc0 [ 979.368033][T15093] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 979.373842][T15093] ? cgroup_file_notify+0x140/0x1b0 [ 979.379042][T15093] memory_max_write+0x262/0x3a0 [ 979.383907][T15093] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 979.390693][T15093] ? lock_acquire+0x190/0x410 [ 979.395366][T15093] ? kernfs_fop_write+0x227/0x480 [ 979.400398][T15093] cgroup_file_write+0x241/0x790 [ 979.405335][T15093] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 979.412091][T15093] ? cgroup_migrate_add_task+0x890/0x890 [ 979.417726][T15093] ? cgroup_migrate_add_task+0x890/0x890 [ 979.423363][T15093] kernfs_fop_write+0x2b8/0x480 [ 979.428207][T15093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 979.434454][T15093] __vfs_write+0x8a/0x110 [ 979.438792][T15093] ? kernfs_fop_open+0xd80/0xd80 [ 979.443729][T15093] vfs_write+0x268/0x5d0 [ 979.447974][T15093] ksys_write+0x14f/0x290 [ 979.452307][T15093] ? __ia32_sys_read+0xb0/0xb0 [ 979.457067][T15093] ? do_syscall_64+0x26/0x760 [ 979.461742][T15093] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.467801][T15093] ? do_syscall_64+0x26/0x760 [ 979.472486][T15093] __x64_sys_write+0x73/0xb0 [ 979.477080][T15093] do_syscall_64+0xfa/0x760 [ 979.481601][T15093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.487517][T15093] RIP: 0033:0x459a09 [ 979.491417][T15093] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 979.511066][T15093] RSP: 002b:00007f6fb11acc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 979.519480][T15093] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 979.527455][T15093] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 979.535426][T15093] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 979.543391][T15093] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6fb11ad6d4 [ 979.551366][T15093] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 979.573257][T15093] memory: usage 5308kB, limit 0kB, failcnt 469020 [ 979.579848][T15093] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 979.594233][T15093] Memory cgroup stats for /syz5: [ 979.594356][T15093] anon 4333568 [ 979.594356][T15093] file 69632 [ 979.594356][T15093] kernel_stack 65536 [ 979.594356][T15093] slab 790528 [ 979.594356][T15093] sock 0 [ 979.594356][T15093] shmem 0 [ 979.594356][T15093] file_mapped 0 [ 979.594356][T15093] file_dirty 0 [ 979.594356][T15093] file_writeback 0 [ 979.594356][T15093] anon_thp 4194304 [ 979.594356][T15093] inactive_anon 0 [ 979.594356][T15093] active_anon 4333568 [ 979.594356][T15093] inactive_file 0 [ 979.594356][T15093] active_file 61440 [ 979.594356][T15093] unevictable 0 [ 979.594356][T15093] slab_reclaimable 270336 [ 979.594356][T15093] slab_unreclaimable 520192 [ 979.594356][T15093] pgfault 70719 [ 979.594356][T15093] pgmajfault 0 [ 979.594356][T15093] workingset_refault 0 [ 979.594356][T15093] workingset_activate 0 [ 979.594356][T15093] workingset_nodereclaim 0 [ 979.594356][T15093] pgrefill 171 [ 979.594356][T15093] pgscan 183 [ 979.594356][T15093] pgsteal 84 [ 979.594356][T15093] pgactivate 66 [ 979.689543][T15093] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15092,uid=0 [ 979.705971][T15093] Memory cgroup out of memory: Killed process 15092 (syz-executor.5) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 979.723303][ T1065] oom_reaper: reaped process 15092 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 06:02:01 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 06:02:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:01 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xfffffdf9, 0x0) 06:02:01 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x4000000, 0x0) [ 979.795072][T15085] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 979.873814][T15085] CPU: 1 PID: 15085 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 979.881418][T15085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.891475][T15085] Call Trace: [ 979.894788][T15085] dump_stack+0x172/0x1f0 [ 979.899111][T15085] dump_header+0x10b/0x82d [ 979.904207][T15085] ? oom_kill_process+0x94/0x3f0 [ 979.909132][T15085] oom_kill_process.cold+0x10/0x15 [ 979.914233][T15085] out_of_memory+0x79a/0x12c0 [ 979.918895][T15085] ? lock_downgrade+0x920/0x920 [ 979.923735][T15085] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 979.929530][T15085] ? oom_killer_disable+0x280/0x280 [ 979.934729][T15085] mem_cgroup_out_of_memory+0x1d8/0x240 [ 979.940262][T15085] ? PageTransHuge+0xc0/0xc0 [ 979.944851][T15085] ? do_raw_spin_unlock+0x57/0x270 [ 979.949948][T15085] ? _raw_spin_unlock+0x2d/0x50 [ 979.954791][T15085] try_charge+0xf4b/0x1440 [ 979.959202][T15085] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 979.964905][T15085] ? percpu_ref_tryget_live+0x111/0x290 [ 979.970452][T15085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 979.976679][T15085] ? __kasan_check_read+0x11/0x20 [ 979.981711][T15085] ? get_mem_cgroup_from_mm+0x156/0x320 [ 979.987244][T15085] mem_cgroup_try_charge+0x136/0x590 [ 979.992527][T15085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 979.998758][T15085] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 980.004468][T15085] wp_page_copy+0x41e/0x15e0 [ 980.009045][T15085] ? find_held_lock+0x35/0x130 [ 980.013801][T15085] ? pmd_pfn+0x1d0/0x1d0 [ 980.018122][T15085] ? lock_downgrade+0x920/0x920 [ 980.022963][T15085] ? swp_swapcount+0x540/0x540 [ 980.027717][T15085] ? __kasan_check_read+0x11/0x20 [ 980.032726][T15085] ? do_raw_spin_unlock+0x57/0x270 [ 980.037826][T15085] do_wp_page+0x499/0x14d0 [ 980.042234][T15085] ? finish_mkwrite_fault+0x570/0x570 [ 980.047605][T15085] __handle_mm_fault+0x22c7/0x3ef0 [ 980.052709][T15085] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 980.058258][T15085] ? __kasan_check_read+0x11/0x20 [ 980.063279][T15085] handle_mm_fault+0x1b5/0x6b0 [ 980.068033][T15085] __do_page_fault+0x536/0xdd0 [ 980.072791][T15085] do_page_fault+0x38/0x590 [ 980.077283][T15085] page_fault+0x39/0x40 [ 980.081425][T15085] RIP: 0033:0x430ae6 [ 980.085311][T15085] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 7c 44 64 00 85 c0 0f 84 [ 980.104909][T15085] RSP: 002b:00007ffdef5d4330 EFLAGS: 00010206 [ 980.110959][T15085] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 980.118913][T15085] RDX: 000055555722b930 RSI: 0000555557233970 RDI: 0000000000000003 [ 980.126869][T15085] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555722a940 [ 980.134826][T15085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 980.142781][T15085] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 06:02:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 980.170604][T15103] __ntfs_error: 8 callbacks suppressed [ 980.170616][T15103] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:02:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) [ 980.215928][T15103] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:02:01 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xfffffdff, 0x0) [ 980.320210][T15103] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 980.373568][T15085] memory: usage 872kB, limit 0kB, failcnt 469028 [ 980.388002][T15085] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 980.397560][T15085] Memory cgroup stats for /syz5: [ 980.397648][T15085] anon 69632 [ 980.397648][T15085] file 69632 [ 980.397648][T15085] kernel_stack 0 [ 980.397648][T15085] slab 790528 [ 980.397648][T15085] sock 0 [ 980.397648][T15085] shmem 0 [ 980.397648][T15085] file_mapped 0 [ 980.397648][T15085] file_dirty 0 [ 980.397648][T15085] file_writeback 0 [ 980.397648][T15085] anon_thp 0 [ 980.397648][T15085] inactive_anon 0 [ 980.397648][T15085] active_anon 69632 [ 980.397648][T15085] inactive_file 0 [ 980.397648][T15085] active_file 61440 [ 980.397648][T15085] unevictable 0 [ 980.397648][T15085] slab_reclaimable 270336 [ 980.397648][T15085] slab_unreclaimable 520192 [ 980.397648][T15085] pgfault 70719 [ 980.397648][T15085] pgmajfault 0 [ 980.397648][T15085] workingset_refault 0 [ 980.397648][T15085] workingset_activate 0 [ 980.397648][T15085] workingset_nodereclaim 0 [ 980.397648][T15085] pgrefill 171 [ 980.397648][T15085] pgscan 183 [ 980.397648][T15085] pgsteal 84 [ 980.397648][T15085] pgactivate 66 06:02:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) [ 980.522870][T15085] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15085,uid=0 [ 980.558834][T15125] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 980.576418][T15085] Memory cgroup out of memory: Killed process 15085 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 980.590414][T15125] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:02:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x0, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xffffff7f, 0x0) [ 980.621467][ T1065] oom_reaper: reaped process 15085 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 980.739884][T15125] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:02 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) 06:02:02 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x5000000, 0x0) 06:02:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x0, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xffffff8c, 0x0) 06:02:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) 06:02:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 981.381644][T15158] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:02:03 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xfffffff5, 0x0) [ 981.439158][T15158] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 981.463474][T15158] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:03 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x0, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) 06:02:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:03 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x6000000, 0x0) 06:02:03 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xfffffff6, 0x0) 06:02:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) [ 981.993344][T15198] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:02:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:03 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xedc000000000, 0x0) 06:02:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) [ 983.641397][T15246] IPVS: ftp: loaded support on port[0] = 21 [ 983.770908][T15246] chnl_net:caif_netlink_parms(): no params data found [ 983.779765][T16999] device bridge_slave_1 left promiscuous mode [ 983.789622][T16999] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.841306][T16999] device bridge_slave_0 left promiscuous mode [ 983.847503][T16999] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.630692][T16999] device hsr_slave_0 left promiscuous mode [ 985.700158][T16999] device hsr_slave_1 left promiscuous mode [ 985.779892][T16999] team0 (unregistering): Port device team_slave_1 removed [ 985.793156][T16999] team0 (unregistering): Port device team_slave_0 removed [ 985.803650][T16999] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 985.874238][T16999] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 985.968020][T16999] bond0 (unregistering): Released all slaves [ 986.143205][T15246] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.150449][T15246] bridge0: port 1(bridge_slave_0) entered disabled state [ 986.158172][T15246] device bridge_slave_0 entered promiscuous mode [ 986.166829][T15246] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.174068][T15246] bridge0: port 2(bridge_slave_1) entered disabled state [ 986.181858][T15246] device bridge_slave_1 entered promiscuous mode [ 986.202294][T15246] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 986.213130][T15246] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 986.234846][T15246] team0: Port device team_slave_0 added [ 986.242917][T15246] team0: Port device team_slave_1 added [ 986.313037][T15246] device hsr_slave_0 entered promiscuous mode [ 986.350396][T15246] device hsr_slave_1 entered promiscuous mode [ 986.420143][T15246] debugfs: Directory 'hsr0' with parent '/' already present! [ 986.439294][T15246] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.446429][T15246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 986.453809][T15246] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.460916][T15246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 986.569899][T15246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 986.594627][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 986.606807][T10802] bridge0: port 1(bridge_slave_0) entered disabled state [ 986.618506][T10802] bridge0: port 2(bridge_slave_1) entered disabled state [ 986.634793][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 986.651092][T15246] 8021q: adding VLAN 0 to HW filter on device team0 [ 986.669912][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 986.679386][ T8663] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.686507][ T8663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 986.716678][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 986.727976][T12841] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.735085][T12841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 986.767890][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 986.777358][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 986.793314][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 986.813626][T15246] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 986.829482][T15246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 986.844587][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 986.855047][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 986.879293][T15246] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 987.191907][T15254] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 987.204392][T15254] CPU: 0 PID: 15254 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 987.211945][T15254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.221997][T15254] Call Trace: [ 987.225292][T15254] dump_stack+0x172/0x1f0 [ 987.229629][T15254] dump_header+0x10b/0x82d [ 987.234049][T15254] oom_kill_process.cold+0x10/0x15 [ 987.239179][T15254] out_of_memory+0x79a/0x12c0 [ 987.243866][T15254] ? __sched_text_start+0x8/0x8 [ 987.248718][T15254] ? oom_killer_disable+0x280/0x280 [ 987.253929][T15254] mem_cgroup_out_of_memory+0x1d8/0x240 [ 987.259474][T15254] ? PageTransHuge+0xc0/0xc0 [ 987.264078][T15254] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 987.269898][T15254] ? cgroup_file_notify+0x140/0x1b0 [ 987.275119][T15254] memory_max_write+0x262/0x3a0 [ 987.279977][T15254] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 987.286734][T15254] ? lock_acquire+0x190/0x410 [ 987.291411][T15254] ? kernfs_fop_write+0x227/0x480 [ 987.296441][T15254] cgroup_file_write+0x241/0x790 [ 987.301382][T15254] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 987.308141][T15254] ? cgroup_migrate_add_task+0x890/0x890 [ 987.313783][T15254] ? cgroup_migrate_add_task+0x890/0x890 [ 987.319413][T15254] kernfs_fop_write+0x2b8/0x480 [ 987.324268][T15254] __vfs_write+0x8a/0x110 [ 987.328595][T15254] ? kernfs_fop_open+0xd80/0xd80 [ 987.333543][T15254] vfs_write+0x268/0x5d0 [ 987.337786][T15254] ksys_write+0x14f/0x290 [ 987.342117][T15254] ? __ia32_sys_read+0xb0/0xb0 [ 987.346880][T15254] ? do_syscall_64+0x26/0x760 [ 987.351553][T15254] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.357616][T15254] ? do_syscall_64+0x26/0x760 [ 987.362297][T15254] __x64_sys_write+0x73/0xb0 [ 987.366976][T15254] do_syscall_64+0xfa/0x760 [ 987.371482][T15254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.377375][T15254] RIP: 0033:0x459a09 [ 987.381275][T15254] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 987.400903][T15254] RSP: 002b:00007fbf0e481c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 987.409318][T15254] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 987.417287][T15254] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 987.425254][T15254] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 987.433214][T15254] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf0e4826d4 [ 987.441168][T15254] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 987.471464][T15254] memory: usage 5236kB, limit 0kB, failcnt 469029 [ 987.478102][T15254] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 987.486745][T15254] Memory cgroup stats for /syz5: [ 987.488650][T15254] anon 4300800 [ 987.488650][T15254] file 69632 [ 987.488650][T15254] kernel_stack 65536 [ 987.488650][T15254] slab 790528 [ 987.488650][T15254] sock 0 [ 987.488650][T15254] shmem 0 [ 987.488650][T15254] file_mapped 0 [ 987.488650][T15254] file_dirty 0 [ 987.488650][T15254] file_writeback 0 [ 987.488650][T15254] anon_thp 4194304 [ 987.488650][T15254] inactive_anon 0 [ 987.488650][T15254] active_anon 4300800 [ 987.488650][T15254] inactive_file 0 [ 987.488650][T15254] active_file 61440 [ 987.488650][T15254] unevictable 0 [ 987.488650][T15254] slab_reclaimable 270336 [ 987.488650][T15254] slab_unreclaimable 520192 [ 987.488650][T15254] pgfault 70785 [ 987.488650][T15254] pgmajfault 0 [ 987.488650][T15254] workingset_refault 0 [ 987.488650][T15254] workingset_activate 0 [ 987.488650][T15254] workingset_nodereclaim 0 [ 987.488650][T15254] pgrefill 171 [ 987.488650][T15254] pgscan 183 [ 987.488650][T15254] pgsteal 84 [ 987.488650][T15254] pgactivate 66 [ 987.595616][T15254] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15253,uid=0 [ 987.614151][T15254] Memory cgroup out of memory: Killed process 15253 (syz-executor.5) total-vm:72712kB, anon-rss:4244kB, file-rss:35808kB, shmem-rss:0kB [ 987.638513][ T1065] oom_reaper: reaped process 15253 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 06:02:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) 06:02:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:09 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x1000000000000, 0x0) 06:02:09 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x7000000, 0x0) [ 987.848688][T15246] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 06:02:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x0, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, 0x0}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 987.943223][T15246] CPU: 1 PID: 15246 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 987.950829][T15246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.961327][T15246] Call Trace: [ 987.964629][T15246] dump_stack+0x172/0x1f0 [ 987.968979][T15246] dump_header+0x10b/0x82d [ 987.973420][T15246] ? oom_kill_process+0x94/0x3f0 [ 987.978377][T15246] oom_kill_process.cold+0x10/0x15 [ 987.983494][T15246] out_of_memory+0x79a/0x12c0 [ 987.988173][T15246] ? lock_downgrade+0x920/0x920 [ 987.993024][T15246] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 987.999016][T15246] ? oom_killer_disable+0x280/0x280 [ 988.004750][T15246] mem_cgroup_out_of_memory+0x1d8/0x240 [ 988.010297][T15246] ? PageTransHuge+0xc0/0xc0 [ 988.014892][T15246] ? do_raw_spin_unlock+0x57/0x270 [ 988.020013][T15246] ? _raw_spin_unlock+0x2d/0x50 [ 988.024869][T15246] try_charge+0xf4b/0x1440 [ 988.029297][T15246] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 988.034842][T15246] ? percpu_ref_tryget_live+0x111/0x290 [ 988.040395][T15246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.046640][T15246] ? __kasan_check_read+0x11/0x20 [ 988.051675][T15246] ? get_mem_cgroup_from_mm+0x156/0x320 [ 988.057309][T15246] mem_cgroup_try_charge+0x136/0x590 [ 988.062607][T15246] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 988.068859][T15246] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 988.074486][T15246] wp_page_copy+0x41e/0x15e0 [ 988.079077][T15246] ? find_held_lock+0x35/0x130 [ 988.083934][T15246] ? pmd_pfn+0x1d0/0x1d0 [ 988.089119][T15246] ? lock_downgrade+0x920/0x920 [ 988.093959][T15246] ? swp_swapcount+0x540/0x540 [ 988.098800][T15246] ? __kasan_check_read+0x11/0x20 [ 988.103812][T15246] ? do_raw_spin_unlock+0x57/0x270 [ 988.108938][T15246] do_wp_page+0x499/0x14d0 [ 988.113361][T15246] ? finish_mkwrite_fault+0x570/0x570 [ 988.118732][T15246] __handle_mm_fault+0x22c7/0x3ef0 [ 988.123844][T15246] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 988.129393][T15246] ? __kasan_check_read+0x11/0x20 [ 988.134416][T15246] handle_mm_fault+0x1b5/0x6b0 [ 988.139257][T15246] __do_page_fault+0x536/0xdd0 [ 988.144015][T15246] do_page_fault+0x38/0x590 [ 988.148508][T15246] page_fault+0x39/0x40 [ 988.152650][T15246] RIP: 0033:0x4034f2 [ 988.156706][T15246] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 39 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 59 44 05 00 48 [ 988.176295][T15246] RSP: 002b:00007ffd8a545b70 EFLAGS: 00010246 [ 988.182344][T15246] RAX: 0000000000000000 RBX: 00000000000f0fe5 RCX: 0000000000413610 [ 988.190299][T15246] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffd8a546ca0 [ 988.198256][T15246] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555556ba6940 [ 988.206223][T15246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd8a546ca0 [ 988.214360][T15246] R13: 00007ffd8a546c90 R14: 0000000000000000 R15: 00007ffd8a546ca0 [ 988.234384][T15246] memory: usage 808kB, limit 0kB, failcnt 469037 [ 988.240971][T15246] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 988.248591][T15246] Memory cgroup stats for /syz5: [ 988.248693][T15246] anon 65536 [ 988.248693][T15246] file 69632 [ 988.248693][T15246] kernel_stack 0 [ 988.248693][T15246] slab 790528 [ 988.248693][T15246] sock 0 [ 988.248693][T15246] shmem 0 [ 988.248693][T15246] file_mapped 0 [ 988.248693][T15246] file_dirty 0 [ 988.248693][T15246] file_writeback 0 [ 988.248693][T15246] anon_thp 0 [ 988.248693][T15246] inactive_anon 0 [ 988.248693][T15246] active_anon 65536 [ 988.248693][T15246] inactive_file 0 [ 988.248693][T15246] active_file 61440 [ 988.248693][T15246] unevictable 0 [ 988.248693][T15246] slab_reclaimable 270336 [ 988.248693][T15246] slab_unreclaimable 520192 [ 988.248693][T15246] pgfault 70785 [ 988.248693][T15246] pgmajfault 0 [ 988.248693][T15246] workingset_refault 0 [ 988.248693][T15246] workingset_activate 0 [ 988.248693][T15246] workingset_nodereclaim 0 [ 988.248693][T15246] pgrefill 171 [ 988.248693][T15246] pgscan 183 [ 988.248693][T15246] pgsteal 84 [ 988.248693][T15246] pgactivate 66 [ 988.342938][T15246] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15246,uid=0 [ 988.343039][T15246] Memory cgroup out of memory: Killed process 15246 (syz-executor.5) total-vm:72448kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB 06:02:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)}], 0x1}, 0x0) [ 988.418936][T15264] __ntfs_error: 2 callbacks suppressed [ 988.418952][T15264] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 988.483506][T15264] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:02:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xa000000000000, 0x0) 06:02:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, 0x0}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 988.581892][T15264] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)}], 0x1}, 0x0) 06:02:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, 0x0}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xe000000000000, 0x0) 06:02:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:10 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x8000000, 0x0) [ 989.320556][T15320] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:02:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)}], 0x1}, 0x0) 06:02:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 989.358605][T15320] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 989.375836][T15320] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:11 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x100000000000000, 0x0) 06:02:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:11 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x9000000, 0x0) 06:02:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200"/37, 0x25}], 0x1}, 0x0) 06:02:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:11 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x200000000000000, 0x0) 06:02:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200"/37, 0x25}], 0x1}, 0x0) [ 989.990670][T15357] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 990.101777][T15357] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:02:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200"/37, 0x25}], 0x1}, 0x0) 06:02:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 990.205409][T15357] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 990.565067][T15357] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 991.639457][T15401] IPVS: ftp: loaded support on port[0] = 21 [ 991.683871][T16999] device bridge_slave_1 left promiscuous mode [ 991.691014][T16999] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.791257][T16999] device bridge_slave_0 left promiscuous mode [ 991.797499][T16999] bridge0: port 1(bridge_slave_0) entered disabled state [ 993.600808][T16999] device hsr_slave_0 left promiscuous mode [ 993.670175][T16999] device hsr_slave_1 left promiscuous mode [ 993.730486][T16999] team0 (unregistering): Port device team_slave_1 removed [ 993.743425][T16999] team0 (unregistering): Port device team_slave_0 removed [ 993.754086][T16999] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 993.803917][T16999] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 993.873669][T16999] bond0 (unregistering): Released all slaves [ 994.035763][T15401] chnl_net:caif_netlink_parms(): no params data found [ 994.068342][T15401] bridge0: port 1(bridge_slave_0) entered blocking state [ 994.075648][T15401] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.083460][T15401] device bridge_slave_0 entered promiscuous mode [ 994.092310][T15401] bridge0: port 2(bridge_slave_1) entered blocking state [ 994.099405][T15401] bridge0: port 2(bridge_slave_1) entered disabled state [ 994.107119][T15401] device bridge_slave_1 entered promiscuous mode [ 994.126553][T15401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 994.137620][T15401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 994.160846][T15401] team0: Port device team_slave_0 added [ 994.167473][T15401] team0: Port device team_slave_1 added [ 994.231882][T15401] device hsr_slave_0 entered promiscuous mode [ 994.270384][T15401] device hsr_slave_1 entered promiscuous mode [ 994.320268][T15401] debugfs: Directory 'hsr0' with parent '/' already present! [ 994.401986][T15401] bridge0: port 2(bridge_slave_1) entered blocking state [ 994.409085][T15401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 994.416480][T15401] bridge0: port 1(bridge_slave_0) entered blocking state [ 994.423612][T15401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 994.471196][T15401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 994.485274][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 994.495189][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.503486][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 994.512745][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 994.531622][T15401] 8021q: adding VLAN 0 to HW filter on device team0 [ 994.544223][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 994.553336][T10802] bridge0: port 1(bridge_slave_0) entered blocking state [ 994.560453][T10802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 994.581106][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 994.589681][T10802] bridge0: port 2(bridge_slave_1) entered blocking state [ 994.596798][T10802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 994.626755][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 994.639690][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 994.658876][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 994.669979][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 994.689308][T15401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 994.699127][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 994.719417][T15401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 995.014772][T15409] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 995.032694][T15409] CPU: 1 PID: 15409 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 995.040358][T15409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.050418][T15409] Call Trace: [ 995.053721][T15409] dump_stack+0x172/0x1f0 [ 995.058069][T15409] dump_header+0x10b/0x82d [ 995.062760][T15409] oom_kill_process.cold+0x10/0x15 [ 995.068491][T15409] out_of_memory+0x79a/0x12c0 [ 995.073364][T15409] ? __sched_text_start+0x8/0x8 [ 995.078586][T15409] ? oom_killer_disable+0x280/0x280 [ 995.083884][T15409] mem_cgroup_out_of_memory+0x1d8/0x240 [ 995.089528][T15409] ? PageTransHuge+0xc0/0xc0 [ 995.094122][T15409] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 995.100364][T15409] ? cgroup_file_notify+0x140/0x1b0 [ 995.105584][T15409] memory_max_write+0x262/0x3a0 [ 995.110446][T15409] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 995.117919][T15409] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 995.123661][T15409] cgroup_file_write+0x241/0x790 [ 995.128600][T15409] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 995.135366][T15409] ? cgroup_migrate_add_task+0x890/0x890 [ 995.141010][T15409] ? kernfs_ops+0x9f/0x110 [ 995.145426][T15409] ? cgroup_migrate_add_task+0x890/0x890 [ 995.151053][T15409] kernfs_fop_write+0x2b8/0x480 [ 995.155900][T15409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.162144][T15409] __vfs_write+0x8a/0x110 [ 995.166472][T15409] ? kernfs_fop_open+0xd80/0xd80 [ 995.171412][T15409] vfs_write+0x268/0x5d0 [ 995.175654][T15409] ksys_write+0x14f/0x290 [ 995.179981][T15409] ? __ia32_sys_read+0xb0/0xb0 [ 995.184749][T15409] ? do_syscall_64+0x26/0x760 [ 995.189422][T15409] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.195491][T15409] ? do_syscall_64+0x26/0x760 [ 995.200183][T15409] __x64_sys_write+0x73/0xb0 [ 995.204770][T15409] do_syscall_64+0xfa/0x760 [ 995.209277][T15409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.215285][T15409] RIP: 0033:0x459a09 [ 995.219183][T15409] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.238783][T15409] RSP: 002b:00007fcf3c0d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 995.247200][T15409] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 995.255169][T15409] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 995.263141][T15409] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 995.271111][T15409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcf3c0d26d4 [ 995.279078][T15409] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 995.299901][T15409] memory: usage 5212kB, limit 0kB, failcnt 469038 [ 995.306753][T15409] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 995.314908][T15409] Memory cgroup stats for /syz5: [ 995.317354][T15409] anon 4374528 [ 995.317354][T15409] file 69632 [ 995.317354][T15409] kernel_stack 65536 [ 995.317354][T15409] slab 790528 [ 995.317354][T15409] sock 0 [ 995.317354][T15409] shmem 0 [ 995.317354][T15409] file_mapped 0 [ 995.317354][T15409] file_dirty 0 [ 995.317354][T15409] file_writeback 0 [ 995.317354][T15409] anon_thp 4194304 [ 995.317354][T15409] inactive_anon 0 [ 995.317354][T15409] active_anon 4374528 [ 995.317354][T15409] inactive_file 0 [ 995.317354][T15409] active_file 61440 [ 995.317354][T15409] unevictable 0 [ 995.317354][T15409] slab_reclaimable 270336 [ 995.317354][T15409] slab_unreclaimable 520192 [ 995.317354][T15409] pgfault 70851 [ 995.317354][T15409] pgmajfault 0 [ 995.317354][T15409] workingset_refault 0 [ 995.317354][T15409] workingset_activate 0 [ 995.317354][T15409] workingset_nodereclaim 0 [ 995.317354][T15409] pgrefill 171 [ 995.317354][T15409] pgscan 183 [ 995.317354][T15409] pgsteal 84 [ 995.317354][T15409] pgactivate 66 [ 995.422035][T15409] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15408,uid=0 [ 995.447203][T15409] Memory cgroup out of memory: Killed process 15408 (syz-executor.5) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 995.469860][ T1065] oom_reaper: reaped process 15408 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 06:02:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x300000000000000, 0x0) 06:02:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f3", 0x37}], 0x1}, 0x0) 06:02:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:17 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xa000000, 0x0) [ 995.745117][T15401] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 995.760248][T15401] CPU: 0 PID: 15401 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 995.767832][T15401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.777896][T15401] Call Trace: [ 995.781314][T15401] dump_stack+0x172/0x1f0 [ 995.785657][T15401] dump_header+0x10b/0x82d [ 995.790076][T15401] ? oom_kill_process+0x94/0x3f0 [ 995.795026][T15401] oom_kill_process.cold+0x10/0x15 [ 995.800134][T15401] out_of_memory+0x79a/0x12c0 [ 995.804804][T15401] ? lock_downgrade+0x920/0x920 [ 995.809646][T15401] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 995.815442][T15401] ? oom_killer_disable+0x280/0x280 [ 995.820739][T15401] mem_cgroup_out_of_memory+0x1d8/0x240 [ 995.826285][T15401] ? PageTransHuge+0xc0/0xc0 [ 995.830870][T15401] ? do_raw_spin_unlock+0x57/0x270 [ 995.835982][T15401] ? _raw_spin_unlock+0x2d/0x50 [ 995.840822][T15401] try_charge+0xf4b/0x1440 [ 995.845232][T15401] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 995.850771][T15401] ? percpu_ref_tryget_live+0x111/0x290 [ 995.856743][T15401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.862971][T15401] ? __kasan_check_read+0x11/0x20 [ 995.867992][T15401] ? get_mem_cgroup_from_mm+0x156/0x320 [ 995.873615][T15401] mem_cgroup_try_charge+0x136/0x590 [ 995.878887][T15401] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 995.885120][T15401] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 995.890749][T15401] __handle_mm_fault+0x1e0c/0x3ef0 [ 995.895854][T15401] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 995.901403][T15401] ? __kasan_check_read+0x11/0x20 [ 995.906437][T15401] handle_mm_fault+0x1b5/0x6b0 [ 995.911195][T15401] __do_page_fault+0x536/0xdd0 [ 995.915977][T15401] do_page_fault+0x38/0x590 [ 995.920485][T15401] page_fault+0x39/0x40 [ 995.924626][T15401] RIP: 0033:0x4034f2 [ 995.928505][T15401] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 39 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 59 44 05 00 48 [ 995.948104][T15401] RSP: 002b:00007ffe54344f50 EFLAGS: 00010246 [ 995.954170][T15401] RAX: 0000000000000000 RBX: 00000000000f2e81 RCX: 0000000000413610 [ 995.962344][T15401] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe54346080 [ 995.970303][T15401] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555556dab940 [ 995.978272][T15401] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe54346080 [ 995.986249][T15401] R13: 00007ffe54346070 R14: 0000000000000000 R15: 00007ffe54346080 [ 996.012990][T15401] memory: usage 784kB, limit 0kB, failcnt 469046 [ 996.024950][T15421] __ntfs_error: 2 callbacks suppressed [ 996.024960][T15421] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 996.050045][T15401] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 996.057045][T15421] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 996.071900][T15401] Memory cgroup stats for /syz5: [ 996.072007][T15401] anon 69632 [ 996.072007][T15401] file 69632 [ 996.072007][T15401] kernel_stack 65536 [ 996.072007][T15401] slab 790528 [ 996.072007][T15401] sock 0 [ 996.072007][T15401] shmem 0 [ 996.072007][T15401] file_mapped 0 [ 996.072007][T15401] file_dirty 0 [ 996.072007][T15401] file_writeback 0 [ 996.072007][T15401] anon_thp 0 [ 996.072007][T15401] inactive_anon 0 [ 996.072007][T15401] active_anon 69632 [ 996.072007][T15401] inactive_file 0 [ 996.072007][T15401] active_file 61440 [ 996.072007][T15401] unevictable 0 [ 996.072007][T15401] slab_reclaimable 270336 [ 996.072007][T15401] slab_unreclaimable 520192 [ 996.072007][T15401] pgfault 70851 [ 996.072007][T15401] pgmajfault 0 [ 996.072007][T15401] workingset_refault 0 [ 996.072007][T15401] workingset_activate 0 [ 996.072007][T15401] workingset_nodereclaim 0 [ 996.072007][T15401] pgrefill 171 [ 996.072007][T15401] pgscan 183 06:02:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x0, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f3", 0x37}], 0x1}, 0x0) [ 996.072007][T15401] pgsteal 84 [ 996.072007][T15401] pgactivate 66 [ 996.179337][T15421] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 996.197669][T15401] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15401,uid=0 06:02:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 996.241344][T15401] Memory cgroup out of memory: Killed process 15401 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 996.266106][ T1065] oom_reaper: reaped process 15401 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 06:02:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f3", 0x37}], 0x1}, 0x0) 06:02:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x400000000000000, 0x0) 06:02:18 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x10000000, 0x0) [ 996.842950][T15454] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 996.859670][T15454] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 996.875195][T15454] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x0, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd30", 0x40}], 0x1}, 0x0) 06:02:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x500000000000000, 0x0) [ 997.010730][T15454] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 997.027731][T15454] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 997.045192][T15454] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:18 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x20000000, 0x0) 06:02:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x0, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd30", 0x40}], 0x1}, 0x0) 06:02:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x600000000000000, 0x0) [ 997.463521][T15489] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:02:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd30", 0x40}], 0x1}, 0x0) 06:02:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f3", 0x37}], 0x1}, 0x0) 06:02:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x700000000000000, 0x0) 06:02:20 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x20100000, 0x0) [ 999.333951][T15551] IPVS: ftp: loaded support on port[0] = 21 [ 999.459713][T15551] chnl_net:caif_netlink_parms(): no params data found [ 999.474721][T16999] device bridge_slave_1 left promiscuous mode [ 999.482244][T16999] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.531304][T16999] device bridge_slave_0 left promiscuous mode [ 999.538184][T16999] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.380746][T16999] device hsr_slave_0 left promiscuous mode [ 1001.430323][T16999] device hsr_slave_1 left promiscuous mode [ 1001.507398][T16999] team0 (unregistering): Port device team_slave_1 removed [ 1001.520775][T16999] team0 (unregistering): Port device team_slave_0 removed [ 1001.532108][T16999] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1001.596936][T16999] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1001.695260][T16999] bond0 (unregistering): Released all slaves [ 1001.811886][T15551] bridge0: port 1(bridge_slave_0) entered blocking state [ 1001.819018][T15551] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.827364][T15551] device bridge_slave_0 entered promiscuous mode [ 1001.835638][T15551] bridge0: port 2(bridge_slave_1) entered blocking state [ 1001.842857][T15551] bridge0: port 2(bridge_slave_1) entered disabled state [ 1001.850990][T15551] device bridge_slave_1 entered promiscuous mode [ 1001.873217][T15551] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1001.884923][T15551] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1001.908121][T15551] team0: Port device team_slave_0 added [ 1001.915658][T15551] team0: Port device team_slave_1 added [ 1001.983058][T15551] device hsr_slave_0 entered promiscuous mode [ 1002.040494][T15551] device hsr_slave_1 entered promiscuous mode [ 1002.100214][T15551] debugfs: Directory 'hsr0' with parent '/' already present! [ 1002.165712][T15551] bridge0: port 2(bridge_slave_1) entered blocking state [ 1002.172870][T15551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1002.181402][T15551] bridge0: port 1(bridge_slave_0) entered blocking state [ 1002.188474][T15551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1002.236729][T15551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1002.252159][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1002.261959][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.270815][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.279636][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1002.296817][T15551] 8021q: adding VLAN 0 to HW filter on device team0 [ 1002.308729][ T352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1002.318053][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 1002.325185][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1002.344096][T12739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1002.352699][T12739] bridge0: port 2(bridge_slave_1) entered blocking state [ 1002.359750][T12739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1002.391115][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1002.406862][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1002.417818][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1002.441303][T15551] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1002.453403][T15551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1002.462387][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1002.474873][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1002.499494][T15551] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1002.885094][T15559] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1002.901863][T15559] CPU: 1 PID: 15559 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1002.909424][T15559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.919478][T15559] Call Trace: [ 1002.922789][T15559] dump_stack+0x172/0x1f0 [ 1002.927128][T15559] dump_header+0x10b/0x82d [ 1002.931656][T15559] oom_kill_process.cold+0x10/0x15 [ 1002.936772][T15559] out_of_memory+0x79a/0x12c0 [ 1002.941455][T15559] ? __sched_text_start+0x8/0x8 [ 1002.946309][T15559] ? oom_killer_disable+0x280/0x280 [ 1002.951515][T15559] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1002.957057][T15559] ? PageTransHuge+0xc0/0xc0 [ 1002.961649][T15559] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1002.967453][T15559] ? cgroup_file_notify+0x140/0x1b0 [ 1002.972654][T15559] memory_max_write+0x262/0x3a0 [ 1002.977507][T15559] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 1002.984264][T15559] ? lock_acquire+0x20b/0x410 [ 1002.988938][T15559] ? retint_kernel+0x2b/0x2b [ 1002.993529][T15559] cgroup_file_write+0x241/0x790 [ 1002.998472][T15559] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 1003.005221][T15559] ? cgroup_migrate_add_task+0x890/0x890 [ 1003.010842][T15559] ? cgroup_migrate_add_task+0x890/0x890 [ 1003.016456][T15559] kernfs_fop_write+0x2b8/0x480 [ 1003.021294][T15559] __vfs_write+0x8a/0x110 [ 1003.025609][T15559] ? kernfs_fop_open+0xd80/0xd80 [ 1003.030528][T15559] vfs_write+0x268/0x5d0 [ 1003.035026][T15559] ksys_write+0x14f/0x290 [ 1003.039339][T15559] ? __ia32_sys_read+0xb0/0xb0 [ 1003.044087][T15559] ? do_syscall_64+0x26/0x760 [ 1003.048747][T15559] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.054793][T15559] ? do_syscall_64+0x26/0x760 [ 1003.059477][T15559] __x64_sys_write+0x73/0xb0 [ 1003.064063][T15559] do_syscall_64+0xfa/0x760 [ 1003.068551][T15559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.074427][T15559] RIP: 0033:0x459a09 [ 1003.078305][T15559] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1003.097897][T15559] RSP: 002b:00007fa7314a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1003.106305][T15559] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 1003.114258][T15559] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1003.122213][T15559] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1003.130166][T15559] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7314a46d4 [ 1003.138120][T15559] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 1003.184190][T15559] memory: usage 5196kB, limit 0kB, failcnt 469047 [ 1003.199756][T15559] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1003.208171][T15559] Memory cgroup stats for /syz5: [ 1003.215529][T15559] anon 4272128 [ 1003.215529][T15559] file 69632 [ 1003.215529][T15559] kernel_stack 65536 [ 1003.215529][T15559] slab 790528 [ 1003.215529][T15559] sock 0 [ 1003.215529][T15559] shmem 0 [ 1003.215529][T15559] file_mapped 0 [ 1003.215529][T15559] file_dirty 0 [ 1003.215529][T15559] file_writeback 0 [ 1003.215529][T15559] anon_thp 4194304 [ 1003.215529][T15559] inactive_anon 0 [ 1003.215529][T15559] active_anon 4272128 [ 1003.215529][T15559] inactive_file 0 [ 1003.215529][T15559] active_file 61440 [ 1003.215529][T15559] unevictable 0 [ 1003.215529][T15559] slab_reclaimable 270336 [ 1003.215529][T15559] slab_unreclaimable 520192 [ 1003.215529][T15559] pgfault 70917 [ 1003.215529][T15559] pgmajfault 0 [ 1003.215529][T15559] workingset_refault 0 [ 1003.215529][T15559] workingset_activate 0 [ 1003.215529][T15559] workingset_nodereclaim 0 [ 1003.215529][T15559] pgrefill 171 [ 1003.215529][T15559] pgscan 183 [ 1003.215529][T15559] pgsteal 84 [ 1003.215529][T15559] pgactivate 66 [ 1003.311924][T15559] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15558,uid=0 [ 1003.329293][T15559] Memory cgroup out of memory: Killed process 15558 (syz-executor.5) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 1003.348160][ T1065] oom_reaper: reaped process 15558 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 06:02:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f3", 0x37}], 0x1}, 0x0) 06:02:25 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x800000000000000, 0x0) 06:02:25 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x23000000, 0x0) [ 1003.535246][T15551] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 06:02:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000", 0x2e}], 0x1}, 0x0) [ 1003.578208][T15551] CPU: 1 PID: 15551 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1003.585796][T15551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.595858][T15551] Call Trace: [ 1003.595892][T15551] dump_stack+0x172/0x1f0 [ 1003.595927][T15551] dump_header+0x10b/0x82d [ 1003.595949][T15551] ? oom_kill_process+0x94/0x3f0 [ 1003.595972][T15551] oom_kill_process.cold+0x10/0x15 [ 1003.596000][T15551] out_of_memory+0x79a/0x12c0 [ 1003.622693][T15551] ? lock_downgrade+0x920/0x920 [ 1003.627556][T15551] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1003.633375][T15551] ? oom_killer_disable+0x280/0x280 [ 1003.638773][T15551] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1003.644331][T15551] ? PageTransHuge+0xc0/0xc0 [ 1003.649110][T15551] ? do_raw_spin_unlock+0x57/0x270 [ 1003.654230][T15551] ? _raw_spin_unlock+0x2d/0x50 [ 1003.659184][T15551] try_charge+0xf4b/0x1440 [ 1003.663618][T15551] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1003.669352][T15551] ? percpu_ref_tryget_live+0x111/0x290 06:02:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1003.674913][T15551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.681163][T15551] ? __kasan_check_read+0x11/0x20 [ 1003.686205][T15551] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1003.691765][T15551] mem_cgroup_try_charge+0x136/0x590 [ 1003.697063][T15551] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1003.703327][T15551] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1003.708972][T15551] __handle_mm_fault+0x1e0c/0x3ef0 [ 1003.714088][T15551] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1003.719638][T15551] ? __kasan_check_read+0x11/0x20 [ 1003.724662][T15551] handle_mm_fault+0x1b5/0x6b0 [ 1003.729418][T15551] __do_page_fault+0x536/0xdd0 [ 1003.734178][T15551] do_page_fault+0x38/0x590 [ 1003.738674][T15551] page_fault+0x39/0x40 [ 1003.742814][T15551] RIP: 0033:0x4034f2 [ 1003.746702][T15551] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 39 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 59 44 05 00 48 [ 1003.766316][T15551] RSP: 002b:00007fff42573e50 EFLAGS: 00010246 [ 1003.772478][T15551] RAX: 0000000000000000 RBX: 00000000000f4d30 RCX: 0000000000413610 [ 1003.780434][T15551] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff42574f80 [ 1003.788390][T15551] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555557128940 [ 1003.796343][T15551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff42574f80 [ 1003.804562][T15551] R13: 00007fff42574f70 R14: 0000000000000000 R15: 00007fff42574f80 [ 1003.828251][T15551] memory: usage 772kB, limit 0kB, failcnt 469055 [ 1003.834997][T15551] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1003.904828][T15551] Memory cgroup stats for /syz5: [ 1003.904932][T15551] anon 65536 [ 1003.904932][T15551] file 69632 [ 1003.904932][T15551] kernel_stack 0 [ 1003.904932][T15551] slab 790528 [ 1003.904932][T15551] sock 0 [ 1003.904932][T15551] shmem 0 [ 1003.904932][T15551] file_mapped 0 [ 1003.904932][T15551] file_dirty 0 [ 1003.904932][T15551] file_writeback 0 [ 1003.904932][T15551] anon_thp 0 [ 1003.904932][T15551] inactive_anon 0 [ 1003.904932][T15551] active_anon 65536 [ 1003.904932][T15551] inactive_file 0 [ 1003.904932][T15551] active_file 61440 [ 1003.904932][T15551] unevictable 0 [ 1003.904932][T15551] slab_reclaimable 270336 [ 1003.904932][T15551] slab_unreclaimable 520192 [ 1003.904932][T15551] pgfault 70917 [ 1003.904932][T15551] pgmajfault 0 [ 1003.904932][T15551] workingset_refault 0 [ 1003.904932][T15551] workingset_activate 0 [ 1003.904932][T15551] workingset_nodereclaim 0 [ 1003.904932][T15551] pgrefill 171 [ 1003.904932][T15551] pgscan 183 [ 1003.904932][T15551] pgsteal 84 [ 1003.904932][T15551] pgactivate 66 06:02:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, 0x0}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1004.050243][T15572] __ntfs_error: 5 callbacks suppressed [ 1004.050255][T15572] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1004.090399][T15572] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:02:25 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x900000000000000, 0x0) [ 1004.142068][T15572] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 1004.158931][T15551] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15551,uid=0 [ 1004.178743][T15551] Memory cgroup out of memory: Killed process 15551 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 1004.194173][ T1065] oom_reaper: reaped process 15551 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1004.246902][T15596] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1004.277547][T15596] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 06:02:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1004.314501][T15596] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, 0x0}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:26 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x28040000, 0x0) 06:02:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000", 0x2e}], 0x1}, 0x0) 06:02:26 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0xa00000000000000, 0x0) 06:02:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, 0x0}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000", 0x2e}], 0x1}, 0x0) 06:02:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:26 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x3f000000, 0x0) 06:02:26 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x1000000000000000, 0x0) 06:02:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195", 0x33}], 0x1}, 0x0) 06:02:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195", 0x33}], 0x1}, 0x0) [ 1005.590130][T15659] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:02:27 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2000000000000000, 0x0) 06:02:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1005.660273][T15659] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1005.736667][T15659] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 06:02:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000", 0x2f}], 0x1}, 0x0) 06:02:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1006.213194][T15690] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 06:02:28 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x40000000, 0x0) 06:02:28 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2010000000000000, 0x0) [ 1007.423683][T15723] IPVS: ftp: loaded support on port[0] = 21 [ 1007.554733][T15723] chnl_net:caif_netlink_parms(): no params data found [ 1007.565127][T16999] device bridge_slave_1 left promiscuous mode [ 1007.571468][T16999] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.641247][T16999] device bridge_slave_0 left promiscuous mode [ 1007.647460][T16999] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.410696][T16999] device hsr_slave_0 left promiscuous mode [ 1009.450363][T16999] device hsr_slave_1 left promiscuous mode [ 1009.501925][T16999] team0 (unregistering): Port device team_slave_1 removed [ 1009.514721][T16999] team0 (unregistering): Port device team_slave_0 removed [ 1009.526512][T16999] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1009.575665][T16999] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1009.669031][T16999] bond0 (unregistering): Released all slaves [ 1009.804718][T15723] bridge0: port 1(bridge_slave_0) entered blocking state [ 1009.811952][T15723] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.819583][T15723] device bridge_slave_0 entered promiscuous mode [ 1009.827523][T15723] bridge0: port 2(bridge_slave_1) entered blocking state [ 1009.834925][T15723] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.843278][T15723] device bridge_slave_1 entered promiscuous mode [ 1009.861409][T15723] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1009.872229][T15723] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1009.891443][T15723] team0: Port device team_slave_0 added [ 1009.898705][T15723] team0: Port device team_slave_1 added [ 1009.961990][T15723] device hsr_slave_0 entered promiscuous mode [ 1010.010585][T15723] device hsr_slave_1 entered promiscuous mode [ 1010.050138][T15723] debugfs: Directory 'hsr0' with parent '/' already present! [ 1010.135486][T15723] bridge0: port 2(bridge_slave_1) entered blocking state [ 1010.142628][T15723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1010.150048][T15723] bridge0: port 1(bridge_slave_0) entered blocking state [ 1010.157110][T15723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1010.230907][T15723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1010.254193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1010.270627][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.278491][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.294324][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1010.312501][T15723] 8021q: adding VLAN 0 to HW filter on device team0 [ 1010.331591][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1010.347123][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1010.354238][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1010.381458][ T8663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1010.390776][ T8663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1010.397832][ T8663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1010.419832][T15723] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1010.430945][T15723] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1010.451202][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1010.468178][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1010.478376][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1010.495158][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1010.521169][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1010.528950][T10802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1010.542992][T15723] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1010.861554][T15731] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1010.880686][T15731] CPU: 0 PID: 15731 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1010.888254][T15731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.898310][T15731] Call Trace: [ 1010.901605][T15731] dump_stack+0x172/0x1f0 [ 1010.905939][T15731] dump_header+0x10b/0x82d [ 1010.910357][T15731] oom_kill_process.cold+0x10/0x15 [ 1010.915466][T15731] out_of_memory+0x79a/0x12c0 [ 1010.920140][T15731] ? __sched_text_start+0x8/0x8 [ 1010.925085][T15731] ? oom_killer_disable+0x280/0x280 [ 1010.930293][T15731] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1010.935835][T15731] ? PageTransHuge+0xc0/0xc0 [ 1010.940430][T15731] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1010.946230][T15731] ? cgroup_file_notify+0x140/0x1b0 [ 1010.951430][T15731] memory_max_write+0x262/0x3a0 [ 1010.956282][T15731] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 1010.963046][T15731] ? lock_acquire+0x190/0x410 [ 1010.967719][T15731] ? kernfs_fop_write+0x227/0x480 [ 1010.972743][T15731] cgroup_file_write+0x241/0x790 [ 1010.977679][T15731] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 1010.984440][T15731] ? cgroup_migrate_add_task+0x890/0x890 [ 1010.990067][T15731] ? cgroup_migrate_add_task+0x890/0x890 [ 1010.995680][T15731] kernfs_fop_write+0x2b8/0x480 [ 1011.000527][T15731] __vfs_write+0x8a/0x110 [ 1011.004838][T15731] ? kernfs_fop_open+0xd80/0xd80 [ 1011.009759][T15731] vfs_write+0x268/0x5d0 [ 1011.013990][T15731] ksys_write+0x14f/0x290 [ 1011.018307][T15731] ? __ia32_sys_read+0xb0/0xb0 [ 1011.023057][T15731] ? do_syscall_64+0x26/0x760 [ 1011.027735][T15731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1011.033815][T15731] ? do_syscall_64+0x26/0x760 [ 1011.038490][T15731] __x64_sys_write+0x73/0xb0 [ 1011.043086][T15731] do_syscall_64+0xfa/0x760 [ 1011.047582][T15731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1011.053454][T15731] RIP: 0033:0x459a09 [ 1011.057333][T15731] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1011.077006][T15731] RSP: 002b:00007f61b5363c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1011.085401][T15731] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 1011.093361][T15731] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1011.101311][T15731] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1011.109263][T15731] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61b53646d4 [ 1011.117301][T15731] R13: 00000000004c9b8a R14: 00000000004e13d8 R15: 00000000ffffffff [ 1011.144586][T15731] memory: usage 5180kB, limit 0kB, failcnt 469056 [ 1011.156249][T15731] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1011.166686][T15731] Memory cgroup stats for /syz5: [ 1011.168151][T15731] anon 4308992 [ 1011.168151][T15731] file 69632 [ 1011.168151][T15731] kernel_stack 65536 [ 1011.168151][T15731] slab 655360 [ 1011.168151][T15731] sock 0 [ 1011.168151][T15731] shmem 0 [ 1011.168151][T15731] file_mapped 0 [ 1011.168151][T15731] file_dirty 0 [ 1011.168151][T15731] file_writeback 0 [ 1011.168151][T15731] anon_thp 4194304 [ 1011.168151][T15731] inactive_anon 0 [ 1011.168151][T15731] active_anon 4308992 [ 1011.168151][T15731] inactive_file 0 [ 1011.168151][T15731] active_file 61440 [ 1011.168151][T15731] unevictable 0 [ 1011.168151][T15731] slab_reclaimable 135168 [ 1011.168151][T15731] slab_unreclaimable 520192 [ 1011.168151][T15731] pgfault 71016 [ 1011.168151][T15731] pgmajfault 0 [ 1011.168151][T15731] workingset_refault 0 [ 1011.168151][T15731] workingset_activate 0 [ 1011.168151][T15731] workingset_nodereclaim 0 [ 1011.168151][T15731] pgrefill 171 [ 1011.168151][T15731] pgscan 183 [ 1011.168151][T15731] pgsteal 84 [ 1011.168151][T15731] pgactivate 66 [ 1011.277839][T15731] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15730,uid=0 [ 1011.300991][T15731] Memory cgroup out of memory: Killed process 15730 (syz-executor.5) total-vm:72712kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB [ 1011.323701][ T1065] oom_reaper: reaped process 15730 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 06:02:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000", 0x2f}], 0x1}, 0x0) 06:02:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x202020205346544e, 0x0) 06:02:33 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x48000000, 0x0) [ 1011.524827][T15723] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1011.573491][T15723] CPU: 0 PID: 15723 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1011.581087][T15723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.591153][T15723] Call Trace: [ 1011.594460][T15723] dump_stack+0x172/0x1f0 [ 1011.598814][T15723] dump_header+0x10b/0x82d [ 1011.603243][T15723] ? oom_kill_process+0x94/0x3f0 [ 1011.608204][T15723] oom_kill_process.cold+0x10/0x15 [ 1011.613344][T15723] out_of_memory+0x79a/0x12c0 [ 1011.618041][T15723] ? lock_downgrade+0x920/0x920 [ 1011.622908][T15723] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1011.628734][T15723] ? oom_killer_disable+0x280/0x280 [ 1011.633957][T15723] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1011.639511][T15723] ? PageTransHuge+0xc0/0xc0 [ 1011.644120][T15723] ? do_raw_spin_unlock+0x57/0x270 [ 1011.649235][T15723] ? _raw_spin_unlock+0x2d/0x50 [ 1011.654097][T15723] try_charge+0xf4b/0x1440 [ 1011.658543][T15723] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1011.664095][T15723] ? percpu_ref_tryget_live+0x111/0x290 [ 1011.669635][T15723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1011.676047][T15723] ? __kasan_check_read+0x11/0x20 [ 1011.681071][T15723] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1011.686608][T15723] mem_cgroup_try_charge+0x136/0x590 [ 1011.691882][T15723] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1011.698115][T15723] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1011.703864][T15723] wp_page_copy+0x41e/0x15e0 [ 1011.708445][T15723] ? find_held_lock+0x35/0x130 [ 1011.713207][T15723] ? pmd_pfn+0x1d0/0x1d0 [ 1011.717445][T15723] ? lock_downgrade+0x920/0x920 [ 1011.722291][T15723] ? swp_swapcount+0x540/0x540 [ 1011.727051][T15723] ? __kasan_check_read+0x11/0x20 [ 1011.732063][T15723] ? do_raw_spin_unlock+0x57/0x270 [ 1011.737167][T15723] do_wp_page+0x499/0x14d0 [ 1011.741575][T15723] ? finish_mkwrite_fault+0x570/0x570 [ 1011.746943][T15723] __handle_mm_fault+0x22c7/0x3ef0 [ 1011.752047][T15723] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1011.757700][T15723] ? __kasan_check_read+0x11/0x20 [ 1011.762737][T15723] handle_mm_fault+0x1b5/0x6b0 [ 1011.767514][T15723] __do_page_fault+0x536/0xdd0 [ 1011.772278][T15723] do_page_fault+0x38/0x590 [ 1011.776778][T15723] page_fault+0x39/0x40 [ 1011.780941][T15723] RIP: 0033:0x4034f2 [ 1011.784825][T15723] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 39 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 59 44 05 00 48 [ 1011.804411][T15723] RSP: 002b:00007ffee4b7bb60 EFLAGS: 00010246 [ 1011.810462][T15723] RAX: 0000000000000000 RBX: 00000000000f6c63 RCX: 0000000000413610 06:02:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1011.818430][T15723] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffee4b7cc90 [ 1011.826396][T15723] RBP: 0000000000000002 R08: 0000000000000001 R09: 00005555573e4940 [ 1011.834351][T15723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffee4b7cc90 [ 1011.842307][T15723] R13: 00007ffee4b7cc80 R14: 0000000000000000 R15: 00007ffee4b7cc90 06:02:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1011.953685][T15723] memory: usage 748kB, limit 0kB, failcnt 469064 [ 1011.980861][T15740] __ntfs_error: 8 callbacks suppressed [ 1011.980872][T15740] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1012.007780][T15723] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1012.042038][T15723] Memory cgroup stats for /syz5: [ 1012.042148][T15723] anon 45056 [ 1012.042148][T15723] file 69632 [ 1012.042148][T15723] kernel_stack 65536 [ 1012.042148][T15723] slab 655360 [ 1012.042148][T15723] sock 0 [ 1012.042148][T15723] shmem 0 [ 1012.042148][T15723] file_mapped 0 [ 1012.042148][T15723] file_dirty 0 [ 1012.042148][T15723] file_writeback 0 [ 1012.042148][T15723] anon_thp 0 [ 1012.042148][T15723] inactive_anon 0 [ 1012.042148][T15723] active_anon 45056 [ 1012.042148][T15723] inactive_file 0 [ 1012.042148][T15723] active_file 61440 [ 1012.042148][T15723] unevictable 0 [ 1012.042148][T15723] slab_reclaimable 135168 [ 1012.042148][T15723] slab_unreclaimable 520192 [ 1012.042148][T15723] pgfault 71016 06:02:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2300000000000000, 0x0) [ 1012.042148][T15723] pgmajfault 0 [ 1012.042148][T15723] workingset_refault 0 [ 1012.042148][T15723] workingset_activate 0 [ 1012.042148][T15723] workingset_nodereclaim 0 [ 1012.042148][T15723] pgrefill 171 [ 1012.042148][T15723] pgscan 183 [ 1012.042148][T15723] pgsteal 84 [ 1012.042148][T15723] pgactivate 66 06:02:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000", 0x2f}], 0x1}, 0x0) [ 1012.194750][T15740] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1012.290781][T15740] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 1012.326034][T15723] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15723,uid=0 [ 1012.348354][T15723] Memory cgroup out of memory: Killed process 15723 (syz-executor.5) total-vm:72448kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB 06:02:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1012.394834][ T1065] oom_reaper: reaped process 15723 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 06:02:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c0", 0x31}], 0x1}, 0x0) 06:02:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) 06:02:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:34 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2a04000000000000, 0x0) 06:02:34 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x4c000000, 0x0) 06:02:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c0", 0x31}], 0x1}, 0x0) 06:02:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1013.107413][T15795] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1013.116631][ C0] [ 1013.116635][ C0] ===================================== [ 1013.116638][ C0] WARNING: bad unlock balance detected! [ 1013.116645][ C0] 5.3.0+ #0 Not tainted [ 1013.116648][ C0] ------------------------------------- [ 1013.116656][ C0] syz-executor.0/15795 is trying to release lock (rcu_callback) at: [ 1013.116678][ C0] [] rcu_core+0x574/0x1560 06:02:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847b", 0x49}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/40, 0x28}, {&(0x7f0000000a40)=""/146, 0x92}], 0xa, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x3, 0x4}, {0x1, 0x4}, {0x7, 0x0, 0xffffffff}, {0x5, 0x1, 0x7}]}, @union={0x9, 0x5, 0x0, 0x5, 0x3515, 0x8, [{0xc, 0x3, 0xb5b}, {0xc}, {0xe, 0x4, 0xffff}, {0x10, 0x4, 0x7fff}, {0xa, 0x5, 0x6}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x4c, 0x1}, @ptr={0x3, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0xd1, 0x97, 0x1}, 0x20) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r5, 0x0, 0x0) [ 1013.116686][ C0] but there are no more locks to release! [ 1013.116689][ C0] [ 1013.116689][ C0] other info that might help us debug this: [ 1013.116696][ C0] 1 lock held by syz-executor.0/15795: [ 1013.116699][ C0] #0: ffff88809a552858 (&type->s_umount_key#48/1){+.+.}, at: alloc_super+0x158/0x890 [ 1013.116726][ C0] [ 1013.116726][ C0] stack backtrace: [ 1013.116738][ C0] CPU: 0 PID: 15795 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 1013.116744][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:02:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c0", 0x31}], 0x1}, 0x0) 06:02:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1013.116748][ C0] Call Trace: [ 1013.116752][ C0] [ 1013.116766][ C0] dump_stack+0x172/0x1f0 [ 1013.116777][ C0] ? rcu_core+0x574/0x1560 [ 1013.116791][ C0] print_unlock_imbalance_bug.cold+0x114/0x123 [ 1013.116801][ C0] ? rcu_core+0x574/0x1560 [ 1013.116812][ C0] lock_release+0x5f2/0x960 [ 1013.116823][ C0] ? __free_zapped_classes+0x242/0x310 [ 1013.116835][ C0] ? lock_downgrade+0x920/0x920 [ 1013.116849][ C0] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1013.116861][ C0] ? kmem_cache_free+0x1a7/0x320 [ 1013.116873][ C0] ? lockdep_unregister_key+0x4c0/0x4c0 [ 1013.116883][ C0] rcu_core+0x599/0x1560 [ 1013.116896][ C0] ? __rcu_read_unlock+0x6b0/0x6b0 [ 1013.116908][ C0] ? kvm_sched_clock_read+0x9/0x20 [ 1013.116922][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1013.116934][ C0] rcu_core_si+0x9/0x10 [ 1013.116947][ C0] __do_softirq+0x262/0x98c [ 1013.116958][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 1013.116972][ C0] irq_exit+0x19b/0x1e0 [ 1013.116983][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 1013.116995][ C0] apic_timer_interrupt+0xf/0x20 [ 1013.116999][ C0] [ 1013.117011][ C0] RIP: 0010:console_unlock+0xbc7/0xf10 [ 1013.117024][ C0] Code: f3 88 48 c1 e8 03 42 80 3c 30 00 0f 85 e4 02 00 00 48 83 3d 8a 54 97 07 00 0f 84 91 01 00 00 e8 6f cb 16 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 6d ff ff ff e8 5a cb 16 00 48 8b 7d 08 c7 05 1c [ 1013.117030][ C0] RSP: 0018:ffff8880a7d078f0 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 [ 1013.117041][ C0] RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc90005f4d000 [ 1013.117048][ C0] RDX: 0000000000021218 RSI: ffffffff815bc3e1 RDI: 0000000000000212 [ 1013.117055][ C0] RBP: ffff8880a7d07978 R08: ffff88808edb43c0 R09: fffffbfff11f407d [ 1013.117062][ C0] R10: fffffbfff11f407c R11: 0000000000000001 R12: 0000000000000000 [ 1013.117069][ C0] R13: ffffffff8436b230 R14: dffffc0000000000 R15: ffffffff895d6b10 [ 1013.117082][ C0] ? netconsole_netdev_event+0x2a0/0x2a0 [ 1013.117094][ C0] ? console_unlock+0xbc1/0xf10 [ 1013.117110][ C0] vprintk_emit+0x2a0/0x700 [ 1013.117122][ C0] vprintk_default+0x28/0x30 [ 1013.117133][ C0] vprintk_func+0x7e/0x189 [ 1013.117142][ C0] ? do_raw_spin_lock+0x2e0/0x2e0 [ 1013.117152][ C0] printk+0xba/0xed [ 1013.117164][ C0] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1013.117176][ C0] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1013.117187][ C0] ? ___ratelimit+0x60/0x595 [ 1013.117202][ C0] __ntfs_error.cold+0x91/0xc7 [ 1013.117213][ C0] ? __ntfs_warning+0x160/0x160 [ 1013.117227][ C0] ? __might_sleep+0x95/0x190 [ 1013.117240][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1013.117254][ C0] ntfs_fill_super+0x1a32/0x3160 [ 1013.117266][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1013.117279][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1013.117292][ C0] mount_bdev+0x304/0x3c0 [ 1013.117303][ C0] ? load_system_files+0x74e0/0x74e0 [ 1013.117315][ C0] ntfs_mount+0x35/0x40 [ 1013.117327][ C0] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 1013.117340][ C0] legacy_get_tree+0x108/0x220 [ 1013.117353][ C0] vfs_get_tree+0x8e/0x390 [ 1013.117366][ C0] do_mount+0x13b3/0x1c30 [ 1013.117380][ C0] ? copy_mount_string+0x40/0x40 [ 1013.117393][ C0] ? copy_mount_options+0x200/0x3f0 [ 1013.117405][ C0] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1013.117417][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1013.117428][ C0] ? copy_mount_options+0x2e8/0x3f0 [ 1013.117441][ C0] ksys_mount+0xdb/0x150 [ 1013.117455][ C0] __x64_sys_mount+0xbe/0x150 [ 1013.117469][ C0] do_syscall_64+0xfa/0x760 [ 1013.117481][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1013.117488][ C0] RIP: 0033:0x45c45a [ 1013.117499][ C0] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1013.117505][ C0] RSP: 002b:00007fc176489a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1013.117516][ C0] RAX: ffffffffffffffda RBX: 00007fc176489b40 RCX: 000000000045c45a [ 1013.117523][ C0] RDX: 00007fc176489ae0 RSI: 00000000200002c0 RDI: 00007fc176489b00 [ 1013.117529][ C0] RBP: 0000000000000000 R08: 00007fc176489b40 R09: 00007fc176489ae0 [ 1013.117536][ C0] R10: 000000004c000000 R11: 0000000000000206 R12: 0000000000000004 [ 1013.117543][ C0] R13: 00000000004c8c33 R14: 00000000004dfd10 R15: 00000000ffffffff [ 1013.633164][T15795] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1013.646940][T15796] kobject: 'loop2' (00000000a948a84f): kobject_uevent_env [ 1013.654137][T15795] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 1013.655139][T15796] kobject: 'loop2' (00000000a948a84f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1013.674495][ T3891] kobject: 'loop1' (0000000036166f0b): kobject_uevent_env [ 1013.693605][ T3891] kobject: 'loop1' (0000000036166f0b): fill_kobj_path: path = '/devices/virtual/block/loop1' 06:02:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1013.705171][T15796] kobject: 'loop2' (00000000a948a84f): kobject_uevent_env [ 1013.713585][T15796] kobject: 'loop2' (00000000a948a84f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1013.725614][ T3891] kobject: 'loop4' (00000000f181ffe5): kobject_uevent_env [ 1013.733597][ T3891] kobject: 'loop4' (00000000f181ffe5): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1013.773427][T15796] kobject: 'loop2' (00000000a948a84f): kobject_uevent_env [ 1013.781928][T15796] kobject: 'loop2' (00000000a948a84f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1013.811361][ T3891] kobject: 'loop3' (00000000b5356c01): kobject_uevent_env 06:02:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c001", 0x32}], 0x1}, 0x0) [ 1013.818538][ T3891] kobject: 'loop3' (00000000b5356c01): fill_kobj_path: path = '/devices/virtual/block/loop3' 06:02:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1013.855108][T15795] kobject: 'loop0' (000000006736cc1e): kobject_uevent_env [ 1013.878008][ T968] kobject: 'rx-0' (000000007360f12a): kobject_cleanup, parent 00000000b45c044a [ 1013.880733][T15795] kobject: 'loop0' (000000006736cc1e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1013.887018][ T968] kobject: 'rx-0' (000000007360f12a): auto cleanup 'remove' event [ 1013.887026][ T968] kobject: 'rx-0' (000000007360f12a): kobject_uevent_env [ 1013.887033][ T968] kobject: 'rx-0' (000000007360f12a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1013.887039][ T968] kobject: 'rx-0' (000000007360f12a): auto cleanup kobject_del [ 1013.887077][ T968] kobject: 'rx-0' (000000007360f12a): calling ktype release [ 1013.887082][ T968] kobject: 'rx-0': free name [ 1013.887120][ T968] kobject: 'tx-0' (00000000f75b181d): kobject_cleanup, parent 00000000b45c044a [ 1013.887127][ T968] kobject: 'tx-0' (00000000f75b181d): auto cleanup 'remove' event [ 1013.887133][ T968] kobject: 'tx-0' (00000000f75b181d): kobject_uevent_env [ 1013.887142][ T968] kobject: 'tx-0' (00000000f75b181d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1013.887147][ T968] kobject: 'tx-0' (00000000f75b181d): auto cleanup kobject_del [ 1013.887179][ T968] kobject: 'tx-0' (00000000f75b181d): calling ktype release 06:02:35 executing program 2: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x3f00000000000000, 0x0) 06:02:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) 06:02:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1014.050922][ T968] kobject: 'tx-0': free name [ 1014.055575][ T968] kobject: 'queues' (00000000b45c044a): kobject_cleanup, parent 00000000868f1c0f [ 1014.055970][ T3891] kobject: 'loop4' (00000000f181ffe5): kobject_uevent_env [ 1014.064789][ T968] kobject: 'queues' (00000000b45c044a): calling ktype release [ 1014.079255][ T968] kobject: 'queues' (00000000b45c044a): kset_release [ 1014.085981][ T968] kobject: 'queues': free name [ 1014.091137][ T968] kobject: 'ip6gre0' (00000000b605fd97): kobject_uevent_env [ 1014.098435][ T968] kobject: 'ip6gre0' (00000000b605fd97): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1014.110852][ T968] kobject: 'batman_adv' (00000000723ae55a): kobject_uevent_env [ 1014.118754][ T3891] kobject: 'loop4' (00000000f181ffe5): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1014.135234][ T968] kobject: 'batman_adv' (00000000723ae55a): kobject_uevent_env: filter function caused the event to drop! [ 1014.154059][T15829] kobject: 'loop2' (00000000a948a84f): kobject_uevent_env [ 1014.157753][ T968] kobject: 'batman_adv' (00000000723ae55a): kobject_cleanup, parent 00000000868f1c0f [ 1014.172060][ T3891] kobject: 'loop3' (00000000b5356c01): kobject_uevent_env [ 1014.175994][T15829] kobject: 'loop2' (00000000a948a84f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1014.179356][ T3891] kobject: 'loop3' (00000000b5356c01): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1014.224871][ T968] kobject: 'batman_adv' (00000000723ae55a): calling ktype release [ 1014.234049][ T3891] kobject: 'loop2' (00000000a948a84f): kobject_uevent_env [ 1014.235113][ T968] kobject: (00000000723ae55a): dynamic_kobj_release [ 1014.243509][ T3891] kobject: 'loop2' (00000000a948a84f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1014.248123][ T968] kobject: 'batman_adv': free name [ 1014.262518][T15829] kobject: 'loop2' (00000000a948a84f): kobject_uevent_env [ 1014.275063][ T968] kobject: 'rx-0' (00000000ba22e2bd): kobject_cleanup, parent 000000004cf05970 [ 1014.277578][ T3891] kobject: 'loop1' (0000000036166f0b): kobject_uevent_env [ 1014.293670][T15829] kobject: 'loop2' (00000000a948a84f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1014.295930][ T968] kobject: 'rx-0' (00000000ba22e2bd): auto cleanup 'remove' event [ 1014.304067][ T3891] kobject: 'loop1' (0000000036166f0b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1014.313097][ T968] kobject: 'rx-0' (00000000ba22e2bd): kobject_uevent_env [ 1014.328699][ T3891] kobject: 'loop3' (00000000b5356c01): kobject_uevent_env [ 1014.336346][ T3891] kobject: 'loop3' (00000000b5356c01): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1014.350802][ T968] kobject: 'rx-0' (00000000ba22e2bd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1014.359299][ T3891] kobject: 'loop4' (00000000f181ffe5): kobject_uevent_env [ 1014.368866][T15829] kobject: 'loop2' (00000000a948a84f): kobject_uevent_env [ 1014.376065][ T968] kobject: 'rx-0' (00000000ba22e2bd): auto cleanup kobject_del [ 1014.378616][T15829] kobject: 'loop2' (00000000a948a84f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1014.383678][ T968] kobject: 'rx-0' (00000000ba22e2bd): calling ktype release [ 1014.383684][ T968] kobject: 'rx-0': free name [ 1014.383722][ T968] kobject: 'tx-0' (00000000bc19a435): kobject_cleanup, parent 000000004cf05970 [ 1014.383729][ T968] kobject: 'tx-0' (00000000bc19a435): auto cleanup 'remove' event [ 1014.383736][ T968] kobject: 'tx-0' (00000000bc19a435): kobject_uevent_env [ 1014.383744][ T968] kobject: 'tx-0' (00000000bc19a435): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1014.383750][ T968] kobject: 'tx-0' (00000000bc19a435): auto cleanup kobject_del [ 1014.383784][ T968] kobject: 'tx-0' (00000000bc19a435): calling ktype release [ 1014.397459][ T3891] kobject: 'loop4' (00000000f181ffe5): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1014.406498][ T968] kobject: 'tx-0': free name [ 1014.473363][ T968] kobject: 'queues' (000000004cf05970): kobject_cleanup, parent 00000000868f1c0f [ 1014.488087][ T968] kobject: 'queues' (000000004cf05970): calling ktype release [ 1014.496117][ T968] kobject: 'queues' (000000004cf05970): kset_release [ 1014.503437][ T968] kobject: 'queues': free name [ 1014.508408][ T968] kobject: 'ip6gretap0' (00000000f1c6c533): kobject_uevent_env 06:02:36 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x68000000, 0x0) 06:02:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c0", 0x31}], 0x1}, 0x0) 06:02:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x0, 0x1, 0x800, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 1014.520115][ T968] kobject: 'ip6gretap0' (00000000f1c6c533): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1014.560220][ T8651] kobject: 'loop2' (00000000a948a84f): kobject_uevent_env [ 1014.567660][ T8651] kobject: 'loop2' (00000000a948a84f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1014.570228][ T968] kobject: 'ip6gre0' (00000000b605fd97): kobject_cleanup, parent 00000000868f1c0f [ 1014.601186][ T3891] kobject: 'loop0' (000000006736cc1e): kobject_uevent_env [ 1014.609813][ T968] kobject: 'ip6gre0' (00000000b605fd97): calling ktype release [ 1014.614379][ T3891] kobject: 'loop0' (000000006736cc1e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1014.623977][ T968] kobject: 'ip6gre0': free name [ 1014.671625][T15849] kobject: 'loop0' (000000006736cc1e): kobject_uevent_env [ 1014.674255][T15851] kobject: 'nfs_client' (00000000c9ab2bd2): kobject_add_internal: parent: 'net', set: 'nfs' [ 1014.678850][ T968] kobject: 'ip6gretap0' (00000000f1c6c533): kobject_cleanup, parent 00000000868f1c0f [ 1014.701263][T15849] kobject: 'loop0' (000000006736cc1e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1014.702252][T15851] kobject: 'nfs_client' (00000000c9ab2bd2): kobject_uevent_env [ 1014.727616][ T968] kobject: 'ip6gretap0' (00000000f1c6c533): calling ktype release [ 1014.728658][ T3891] kobject: 'loop3' (00000000b5356c01): kobject_uevent_env [ 1014.736005][ T968] kobject: 'ip6gretap0': free name [ 1014.747946][T15849] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1014.750338][T15851] kobject: 'nfs_client' (00000000c9ab2bd2): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 1014.761890][T15849] ntfs: (device loop0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1014.774572][ T3891] kobject: 'loop3' (00000000b5356c01): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1014.792059][T15851] IPVS: ftp: loaded support on port[0] = 21 [ 1014.814269][ T3891] kobject: 'loop1' (0000000036166f0b): kobject_uevent_env [ 1014.823399][ T3891] kobject: 'loop1' (0000000036166f0b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1014.840142][T15849] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. [ 1014.868242][ T968] kobject: 'rx-0' (000000002715513a): kobject_cleanup, parent 000000002c6780dc [ 1014.877386][ T968] kobject: 'rx-0' (000000002715513a): auto cleanup 'remove' event [ 1014.885201][ T968] kobject: 'rx-0' (000000002715513a): kobject_uevent_env [ 1014.892227][ T968] kobject: 'rx-0' (000000002715513a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1014.902985][ T968] kobject: 'rx-0' (000000002715513a): auto cleanup kobject_del [ 1014.910682][ T968] kobject: 'rx-0' (000000002715513a): calling ktype release [ 1014.917938][ T968] kobject: 'rx-0': free name [ 1014.922616][ T968] kobject: 'tx-0' (000000001a8e4535): kobject_cleanup, parent 000000002c6780dc [ 1014.931567][ T968] kobject: 'tx-0' (000000001a8e4535): auto cleanup 'remove' event [ 1014.939526][ T968] kobject: 'tx-0' (000000001a8e4535): kobject_uevent_env [ 1014.946553][ T968] kobject: 'tx-0' (000000001a8e4535): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1014.957323][ T968] kobject: 'tx-0' (000000001a8e4535): auto cleanup kobject_del [ 1014.964917][ T968] kobject: 'tx-0' (000000001a8e4535): calling ktype release [ 1014.972306][ T968] kobject: 'tx-0': free name [ 1014.976981][ T968] kobject: 'queues' (000000002c6780dc): kobject_cleanup, parent 00000000868f1c0f [ 1014.986101][ T968] kobject: 'queues' (000000002c6780dc): calling ktype release [ 1014.993579][ T968] kobject: 'queues' (000000002c6780dc): kset_release [ 1015.000431][ T968] kobject: 'queues': free name [ 1015.005388][T15849] kobject: 'loop0' (000000006736cc1e): kobject_uevent_env [ 1015.005515][ T968] kobject: 'ip6tnl0' (0000000077d851ea): kobject_uevent_env [ 1015.015135][T15849] kobject: 'loop0' (000000006736cc1e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1015.019795][ T968] kobject: 'ip6tnl0' (0000000077d851ea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1015.041462][T15851] kobject: 'lo' (000000009869268b): kobject_add_internal: parent: 'net', set: 'devices' [ 1015.051048][ T3891] kobject: 'loop0' (000000006736cc1e): kobject_uevent_env [ 1015.057742][T15851] kobject: 'lo' (000000009869268b): kobject_uevent_env [ 1015.058294][ T3891] kobject: 'loop0' (000000006736cc1e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1015.074259][T15851] kobject: 'lo' (000000009869268b): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1015.087510][T15851] kobject: 'queues' (000000008647437e): kobject_add_internal: parent: 'lo', set: '' [ 1015.091814][T15859] kobject: 'loop0' (000000006736cc1e): kobject_uevent_env [ 1015.098019][T15851] kobject: 'queues' (000000008647437e): kobject_uevent_env [ 1015.112476][T15851] kobject: 'queues' (000000008647437e): kobject_uevent_env: filter function caused the event to drop! [ 1015.115887][T15859] kobject: 'loop0' (000000006736cc1e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1015.126764][T15851] kobject: 'rx-0' (00000000362cabdd): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.145376][T15851] kobject: 'rx-0' (00000000362cabdd): kobject_uevent_env [ 1015.155085][T15851] kobject: 'rx-0' (00000000362cabdd): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1015.166110][T15851] kobject: 'tx-0' (00000000d8d2bd91): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.176439][T15851] kobject: 'tx-0' (00000000d8d2bd91): kobject_uevent_env [ 1015.184417][T15851] kobject: 'tx-0' (00000000d8d2bd91): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1015.196042][ T968] kobject: 'ip6tnl0' (0000000077d851ea): kobject_cleanup, parent 00000000868f1c0f [ 1015.196342][T15851] kobject: 'tunl0' (00000000af60162d): kobject_add_internal: parent: 'net', set: 'devices' [ 1015.215978][T15851] kobject: 'tunl0' (00000000af60162d): kobject_uevent_env [ 1015.215984][ T968] kobject: 'ip6tnl0' (0000000077d851ea): calling ktype release [ 1015.216003][ T968] kobject: 'ip6tnl0': free name [ 1015.223161][T15851] kobject: 'tunl0' (00000000af60162d): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1015.246222][T15851] kobject: 'queues' (00000000d4847dcf): kobject_add_internal: parent: 'tunl0', set: '' [ 1015.256422][T15851] kobject: 'queues' (00000000d4847dcf): kobject_uevent_env [ 1015.263651][T15851] kobject: 'queues' (00000000d4847dcf): kobject_uevent_env: filter function caused the event to drop! [ 1015.275164][T15851] kobject: 'rx-0' (00000000ece227da): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.285322][T15851] kobject: 'rx-0' (00000000ece227da): kobject_uevent_env [ 1015.292563][T15851] kobject: 'rx-0' (00000000ece227da): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1015.303581][T15851] kobject: 'tx-0' (000000003128bc91): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.313950][T15851] kobject: 'tx-0' (000000003128bc91): kobject_uevent_env [ 1015.321043][T15851] kobject: 'tx-0' (000000003128bc91): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1015.332674][T15851] kobject: 'gre0' (000000006a171f41): kobject_add_internal: parent: 'net', set: 'devices' [ 1015.343053][T15851] kobject: 'gre0' (000000006a171f41): kobject_uevent_env [ 1015.350125][T15851] kobject: 'gre0' (000000006a171f41): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1015.360050][T15851] kobject: 'queues' (0000000034111091): kobject_add_internal: parent: 'gre0', set: '' [ 1015.370227][T15851] kobject: 'queues' (0000000034111091): kobject_uevent_env [ 1015.377408][T15851] kobject: 'queues' (0000000034111091): kobject_uevent_env: filter function caused the event to drop! [ 1015.388374][T15851] kobject: 'rx-0' (00000000c785fa7d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.398494][T15851] kobject: 'rx-0' (00000000c785fa7d): kobject_uevent_env [ 1015.405560][T15851] kobject: 'rx-0' (00000000c785fa7d): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1015.416488][T15851] kobject: 'tx-0' (0000000019fd35ad): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.426668][T15851] kobject: 'tx-0' (0000000019fd35ad): kobject_uevent_env [ 1015.433741][T15851] kobject: 'tx-0' (0000000019fd35ad): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1015.460285][ T8644] kobject: 'loop0' (000000006736cc1e): kobject_uevent_env [ 1015.467548][ T8644] kobject: 'loop0' (000000006736cc1e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1015.479088][ T968] kobject: 'rx-0' (0000000038ede0c1): kobject_cleanup, parent 0000000090d8863c [ 1015.488095][ T968] kobject: 'rx-0' (0000000038ede0c1): auto cleanup 'remove' event [ 1015.492992][ T3891] kobject: 'loop0' (000000006736cc1e): kobject_uevent_env [ 1015.496275][ T968] kobject: 'rx-0' (0000000038ede0c1): kobject_uevent_env [ 1015.505443][ T3891] kobject: 'loop0' (000000006736cc1e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1015.511147][ T968] kobject: 'rx-0' (0000000038ede0c1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1015.531765][ T968] kobject: 'rx-0' (0000000038ede0c1): auto cleanup kobject_del [ 1015.539347][ T968] kobject: 'rx-0' (0000000038ede0c1): calling ktype release [ 1015.546786][ T968] kobject: 'rx-0': free name [ 1015.552409][ T968] kobject: 'tx-0' (00000000bc2cad74): kobject_cleanup, parent 0000000090d8863c [ 1015.561502][ T968] kobject: 'tx-0' (00000000bc2cad74): auto cleanup 'remove' event [ 1015.569333][ T968] kobject: 'tx-0' (00000000bc2cad74): kobject_uevent_env [ 1015.576533][ T968] kobject: 'tx-0' (00000000bc2cad74): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1015.587332][ T968] kobject: 'tx-0' (00000000bc2cad74): auto cleanup kobject_del [ 1015.594918][ T968] kobject: 'tx-0' (00000000bc2cad74): calling ktype release [ 1015.602327][ T968] kobject: 'tx-0': free name [ 1015.607109][ T968] kobject: 'queues' (0000000090d8863c): kobject_cleanup, parent 00000000868f1c0f [ 1015.616430][ T968] kobject: 'queues' (0000000090d8863c): calling ktype release [ 1015.623923][ T968] kobject: 'queues' (0000000090d8863c): kset_release [ 1015.630898][ T968] kobject: 'queues': free name [ 1015.635886][ T968] kobject: 'sit0' (00000000905389a8): kobject_uevent_env [ 1015.642921][ T968] kobject: 'sit0' (00000000905389a8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1015.654040][T15851] kobject: 'gretap0' (000000006ac47557): kobject_add_internal: parent: 'net', set: 'devices' [ 1015.665111][T15851] kobject: 'gretap0' (000000006ac47557): kobject_uevent_env [ 1015.672613][T15851] kobject: 'gretap0' (000000006ac47557): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 1015.683020][T15851] kobject: 'queues' (00000000bbf2e65e): kobject_add_internal: parent: 'gretap0', set: '' [ 1015.693410][T15851] kobject: 'queues' (00000000bbf2e65e): kobject_uevent_env [ 1015.700634][T15851] kobject: 'queues' (00000000bbf2e65e): kobject_uevent_env: filter function caused the event to drop! [ 1015.711656][T15851] kobject: 'rx-0' (000000009998f0b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.721816][T15851] kobject: 'rx-0' (000000009998f0b5): kobject_uevent_env [ 1015.728862][T15851] kobject: 'rx-0' (000000009998f0b5): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 1015.740152][T15851] kobject: 'tx-0' (0000000071144d7f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.750374][T15851] kobject: 'tx-0' (0000000071144d7f): kobject_uevent_env [ 1015.757443][T15851] kobject: 'tx-0' (0000000071144d7f): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 1015.769230][T15851] kobject: 'batman_adv' (0000000016136469): kobject_add_internal: parent: 'gretap0', set: '' [ 1015.780788][T15851] kobject: 'erspan0' (00000000d8ddc57f): kobject_add_internal: parent: 'net', set: 'devices' [ 1015.791389][T15851] kobject: 'erspan0' (00000000d8ddc57f): kobject_uevent_env [ 1015.798682][T15851] kobject: 'erspan0' (00000000d8ddc57f): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 1015.809119][T15851] kobject: 'queues' (0000000053e3405f): kobject_add_internal: parent: 'erspan0', set: '' [ 1015.819546][T15851] kobject: 'queues' (0000000053e3405f): kobject_uevent_env [ 1015.830846][T15851] kobject: 'queues' (0000000053e3405f): kobject_uevent_env: filter function caused the event to drop! [ 1015.841849][T15851] kobject: 'rx-0' (0000000042200d10): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.852041][T15851] kobject: 'rx-0' (0000000042200d10): kobject_uevent_env [ 1015.859123][T15851] kobject: 'rx-0' (0000000042200d10): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 1015.870555][T15851] kobject: 'tx-0' (000000000acfd7b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.880886][T15851] kobject: 'tx-0' (000000000acfd7b2): kobject_uevent_env [ 1015.888315][T15851] kobject: 'tx-0' (000000000acfd7b2): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 1015.900169][T15851] kobject: 'batman_adv' (0000000041700634): kobject_add_internal: parent: 'erspan0', set: '' [ 1015.911334][ T968] kobject: 'sit0' (00000000905389a8): kobject_cleanup, parent 00000000868f1c0f [ 1015.911513][T15851] kobject: 'ip_vti0' (00000000a449d748): kobject_add_internal: parent: 'net', set: 'devices' [ 1015.922708][ T968] kobject: 'sit0' (00000000905389a8): calling ktype release [ 1015.931093][T15851] kobject: 'ip_vti0' (00000000a449d748): kobject_uevent_env [ 1015.937879][ T968] kobject: 'sit0': free name [ 1015.945094][T15851] kobject: 'ip_vti0' (00000000a449d748): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 1015.945188][T15851] kobject: 'queues' (00000000c4ece1e3): kobject_add_internal: parent: 'ip_vti0', set: '' [ 1015.970643][T15851] kobject: 'queues' (00000000c4ece1e3): kobject_uevent_env [ 1015.977825][T15851] kobject: 'queues' (00000000c4ece1e3): kobject_uevent_env: filter function caused the event to drop! [ 1015.988814][T15851] kobject: 'rx-0' (000000000fbd15e8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1015.998940][T15851] kobject: 'rx-0' (000000000fbd15e8): kobject_uevent_env [ 1016.006012][T15851] kobject: 'rx-0' (000000000fbd15e8): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1016.017195][T15851] kobject: 'tx-0' (00000000d3fcb18c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.027385][T15851] kobject: 'tx-0' (00000000d3fcb18c): kobject_uevent_env [ 1016.034478][T15851] kobject: 'tx-0' (00000000d3fcb18c): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 1016.068835][ T968] kobject: 'rx-0' (00000000f0d2f814): kobject_cleanup, parent 000000006ebb058e [ 1016.077906][ T968] kobject: 'rx-0' (00000000f0d2f814): auto cleanup 'remove' event [ 1016.085751][ T968] kobject: 'rx-0' (00000000f0d2f814): kobject_uevent_env [ 1016.092795][ T968] kobject: 'rx-0' (00000000f0d2f814): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1016.103767][ T968] kobject: 'rx-0' (00000000f0d2f814): auto cleanup kobject_del [ 1016.111752][ T968] kobject: 'rx-0' (00000000f0d2f814): calling ktype release [ 1016.119025][ T968] kobject: 'rx-0': free name [ 1016.123675][ T968] kobject: 'tx-0' (00000000872bc013): kobject_cleanup, parent 000000006ebb058e [ 1016.132804][ T968] kobject: 'tx-0' (00000000872bc013): auto cleanup 'remove' event [ 1016.140612][ T968] kobject: 'tx-0' (00000000872bc013): kobject_uevent_env [ 1016.147774][ T968] kobject: 'tx-0' (00000000872bc013): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1016.158540][ T968] kobject: 'tx-0' (00000000872bc013): auto cleanup kobject_del [ 1016.166121][ T968] kobject: 'tx-0' (00000000872bc013): calling ktype release [ 1016.173408][ T968] kobject: 'tx-0': free name [ 1016.178005][ T968] kobject: 'queues' (000000006ebb058e): kobject_cleanup, parent 00000000868f1c0f [ 1016.187144][ T968] kobject: 'queues' (000000006ebb058e): calling ktype release [ 1016.194960][ T968] kobject: 'queues' (000000006ebb058e): kset_release [ 1016.201691][ T968] kobject: 'queues': free name [ 1016.206723][ T968] kobject: 'ip6_vti0' (00000000325ae778): kobject_uevent_env [ 1016.214157][ T968] kobject: 'ip6_vti0' (00000000325ae778): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1016.225578][T15851] kobject: 'ip6_vti0' (000000002ffbb8ab): kobject_add_internal: parent: 'net', set: 'devices' [ 1016.236534][T15851] kobject: 'ip6_vti0' (000000002ffbb8ab): kobject_uevent_env [ 1016.243985][T15851] kobject: 'ip6_vti0' (000000002ffbb8ab): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 1016.254591][T15851] kobject: 'queues' (000000002f5e7e9c): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 1016.265047][T15851] kobject: 'queues' (000000002f5e7e9c): kobject_uevent_env [ 1016.272255][T15851] kobject: 'queues' (000000002f5e7e9c): kobject_uevent_env: filter function caused the event to drop! [ 1016.283942][T15851] kobject: 'rx-0' (00000000e17ff767): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.294162][T15851] kobject: 'rx-0' (00000000e17ff767): kobject_uevent_env [ 1016.303071][T15851] kobject: 'rx-0' (00000000e17ff767): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 1016.314387][T15851] kobject: 'tx-0' (00000000f9f84725): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.324646][T15851] kobject: 'tx-0' (00000000f9f84725): kobject_uevent_env [ 1016.331706][T15851] kobject: 'tx-0' (00000000f9f84725): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 1016.343855][ T968] kobject: 'ip6_vti0' (00000000325ae778): kobject_cleanup, parent 00000000868f1c0f [ 1016.343969][T15851] kobject: 'sit0' (00000000622909de): kobject_add_internal: parent: 'net', set: 'devices' [ 1016.355771][ T968] kobject: 'ip6_vti0' (00000000325ae778): calling ktype release [ 1016.363790][T15851] kobject: 'sit0' (00000000622909de): kobject_uevent_env [ 1016.373160][ T968] kobject: 'ip6_vti0': free name [ 1016.377821][T15851] kobject: 'sit0' (00000000622909de): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 1016.392643][T15851] kobject: 'queues' (000000007c11a2e1): kobject_add_internal: parent: 'sit0', set: '' [ 1016.403249][T15851] kobject: 'queues' (000000007c11a2e1): kobject_uevent_env [ 1016.410560][T15851] kobject: 'queues' (000000007c11a2e1): kobject_uevent_env: filter function caused the event to drop! [ 1016.421998][T15851] kobject: 'rx-0' (0000000010ba3f28): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.432601][T15851] kobject: 'rx-0' (0000000010ba3f28): kobject_uevent_env [ 1016.439619][T15851] kobject: 'rx-0' (0000000010ba3f28): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 1016.450587][T15851] kobject: 'tx-0' (000000001380228e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.460955][T15851] kobject: 'tx-0' (000000001380228e): kobject_uevent_env [ 1016.467994][T15851] kobject: 'tx-0' (000000001380228e): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 1016.502182][ T968] kobject: 'rx-0' (000000002f4c22a7): kobject_cleanup, parent 00000000ee9e104b [ 1016.512082][ T968] kobject: 'rx-0' (000000002f4c22a7): auto cleanup 'remove' event [ 1016.519883][ T968] kobject: 'rx-0' (000000002f4c22a7): kobject_uevent_env [ 1016.527135][ T968] kobject: 'rx-0' (000000002f4c22a7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1016.538393][ T968] kobject: 'rx-0' (000000002f4c22a7): auto cleanup kobject_del [ 1016.546016][ T968] kobject: 'rx-0' (000000002f4c22a7): calling ktype release [ 1016.553781][ T968] kobject: 'rx-0': free name [ 1016.558383][ T968] kobject: 'tx-0' (000000007d5b488c): kobject_cleanup, parent 00000000ee9e104b [ 1016.567612][ T968] kobject: 'tx-0' (000000007d5b488c): auto cleanup 'remove' event [ 1016.575653][ T968] kobject: 'tx-0' (000000007d5b488c): kobject_uevent_env [ 1016.582967][ T968] kobject: 'tx-0' (000000007d5b488c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1016.593893][ T968] kobject: 'tx-0' (000000007d5b488c): auto cleanup kobject_del [ 1016.602131][ T968] kobject: 'tx-0' (000000007d5b488c): calling ktype release [ 1016.609490][ T968] kobject: 'tx-0': free name [ 1016.614144][ T968] kobject: 'queues' (00000000ee9e104b): kobject_cleanup, parent 00000000868f1c0f [ 1016.623294][ T968] kobject: 'queues' (00000000ee9e104b): calling ktype release [ 1016.630861][ T968] kobject: 'queues' (00000000ee9e104b): kset_release [ 1016.637531][ T968] kobject: 'queues': free name [ 1016.642586][ T968] kobject: 'ip_vti0' (000000000827f4aa): kobject_uevent_env [ 1016.649858][ T968] kobject: 'ip_vti0' (000000000827f4aa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1016.661181][T15851] kobject: 'ip6tnl0' (000000001a04d8b7): kobject_add_internal: parent: 'net', set: 'devices' [ 1016.672024][T15851] kobject: 'ip6tnl0' (000000001a04d8b7): kobject_uevent_env [ 1016.679331][T15851] kobject: 'ip6tnl0' (000000001a04d8b7): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 1016.689768][T15851] kobject: 'queues' (00000000fbfbe62e): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 1016.700375][T15851] kobject: 'queues' (00000000fbfbe62e): kobject_uevent_env [ 1016.707574][T15851] kobject: 'queues' (00000000fbfbe62e): kobject_uevent_env: filter function caused the event to drop! [ 1016.718573][T15851] kobject: 'rx-0' (000000000964c090): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.728854][T15851] kobject: 'rx-0' (000000000964c090): kobject_uevent_env [ 1016.735966][T15851] kobject: 'rx-0' (000000000964c090): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 1016.747160][T15851] kobject: 'tx-0' (0000000083b95201): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.757667][T15851] kobject: 'tx-0' (0000000083b95201): kobject_uevent_env [ 1016.764751][T15851] kobject: 'tx-0' (0000000083b95201): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 1016.776549][ T968] kobject: 'ip_vti0' (000000000827f4aa): kobject_cleanup, parent 00000000868f1c0f [ 1016.776685][T15851] kobject: 'ip6gre0' (000000000c3fd9a7): kobject_add_internal: parent: 'net', set: 'devices' [ 1016.787934][ T968] kobject: 'ip_vti0' (000000000827f4aa): calling ktype release [ 1016.796559][T15851] kobject: 'ip6gre0' (000000000c3fd9a7): kobject_uevent_env [ 1016.805981][ T968] kobject: 'ip_vti0': free name [ 1016.810862][T15851] kobject: 'ip6gre0' (000000000c3fd9a7): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 1016.826204][T15851] kobject: 'queues' (00000000ce0245f7): kobject_add_internal: parent: 'ip6gre0', set: '' [ 1016.836858][T15851] kobject: 'queues' (00000000ce0245f7): kobject_uevent_env [ 1016.844494][T15851] kobject: 'queues' (00000000ce0245f7): kobject_uevent_env: filter function caused the event to drop! [ 1016.855641][T15851] kobject: 'rx-0' (00000000467290c6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.865771][T15851] kobject: 'rx-0' (00000000467290c6): kobject_uevent_env [ 1016.872858][T15851] kobject: 'rx-0' (00000000467290c6): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 1016.884069][T15851] kobject: 'tx-0' (0000000068a924fc): kobject_add_internal: parent: 'queues', set: 'queues' [ 1016.894380][T15851] kobject: 'tx-0' (0000000068a924fc): kobject_uevent_env [ 1016.901445][T15851] kobject: 'tx-0' (0000000068a924fc): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 1016.938322][ T968] kobject: 'batman_adv' (00000000556fae9b): kobject_uevent_env [ 1016.947258][ T968] kobject: 'batman_adv' (00000000556fae9b): kobject_uevent_env: filter function caused the event to drop! [ 1016.958768][ T968] kobject: 'batman_adv' (00000000556fae9b): kobject_cleanup, parent 00000000868f1c0f [ 1016.968256][ T968] kobject: 'batman_adv' (00000000556fae9b): calling ktype release [ 1016.976098][ T968] kobject: (00000000556fae9b): dynamic_kobj_release [ 1016.983110][ T968] kobject: 'batman_adv': free name [ 1016.988582][ T968] kobject: 'rx-0' (00000000670c0439): kobject_cleanup, parent 00000000b237f8ad [ 1016.998043][ T968] kobject: 'rx-0' (00000000670c0439): auto cleanup 'remove' event [ 1017.005906][ T968] kobject: 'rx-0' (00000000670c0439): kobject_uevent_env [ 1017.013486][ T968] kobject: 'rx-0' (00000000670c0439): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1017.024251][ T968] kobject: 'rx-0' (00000000670c0439): auto cleanup kobject_del [ 1017.031854][ T968] kobject: 'rx-0' (00000000670c0439): calling ktype release [ 1017.039806][ T968] kobject: 'rx-0': free name [ 1017.044448][ T968] kobject: 'tx-0' (000000003df5cf69): kobject_cleanup, parent 00000000b237f8ad [ 1017.053440][ T968] kobject: 'tx-0' (000000003df5cf69): auto cleanup 'remove' event [ 1017.061269][ T968] kobject: 'tx-0' (000000003df5cf69): kobject_uevent_env [ 1017.068292][ T968] kobject: 'tx-0' (000000003df5cf69): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1017.079067][ T968] kobject: 'tx-0' (000000003df5cf69): auto cleanup kobject_del [ 1017.086656][ T968] kobject: 'tx-0' (000000003df5cf69): calling ktype release [ 1017.093948][ T968] kobject: 'tx-0': free name [ 1017.098544][ T968] kobject: 'queues' (00000000b237f8ad): kobject_cleanup, parent 00000000868f1c0f [ 1017.107869][ T968] kobject: 'queues' (00000000b237f8ad): calling ktype release [ 1017.115356][ T968] kobject: 'queues' (00000000b237f8ad): kset_release [ 1017.122052][ T968] kobject: 'queues': free name [ 1017.127024][ T968] kobject: 'erspan0' (0000000007a96e57): kobject_uevent_env [ 1017.134353][ T968] kobject: 'erspan0' (0000000007a96e57): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1017.145706][T15851] kobject: 'syz_tun' (00000000829bb100): kobject_add_internal: parent: 'net', set: 'devices' [ 1017.156948][T15851] kobject: 'syz_tun' (00000000829bb100): kobject_uevent_env [ 1017.164310][T15851] kobject: 'syz_tun' (00000000829bb100): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 1017.174706][T15851] kobject: 'queues' (00000000d6715e1e): kobject_add_internal: parent: 'syz_tun', set: '' [ 1017.185053][T15851] kobject: 'queues' (00000000d6715e1e): kobject_uevent_env [ 1017.192261][T15851] kobject: 'queues' (00000000d6715e1e): kobject_uevent_env: filter function caused the event to drop! [ 1017.203220][T15851] kobject: 'rx-0' (00000000f32a594d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1017.213336][T15851] kobject: 'rx-0' (00000000f32a594d): kobject_uevent_env [ 1017.221168][T15851] kobject: 'rx-0' (00000000f32a594d): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 1017.232376][T15851] kobject: 'tx-0' (00000000ab754c1a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1017.242518][T15851] kobject: 'tx-0' (00000000ab754c1a): kobject_uevent_env [ 1017.249528][T15851] kobject: 'tx-0' (00000000ab754c1a): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 1017.261255][T15851] kobject: 'batman_adv' (00000000ed4f482e): kobject_add_internal: parent: 'syz_tun', set: '' [ 1017.272300][ T968] kobject: 'erspan0' (0000000007a96e57): kobject_cleanup, parent 00000000868f1c0f [ 1017.276457][T15851] kobject: 'ip6gretap0' (000000008a3558f7): kobject_add_internal: parent: 'net', set: 'devices' [ 1017.284565][ T968] kobject: 'erspan0' (0000000007a96e57): calling ktype release [ 1017.293138][T15851] kobject: 'ip6gretap0' (000000008a3558f7): kobject_uevent_env [ 1017.302139][ T968] kobject: 'erspan0': free name [ 1017.314700][T15851] kobject: 'ip6gretap0' (000000008a3558f7): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 1017.328870][T15851] kobject: 'queues' (00000000a3dca942): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 1017.340095][T15851] kobject: 'queues' (00000000a3dca942): kobject_uevent_env [ 1017.347294][T15851] kobject: 'queues' (00000000a3dca942): kobject_uevent_env: filter function caused the event to drop! [ 1017.358432][T15851] kobject: 'rx-0' (00000000552eb238): kobject_add_internal: parent: 'queues', set: 'queues' [ 1017.368643][T15851] kobject: 'rx-0' (00000000552eb238): kobject_uevent_env [ 1017.376319][T15851] kobject: 'rx-0' (00000000552eb238): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 1017.387803][T15851] kobject: 'tx-0' (000000000405c00e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1017.397989][T15851] kobject: 'tx-0' (000000000405c00e): kobject_uevent_env [ 1017.405043][T15851] kobject: 'tx-0' (000000000405c00e): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 1017.417003][T15851] kobject: 'batman_adv' (000000001d64f61d): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 1017.450385][ T968] kobject: 'batman_adv' (000000009d72246f): kobject_uevent_env [ 1017.457972][ T968] kobject: 'batman_adv' (000000009d72246f): kobject_uevent_env: filter function caused the event to drop! [ 1017.469462][ T968] kobject: 'batman_adv' (000000009d72246f): kobject_cleanup, parent 00000000868f1c0f [ 1017.481692][ T968] kobject: 'batman_adv' (000000009d72246f): calling ktype release [ 1017.489493][ T968] kobject: (000000009d72246f): dynamic_kobj_release [ 1017.496383][ T968] kobject: 'batman_adv': free name [ 1017.501892][ T968] kobject: 'rx-0' (00000000c7704f92): kobject_cleanup, parent 0000000088aa036c [ 1017.510977][ T968] kobject: 'rx-0' (00000000c7704f92): auto cleanup 'remove' event [ 1017.518779][ T968] kobject: 'rx-0' (00000000c7704f92): kobject_uevent_env [ 1017.525836][ T968] kobject: 'rx-0' (00000000c7704f92): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1017.536625][ T968] kobject: 'rx-0' (00000000c7704f92): auto cleanup kobject_del [ 1017.544216][ T968] kobject: 'rx-0' (00000000c7704f92): calling ktype release [ 1017.551538][ T968] kobject: 'rx-0': free name [ 1017.556226][ T968] kobject: 'tx-0' (000000008bc2aac2): kobject_cleanup, parent 0000000088aa036c [ 1017.565225][ T968] kobject: 'tx-0' (000000008bc2aac2): auto cleanup 'remove' event [ 1017.573127][ T968] kobject: 'tx-0' (000000008bc2aac2): kobject_uevent_env [ 1017.580191][ T968] kobject: 'tx-0' (000000008bc2aac2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1017.590969][ T968] kobject: 'tx-0' (000000008bc2aac2): auto cleanup kobject_del [ 1017.598640][ T968] kobject: 'tx-0' (000000008bc2aac2): calling ktype release [ 1017.606064][ T968] kobject: 'tx-0': free name [ 1017.612431][ T968] kobject: 'queues' (0000000088aa036c): kobject_cleanup, parent 00000000868f1c0f [ 1017.621632][ T968] kobject: 'queues' (0000000088aa036c): calling ktype release [ 1017.629081][ T968] kobject: 'queues' (0000000088aa036c): kset_release [ 1017.635846][ T968] kobject: 'queues': free name [ 1017.641091][ T968] kobject: 'gretap0' (0000000048604115): kobject_uevent_env [ 1017.648352][ T968] kobject: 'gretap0' (0000000048604115): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1017.659851][T15851] kobject: 'bridge0' (00000000883335ac): kobject_add_internal: parent: 'net', set: 'devices' [ 1017.670448][T15851] kobject: 'bridge0' (00000000883335ac): kobject_uevent_env [ 1017.677739][T15851] kobject: 'bridge0' (00000000883335ac): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 1017.688203][T15851] kobject: 'queues' (00000000f4d300a4): kobject_add_internal: parent: 'bridge0', set: '' [ 1017.698588][T15851] kobject: 'queues' (00000000f4d300a4): kobject_uevent_env [ 1017.705987][T15851] kobject: 'queues' (00000000f4d300a4): kobject_uevent_env: filter function caused the event to drop! [ 1017.717153][T15851] kobject: 'rx-0' (000000004f96a81c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1017.727286][T15851] kobject: 'rx-0' (000000004f96a81c): kobject_uevent_env [ 1017.734377][T15851] kobject: 'rx-0' (000000004f96a81c): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 1017.745885][T15851] kobject: 'tx-0' (000000002a72b7b3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1017.756182][T15851] kobject: 'tx-0' (000000002a72b7b3): kobject_uevent_env [ 1017.763448][T15851] kobject: 'tx-0' (000000002a72b7b3): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 1017.775578][T15851] kobject: 'brif' (0000000021b23cb6): kobject_add_internal: parent: 'bridge0', set: '' [ 1017.785947][T15851] kobject: 'batman_adv' (0000000082d33742): kobject_add_internal: parent: 'bridge0', set: '' [ 1017.796963][ T968] kobject: 'gretap0' (0000000048604115): kobject_cleanup, parent 00000000868f1c0f [ 1017.797225][T15851] kobject: 'vcan0' (00000000d2196f19): kobject_add_internal: parent: 'net', set: 'devices' [ 1017.809075][ T968] kobject: 'gretap0' (0000000048604115): calling ktype release [ 1017.816822][T15851] kobject: 'vcan0' (00000000d2196f19): kobject_uevent_env [ 1017.826198][ T968] kobject: 'gretap0': free name [ 1017.830929][T15851] kobject: 'vcan0' (00000000d2196f19): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 1017.845874][T15851] kobject: 'queues' (00000000b92d2977): kobject_add_internal: parent: 'vcan0', set: '' [ 1017.856072][T15851] kobject: 'queues' (00000000b92d2977): kobject_uevent_env [ 1017.863275][T15851] kobject: 'queues' (00000000b92d2977): kobject_uevent_env: filter function caused the event to drop! [ 1017.874506][T15851] kobject: 'rx-0' (00000000335677ca): kobject_add_internal: parent: 'queues', set: 'queues' [ 1017.884648][T15851] kobject: 'rx-0' (00000000335677ca): kobject_uevent_env [ 1017.891744][T15851] kobject: 'rx-0' (00000000335677ca): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 1017.902774][T15851] kobject: 'tx-0' (0000000046cafc3d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1017.913019][T15851] kobject: 'tx-0' (0000000046cafc3d): kobject_uevent_env [ 1017.920083][T15851] kobject: 'tx-0' (0000000046cafc3d): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 1017.952928][ T968] kobject: 'rx-0' (00000000aeb70a54): kobject_cleanup, parent 00000000dd860723 [ 1017.961922][ T968] kobject: 'rx-0' (00000000aeb70a54): auto cleanup 'remove' event [ 1017.969736][ T968] kobject: 'rx-0' (00000000aeb70a54): kobject_uevent_env [ 1017.976866][ T968] kobject: 'rx-0' (00000000aeb70a54): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1017.987633][ T968] kobject: 'rx-0' (00000000aeb70a54): auto cleanup kobject_del [ 1017.995249][ T968] kobject: 'rx-0' (00000000aeb70a54): calling ktype release [ 1018.002734][ T968] kobject: 'rx-0': free name [ 1018.007334][ T968] kobject: 'tx-0' (000000004be78ca2): kobject_cleanup, parent 00000000dd860723 [ 1018.016317][ T968] kobject: 'tx-0' (000000004be78ca2): auto cleanup 'remove' event [ 1018.024306][ T968] kobject: 'tx-0' (000000004be78ca2): kobject_uevent_env [ 1018.031355][ T968] kobject: 'tx-0' (000000004be78ca2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1018.042121][ T968] kobject: 'tx-0' (000000004be78ca2): auto cleanup kobject_del [ 1018.049672][ T968] kobject: 'tx-0' (000000004be78ca2): calling ktype release [ 1018.056971][ T968] kobject: 'tx-0': free name [ 1018.061599][ T968] kobject: 'queues' (00000000dd860723): kobject_cleanup, parent 00000000868f1c0f [ 1018.070725][ T968] kobject: 'queues' (00000000dd860723): calling ktype release [ 1018.078251][ T968] kobject: 'queues' (00000000dd860723): kset_release [ 1018.084954][ T968] kobject: 'queues': free name [ 1018.089914][ T968] kobject: 'gre0' (00000000fcafc3af): kobject_uevent_env [ 1018.096951][ T968] kobject: 'gre0' (00000000fcafc3af): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1018.108270][T15851] kobject: 'bond0' (00000000bf7f7add): kobject_add_internal: parent: 'net', set: 'devices' [ 1018.118969][T15851] kobject: 'bond0' (00000000bf7f7add): kobject_uevent_env [ 1018.126116][T15851] kobject: 'bond0' (00000000bf7f7add): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 1018.136440][T15851] kobject: 'queues' (0000000015498e70): kobject_add_internal: parent: 'bond0', set: '' [ 1018.146642][T15851] kobject: 'queues' (0000000015498e70): kobject_uevent_env [ 1018.153880][T15851] kobject: 'queues' (0000000015498e70): kobject_uevent_env: filter function caused the event to drop! [ 1018.164843][T15851] kobject: 'rx-0' (00000000b79e476f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.174957][T15851] kobject: 'rx-0' (00000000b79e476f): kobject_uevent_env [ 1018.182456][T15851] kobject: 'rx-0' (00000000b79e476f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 1018.193735][T15851] kobject: 'rx-1' (00000000ec9f53c4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.203884][T15851] kobject: 'rx-1' (00000000ec9f53c4): kobject_uevent_env [ 1018.210971][T15851] kobject: 'rx-1' (00000000ec9f53c4): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 1018.222000][T15851] kobject: 'rx-2' (000000002526b0b1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.232897][T15851] kobject: 'rx-2' (000000002526b0b1): kobject_uevent_env [ 1018.239918][T15851] kobject: 'rx-2' (000000002526b0b1): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 1018.250943][T15851] kobject: 'rx-3' (00000000e363f24d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.262043][T15851] kobject: 'rx-3' (00000000e363f24d): kobject_uevent_env [ 1018.269077][T15851] kobject: 'rx-3' (00000000e363f24d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 1018.280315][T15851] kobject: 'rx-4' (000000009f1a013c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.290472][T15851] kobject: 'rx-4' (000000009f1a013c): kobject_uevent_env [ 1018.297606][T15851] kobject: 'rx-4' (000000009f1a013c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 1018.308659][T15851] kobject: 'rx-5' (0000000022732ba0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.318861][T15851] kobject: 'rx-5' (0000000022732ba0): kobject_uevent_env [ 1018.325937][T15851] kobject: 'rx-5' (0000000022732ba0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 1018.337042][T15851] kobject: 'rx-6' (00000000ecf84f69): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.347351][T15851] kobject: 'rx-6' (00000000ecf84f69): kobject_uevent_env [ 1018.354434][T15851] kobject: 'rx-6' (00000000ecf84f69): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 1018.365461][T15851] kobject: 'rx-7' (000000004ad63595): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.375792][T15851] kobject: 'rx-7' (000000004ad63595): kobject_uevent_env [ 1018.382862][T15851] kobject: 'rx-7' (000000004ad63595): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 1018.394078][T15851] kobject: 'rx-8' (00000000f58fd401): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.404774][T15851] kobject: 'rx-8' (00000000f58fd401): kobject_uevent_env [ 1018.411928][T15851] kobject: 'rx-8' (00000000f58fd401): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 1018.422963][T15851] kobject: 'rx-9' (00000000c5b9bea4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.433169][T15851] kobject: 'rx-9' (00000000c5b9bea4): kobject_uevent_env [ 1018.440247][T15851] kobject: 'rx-9' (00000000c5b9bea4): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 1018.451282][T15851] kobject: 'rx-10' (000000003db3e3de): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.461523][T15851] kobject: 'rx-10' (000000003db3e3de): kobject_uevent_env [ 1018.468644][T15851] kobject: 'rx-10' (000000003db3e3de): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 1018.479869][T15851] kobject: 'rx-11' (000000003afc6903): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.490144][T15851] kobject: 'rx-11' (000000003afc6903): kobject_uevent_env [ 1018.497278][T15851] kobject: 'rx-11' (000000003afc6903): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 1018.508539][T15851] kobject: 'rx-12' (0000000064aa04af): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.519769][T15851] kobject: 'rx-12' (0000000064aa04af): kobject_uevent_env [ 1018.527252][T15851] kobject: 'rx-12' (0000000064aa04af): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 1018.538497][T15851] kobject: 'rx-13' (00000000a9842a41): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.549498][T15851] kobject: 'rx-13' (00000000a9842a41): kobject_uevent_env [ 1018.556694][T15851] kobject: 'rx-13' (00000000a9842a41): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 1018.567884][T15851] kobject: 'rx-14' (000000003a307631): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.583631][T15851] kobject: 'rx-14' (000000003a307631): kobject_uevent_env [ 1018.590891][T15851] kobject: 'rx-14' (000000003a307631): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 1018.602353][T15851] kobject: 'rx-15' (000000002d70cd27): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.612618][T15851] kobject: 'rx-15' (000000002d70cd27): kobject_uevent_env [ 1018.619776][T15851] kobject: 'rx-15' (000000002d70cd27): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 1018.631004][T15851] kobject: 'tx-0' (0000000021bb8ffc): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.641359][T15851] kobject: 'tx-0' (0000000021bb8ffc): kobject_uevent_env [ 1018.648484][T15851] kobject: 'tx-0' (0000000021bb8ffc): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 1018.659617][T15851] kobject: 'tx-1' (0000000083a6504d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.670123][T15851] kobject: 'tx-1' (0000000083a6504d): kobject_uevent_env [ 1018.677179][T15851] kobject: 'tx-1' (0000000083a6504d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 1018.688226][T15851] kobject: 'tx-2' (000000008456d5d7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.698406][T15851] kobject: 'tx-2' (000000008456d5d7): kobject_uevent_env [ 1018.705477][T15851] kobject: 'tx-2' (000000008456d5d7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 1018.716763][T15851] kobject: 'tx-3' (00000000b6bedb43): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.727146][T15851] kobject: 'tx-3' (00000000b6bedb43): kobject_uevent_env [ 1018.734203][T15851] kobject: 'tx-3' (00000000b6bedb43): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 1018.745310][T15851] kobject: 'tx-4' (000000001aaf84a0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.755489][T15851] kobject: 'tx-4' (000000001aaf84a0): kobject_uevent_env [ 1018.762563][T15851] kobject: 'tx-4' (000000001aaf84a0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 1018.773653][T15851] kobject: 'tx-5' (00000000e744953d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.783875][T15851] kobject: 'tx-5' (00000000e744953d): kobject_uevent_env [ 1018.790963][T15851] kobject: 'tx-5' (00000000e744953d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 1018.802018][T15851] kobject: 'tx-6' (000000006a0f5be0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.812231][T15851] kobject: 'tx-6' (000000006a0f5be0): kobject_uevent_env [ 1018.819264][T15851] kobject: 'tx-6' (000000006a0f5be0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 1018.830352][T15851] kobject: 'tx-7' (000000000425be8c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.840603][T15851] kobject: 'tx-7' (000000000425be8c): kobject_uevent_env [ 1018.847814][T15851] kobject: 'tx-7' (000000000425be8c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 1018.858840][T15851] kobject: 'tx-8' (00000000d527fcaf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.869013][T15851] kobject: 'tx-8' (00000000d527fcaf): kobject_uevent_env [ 1018.876084][T15851] kobject: 'tx-8' (00000000d527fcaf): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 1018.887084][T15851] kobject: 'tx-9' (00000000f01fce7d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.897292][T15851] kobject: 'tx-9' (00000000f01fce7d): kobject_uevent_env [ 1018.904353][T15851] kobject: 'tx-9' (00000000f01fce7d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 1018.915407][T15851] kobject: 'tx-10' (00000000e9d7b964): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.925679][T15851] kobject: 'tx-10' (00000000e9d7b964): kobject_uevent_env [ 1018.932982][T15851] kobject: 'tx-10' (00000000e9d7b964): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 1018.944285][T15851] kobject: 'tx-11' (00000000a7b2353c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.954588][T15851] kobject: 'tx-11' (00000000a7b2353c): kobject_uevent_env [ 1018.961767][T15851] kobject: 'tx-11' (00000000a7b2353c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 1018.972986][T15851] kobject: 'tx-12' (00000000aca6b082): kobject_add_internal: parent: 'queues', set: 'queues' [ 1018.983235][T15851] kobject: 'tx-12' (00000000aca6b082): kobject_uevent_env [ 1018.990462][T15851] kobject: 'tx-12' (00000000aca6b082): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 1019.001683][T15851] kobject: 'tx-13' (00000000855fe9d5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.011975][T15851] kobject: 'tx-13' (00000000855fe9d5): kobject_uevent_env [ 1019.019093][T15851] kobject: 'tx-13' (00000000855fe9d5): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 1019.030306][T15851] kobject: 'tx-14' (00000000cf39b863): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.040612][T15851] kobject: 'tx-14' (00000000cf39b863): kobject_uevent_env [ 1019.047745][T15851] kobject: 'tx-14' (00000000cf39b863): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 1019.058943][T15851] kobject: 'tx-15' (000000006bff298d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.069191][T15851] kobject: 'tx-15' (000000006bff298d): kobject_uevent_env [ 1019.076342][T15851] kobject: 'tx-15' (000000006bff298d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 1019.088008][T15851] kobject: 'batman_adv' (0000000092f103b7): kobject_add_internal: parent: 'bond0', set: '' [ 1019.098954][ T968] kobject: 'gre0' (00000000fcafc3af): kobject_cleanup, parent 00000000868f1c0f [ 1019.108423][T15851] kobject: 'team0' (0000000035813dff): kobject_add_internal: parent: 'net', set: 'devices' [ 1019.110076][ T968] kobject: 'gre0' (00000000fcafc3af): calling ktype release [ 1019.119058][T15851] kobject: 'team0' (0000000035813dff): kobject_uevent_env [ 1019.128262][ T968] kobject: 'gre0': free name [ 1019.132879][T15851] kobject: 'team0' (0000000035813dff): fill_kobj_path: path = '/devices/virtual/net/team0' [ 1019.147464][T15851] kobject: 'queues' (000000000ea2e96e): kobject_add_internal: parent: 'team0', set: '' [ 1019.157748][T15851] kobject: 'queues' (000000000ea2e96e): kobject_uevent_env [ 1019.164958][T15851] kobject: 'queues' (000000000ea2e96e): kobject_uevent_env: filter function caused the event to drop! [ 1019.175931][T15851] kobject: 'rx-0' (00000000ed386f21): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.186043][T15851] kobject: 'rx-0' (00000000ed386f21): kobject_uevent_env [ 1019.193099][T15851] kobject: 'rx-0' (00000000ed386f21): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-0' [ 1019.204094][T15851] kobject: 'rx-1' (000000000a7c47f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.214210][T15851] kobject: 'rx-1' (000000000a7c47f8): kobject_uevent_env [ 1019.221281][T15851] kobject: 'rx-1' (000000000a7c47f8): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-1' [ 1019.232407][T15851] kobject: 'rx-2' (0000000056a42f67): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.242542][T15851] kobject: 'rx-2' (0000000056a42f67): kobject_uevent_env [ 1019.249573][T15851] kobject: 'rx-2' (0000000056a42f67): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-2' [ 1019.260719][T15851] kobject: 'rx-3' (0000000090ad4cbd): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.270846][T15851] kobject: 'rx-3' (0000000090ad4cbd): kobject_uevent_env [ 1019.277861][T15851] kobject: 'rx-3' (0000000090ad4cbd): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-3' [ 1019.288894][T15851] kobject: 'rx-4' (00000000384cdb91): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.299015][T15851] kobject: 'rx-4' (00000000384cdb91): kobject_uevent_env [ 1019.306095][T15851] kobject: 'rx-4' (00000000384cdb91): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-4' [ 1019.317082][T15851] kobject: 'rx-5' (0000000095cf9d0f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.327224][T15851] kobject: 'rx-5' (0000000095cf9d0f): kobject_uevent_env [ 1019.334275][T15851] kobject: 'rx-5' (0000000095cf9d0f): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-5' [ 1019.345289][T15851] kobject: 'rx-6' (00000000bf64486d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.355394][T15851] kobject: 'rx-6' (00000000bf64486d): kobject_uevent_env [ 1019.362468][T15851] kobject: 'rx-6' (00000000bf64486d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-6' [ 1019.373463][T15851] kobject: 'rx-7' (00000000577f3456): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.383598][T15851] kobject: 'rx-7' (00000000577f3456): kobject_uevent_env [ 1019.390741][T15851] kobject: 'rx-7' (00000000577f3456): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-7' [ 1019.401775][T15851] kobject: 'rx-8' (00000000d4741bf0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.411878][T15851] kobject: 'rx-8' (00000000d4741bf0): kobject_uevent_env [ 1019.418909][T15851] kobject: 'rx-8' (00000000d4741bf0): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-8' [ 1019.429998][T15851] kobject: 'rx-9' (00000000c7443bde): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.440145][T15851] kobject: 'rx-9' (00000000c7443bde): kobject_uevent_env [ 1019.447282][T15851] kobject: 'rx-9' (00000000c7443bde): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-9' [ 1019.458323][T15851] kobject: 'rx-10' (00000000843d13f0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.468531][T15851] kobject: 'rx-10' (00000000843d13f0): kobject_uevent_env [ 1019.475689][T15851] kobject: 'rx-10' (00000000843d13f0): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-10' [ 1019.486880][T15851] kobject: 'rx-11' (0000000020fb3a4c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.497099][T15851] kobject: 'rx-11' (0000000020fb3a4c): kobject_uevent_env [ 1019.504246][T15851] kobject: 'rx-11' (0000000020fb3a4c): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-11' [ 1019.515464][T15851] kobject: 'rx-12' (00000000f998a1e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.525688][T15851] kobject: 'rx-12' (00000000f998a1e0): kobject_uevent_env [ 1019.532840][T15851] kobject: 'rx-12' (00000000f998a1e0): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-12' [ 1019.544784][T15851] kobject: 'rx-13' (000000007e9c9645): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.555605][T15851] kobject: 'rx-13' (000000007e9c9645): kobject_uevent_env [ 1019.562800][T15851] kobject: 'rx-13' (000000007e9c9645): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-13' [ 1019.573973][T15851] kobject: 'rx-14' (000000008f5d3e01): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.584197][T15851] kobject: 'rx-14' (000000008f5d3e01): kobject_uevent_env [ 1019.591957][T15851] kobject: 'rx-14' (000000008f5d3e01): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-14' [ 1019.603156][T15851] kobject: 'rx-15' (00000000ad19a7a6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.613370][T15851] kobject: 'rx-15' (00000000ad19a7a6): kobject_uevent_env [ 1019.620530][T15851] kobject: 'rx-15' (00000000ad19a7a6): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-15' [ 1019.631712][T15851] kobject: 'tx-0' (00000000465adc53): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.641904][T15851] kobject: 'tx-0' (00000000465adc53): kobject_uevent_env [ 1019.648941][T15851] kobject: 'tx-0' (00000000465adc53): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-0' [ 1019.660026][T15851] kobject: 'tx-1' (000000000ecf2326): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.670217][T15851] kobject: 'tx-1' (000000000ecf2326): kobject_uevent_env [ 1019.677236][T15851] kobject: 'tx-1' (000000000ecf2326): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-1' [ 1019.688270][T15851] kobject: 'tx-2' (000000005e3c68f6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.698437][T15851] kobject: 'tx-2' (000000005e3c68f6): kobject_uevent_env [ 1019.705539][T15851] kobject: 'tx-2' (000000005e3c68f6): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-2' [ 1019.716593][T15851] kobject: 'tx-3' (00000000e872bcc4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.726814][T15851] kobject: 'tx-3' (00000000e872bcc4): kobject_uevent_env [ 1019.733871][T15851] kobject: 'tx-3' (00000000e872bcc4): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-3' [ 1019.744883][T15851] kobject: 'tx-4' (0000000006301469): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.755041][T15851] kobject: 'tx-4' (0000000006301469): kobject_uevent_env [ 1019.762109][T15851] kobject: 'tx-4' (0000000006301469): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-4' [ 1019.773096][T15851] kobject: 'tx-5' (000000003609a0b0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.783376][T15851] kobject: 'tx-5' (000000003609a0b0): kobject_uevent_env [ 1019.790424][T15851] kobject: 'tx-5' (000000003609a0b0): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-5' [ 1019.801440][T15851] kobject: 'tx-6' (0000000004910e18): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.811599][T15851] kobject: 'tx-6' (0000000004910e18): kobject_uevent_env [ 1019.818635][T15851] kobject: 'tx-6' (0000000004910e18): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-6' [ 1019.829660][T15851] kobject: 'tx-7' (0000000035a6a268): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.839812][T15851] kobject: 'tx-7' (0000000035a6a268): kobject_uevent_env [ 1019.846869][T15851] kobject: 'tx-7' (0000000035a6a268): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-7' [ 1019.857869][T15851] kobject: 'tx-8' (00000000e735663b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.868060][T15851] kobject: 'tx-8' (00000000e735663b): kobject_uevent_env [ 1019.875171][T15851] kobject: 'tx-8' (00000000e735663b): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-8' [ 1019.886183][T15851] kobject: 'tx-9' (000000003244f022): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.896348][T15851] kobject: 'tx-9' (000000003244f022): kobject_uevent_env [ 1019.903406][T15851] kobject: 'tx-9' (000000003244f022): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-9' [ 1019.914398][T15851] kobject: 'tx-10' (00000000347eae78): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.924678][T15851] kobject: 'tx-10' (00000000347eae78): kobject_uevent_env [ 1019.931815][T15851] kobject: 'tx-10' (00000000347eae78): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-10' [ 1019.943018][T15851] kobject: 'tx-11' (00000000676872ec): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.953537][T15851] kobject: 'tx-11' (00000000676872ec): kobject_uevent_env [ 1019.960693][T15851] kobject: 'tx-11' (00000000676872ec): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-11' [ 1019.971862][T15851] kobject: 'tx-12' (00000000422147b1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1019.982133][T15851] kobject: 'tx-12' (00000000422147b1): kobject_uevent_env [ 1019.989255][T15851] kobject: 'tx-12' (00000000422147b1): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-12' [ 1020.000466][T15851] kobject: 'tx-13' (0000000045e5cfab): kobject_add_internal: parent: 'queues', set: 'queues' [ 1020.010746][T15851] kobject: 'tx-13' (0000000045e5cfab): kobject_uevent_env [ 1020.017848][T15851] kobject: 'tx-13' (0000000045e5cfab): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-13' [ 1020.029048][T15851] kobject: 'tx-14' (0000000076c299be): kobject_add_internal: parent: 'queues', set: 'queues' [ 1020.039297][T15851] kobject: 'tx-14' (0000000076c299be): kobject_uevent_env [ 1020.046445][T15851] kobject: 'tx-14' (0000000076c299be): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-14' [ 1020.057663][T15851] kobject: 'tx-15' (000000007d432b0a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1020.067942][T15851] kobject: 'tx-15' (000000007d432b0a): kobject_uevent_env [ 1020.075084][T15851] kobject: 'tx-15' (000000007d432b0a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-15' [ 1020.086799][T15851] kobject: 'batman_adv' (000000008ba3117c): kobject_add_internal: parent: 'team0', set: '' [ 1020.119440][ T968] kobject: 'rx-0' (00000000a1e541c1): kobject_cleanup, parent 000000007248c8ed [ 1020.128586][ T968] kobject: 'rx-0' (00000000a1e541c1): auto cleanup 'remove' event [ 1020.136443][ T968] kobject: 'rx-0' (00000000a1e541c1): kobject_uevent_env [ 1020.143507][ T968] kobject: 'rx-0' (00000000a1e541c1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1020.154308][ T968] kobject: 'rx-0' (00000000a1e541c1): auto cleanup kobject_del [ 1020.161897][ T968] kobject: 'rx-0' (00000000a1e541c1): calling ktype release [ 1020.169170][ T968] kobject: 'rx-0': free name [ 1020.173840][ T968] kobject: 'tx-0' (00000000064d9f18): kobject_cleanup, parent 000000007248c8ed [ 1020.182792][ T968] kobject: 'tx-0' (00000000064d9f18): auto cleanup 'remove' event [ 1020.190719][ T968] kobject: 'tx-0' (00000000064d9f18): kobject_uevent_env [ 1020.197730][ T968] kobject: 'tx-0' (00000000064d9f18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1020.208507][ T968] kobject: 'tx-0' (00000000064d9f18): auto cleanup kobject_del [ 1020.216305][ T968] kobject: 'tx-0' (00000000064d9f18): calling ktype release [ 1020.223625][ T968] kobject: 'tx-0': free name [ 1020.228228][ T968] kobject: 'queues' (000000007248c8ed): kobject_cleanup, parent 00000000868f1c0f [ 1020.237356][ T968] kobject: 'queues' (000000007248c8ed): calling ktype release [ 1020.244826][ T968] kobject: 'queues' (000000007248c8ed): kset_release [ 1020.251546][ T968] kobject: 'queues': free name [ 1020.256514][ T968] kobject: 'tunl0' (00000000a6bfd9cf): kobject_uevent_env [ 1020.263666][ T968] kobject: 'tunl0' (00000000a6bfd9cf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1020.275475][T15851] kobject: 'dummy0' (00000000a1489334): kobject_add_internal: parent: 'net', set: 'devices' [ 1020.286318][T15851] kobject: 'dummy0' (00000000a1489334): kobject_uevent_env [ 1020.293583][T15851] kobject: 'dummy0' (00000000a1489334): fill_kobj_path: path = '/devices/virtual/net/dummy0' [ 1020.303976][T15851] kobject: 'queues' (0000000066a2b555): kobject_add_internal: parent: 'dummy0', set: '' [ 1020.314611][T15851] kobject: 'queues' (0000000066a2b555): kobject_uevent_env [ 1020.321841][T15851] kobject: 'queues' (0000000066a2b555): kobject_uevent_env: filter function caused the event to drop! [ 1020.332829][T15851] kobject: 'rx-0' (00000000f3392e9f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1020.342952][T15851] kobject: 'rx-0' (00000000f3392e9f): kobject_uevent_env [ 1020.350047][T15851] kobject: 'rx-0' (00000000f3392e9f): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/rx-0' [ 1020.361144][T15851] kobject: 'tx-0' (0000000002e79a07): kobject_add_internal: parent: 'queues', set: 'queues' [ 1020.371350][T15851] kobject: 'tx-0' (0000000002e79a07): kobject_uevent_env [ 1020.378383][T15851] kobject: 'tx-0' (0000000002e79a07): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/tx-0' [ 1020.390047][T15851] kobject: 'batman_adv' (00000000e578edb8): kobject_add_internal: parent: 'dummy0', set: '' [ 1020.400963][ T968] kobject: 'tunl0' (00000000a6bfd9cf): kobject_cleanup, parent 00000000868f1c0f [ 1020.401246][T15851] kobject: 'nlmon0' (000000007543e866): kobject_add_internal: parent: 'net', set: 'devices' [ 1020.412530][ T968] kobject: 'tunl0' (00000000a6bfd9cf): calling ktype release [ 1020.420723][T15851] kobject: 'nlmon0' (000000007543e866): kobject_uevent_env [ 1020.427626][ T968] kobject: 'tunl0': free name [ 1020.434739][T15851] kobject: 'nlmon0' (000000007543e866): fill_kobj_path: path = '/devices/virtual/net/nlmon0' [ 1020.434829][T15851] kobject: 'queues' (00000000f21ee401): kobject_add_internal: parent: 'nlmon0', set: '' [ 1020.459891][T15851] kobject: 'queues' (00000000f21ee401): kobject_uevent_env [ 1020.467670][T15851] kobject: 'queues' (00000000f21ee401): kobject_uevent_env: filter function caused the event to drop! [ 1020.478721][T15851] kobject: 'rx-0' (00000000084e80a3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1020.488871][T15851] kobject: 'rx-0' (00000000084e80a3): kobject_uevent_env [ 1020.495997][T15851] kobject: 'rx-0' (00000000084e80a3): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/rx-0' [ 1020.507174][T15851] kobject: 'tx-0' (00000000cb579248): kobject_add_internal: parent: 'queues', set: 'queues' [ 1020.517490][T15851] kobject: 'tx-0' (00000000cb579248): kobject_uevent_env [ 1020.524556][T15851] kobject: 'tx-0' (00000000cb579248): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/tx-0' [ 1020.536535][ T968] kobject: 'mesh' (000000009b32a138): kobject_uevent_env [ 1020.544872][ T968] kobject: 'mesh' (000000009b32a138): kobject_uevent_env: filter function caused the event to drop! [ 1020.555748][ T968] device bridge_slave_1 left promiscuous mode [ 1020.562185][ T968] bridge0: port 2(bridge_slave_1) entered disabled state [ 1020.630590][ T968] kobject: 'brport' (000000006ff8a731): kobject_uevent_env [ 1020.637809][ T968] kobject: 'brport' (000000006ff8a731): kobject_uevent_env: filter function caused the event to drop! [ 1020.650377][ T968] device bridge_slave_0 left promiscuous mode [ 1020.656556][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 1020.690128][ C0] kobject: 'brport' (000000006ff8a731): kobject_cleanup, parent 00000000868f1c0f [ 1020.699254][ C0] kobject: 'brport' (000000006ff8a731): calling ktype release [ 1020.706728][ C0] kobject: 'brport': free name [ 1020.731018][ T968] kobject: 'brport' (0000000045dfc4d5): kobject_uevent_env [ 1020.738258][ T968] kobject: 'brport' (0000000045dfc4d5): kobject_uevent_env: filter function caused the event to drop! [ 1020.749556][ T968] kobject: 'brif' (00000000c7c4251a): kobject_cleanup, parent 0000000069f60732 [ 1020.758522][ T968] kobject: 'brif' (00000000c7c4251a): auto cleanup kobject_del [ 1020.766108][ T968] kobject: 'brif' (00000000c7c4251a): calling ktype release [ 1020.773411][ T968] kobject: (00000000c7c4251a): dynamic_kobj_release [ 1020.780018][ T968] kobject: 'brif': free name [ 1020.820028][ C1] kobject: 'brport' (0000000045dfc4d5): kobject_cleanup, parent 00000000868f1c0f [ 1020.829164][ C1] kobject: 'brport' (0000000045dfc4d5): calling ktype release [ 1020.836658][ C1] kobject: 'brport': free name [ 1021.234102][ T968] kobject: 'vlan0' (00000000aaff3d0c): kobject_uevent_env [ 1021.241594][ T968] kobject: 'vlan0' (00000000aaff3d0c): kobject_uevent_env: attempted to send uevent without kset! [ 1021.252243][ T968] kobject: 'mesh' (000000009b32a138): kobject_cleanup, parent 00000000868f1c0f [ 1021.261305][ T968] kobject: 'mesh' (000000009b32a138): calling ktype release [ 1021.268594][ T968] kobject: (000000009b32a138): dynamic_kobj_release [ 1021.275229][ T968] kobject: 'mesh': free name [ 1021.279820][ T968] kobject: 'vlan0' (00000000aaff3d0c): kobject_cleanup, parent 00000000868f1c0f [ 1021.290860][ T968] kobject: 'vlan0' (00000000aaff3d0c): calling ktype release [ 1021.298226][ T968] kobject: (00000000aaff3d0c): dynamic_kobj_release [ 1021.304905][ T968] kobject: 'vlan0': free name [ 1021.457406][ T968] kobject: 'batman_adv' (00000000c0d440ab): kobject_uevent_env [ 1021.465060][ T968] kobject: 'batman_adv' (00000000c0d440ab): kobject_uevent_env: filter function caused the event to drop! [ 1021.476372][ T968] kobject: 'batman_adv' (00000000c0d440ab): kobject_cleanup, parent 00000000868f1c0f [ 1021.485969][ T968] kobject: 'batman_adv' (00000000c0d440ab): calling ktype release [ 1021.493797][ T968] kobject: (00000000c0d440ab): dynamic_kobj_release [ 1021.500413][ T968] kobject: 'batman_adv': free name [ 1021.551250][ T968] device hsr_slave_0 left promiscuous mode [ 1021.600131][ T968] device hsr_slave_1 left promiscuous mode [ 1021.670186][ T968] kobject: 'rx-0' (00000000ffd09bab): kobject_cleanup, parent 0000000031a0af0b [ 1021.679157][ T968] kobject: 'rx-0' (00000000ffd09bab): auto cleanup 'remove' event [ 1021.687024][ T968] kobject: 'rx-0' (00000000ffd09bab): kobject_uevent_env [ 1021.694069][ T968] kobject: 'rx-0' (00000000ffd09bab): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1021.704851][ T968] kobject: 'rx-0' (00000000ffd09bab): auto cleanup kobject_del [ 1021.712429][ T968] kobject: 'rx-0' (00000000ffd09bab): calling ktype release [ 1021.719681][ T968] kobject: 'rx-0': free name [ 1021.724317][ T968] kobject: 'tx-0' (000000009ba03c6b): kobject_cleanup, parent 0000000031a0af0b [ 1021.733259][ T968] kobject: 'tx-0' (000000009ba03c6b): auto cleanup 'remove' event [ 1021.741070][ T968] kobject: 'tx-0' (000000009ba03c6b): kobject_uevent_env [ 1021.748072][ T968] kobject: 'tx-0' (000000009ba03c6b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1021.758945][ T968] kobject: 'tx-0' (000000009ba03c6b): auto cleanup kobject_del [ 1021.766615][ T968] kobject: 'tx-0' (000000009ba03c6b): calling ktype release [ 1021.773907][ T968] kobject: 'tx-0': free name [ 1021.778503][ T968] kobject: 'queues' (0000000031a0af0b): kobject_cleanup, parent 00000000868f1c0f [ 1021.787785][ T968] kobject: 'queues' (0000000031a0af0b): calling ktype release [ 1021.795250][ T968] kobject: 'queues' (0000000031a0af0b): kset_release [ 1021.801936][ T968] kobject: 'queues': free name [ 1021.809958][ T968] kobject: 'hsr0' (0000000055b4ee50): kobject_uevent_env [ 1021.817009][ T968] kobject: 'hsr0' (0000000055b4ee50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1021.828359][ T968] kobject: 'batman_adv' (0000000037665b84): kobject_uevent_env [ 1021.835929][ T968] kobject: 'batman_adv' (0000000037665b84): kobject_uevent_env: filter function caused the event to drop! [ 1021.847302][ T968] kobject: 'batman_adv' (0000000037665b84): kobject_cleanup, parent 00000000868f1c0f [ 1021.856773][ T968] kobject: 'batman_adv' (0000000037665b84): calling ktype release [ 1021.864583][ T968] kobject: (0000000037665b84): dynamic_kobj_release [ 1021.871187][ T968] kobject: 'batman_adv': free name [ 1021.876404][ T968] kobject: 'rx-0' (00000000b4a7b3bb): kobject_cleanup, parent 000000007793ddb9 [ 1021.885344][ T968] kobject: 'rx-0' (00000000b4a7b3bb): auto cleanup 'remove' event [ 1021.893152][ T968] kobject: 'rx-0' (00000000b4a7b3bb): kobject_uevent_env [ 1021.900178][ T968] kobject: 'rx-0' (00000000b4a7b3bb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1021.910952][ T968] kobject: 'rx-0' (00000000b4a7b3bb): auto cleanup kobject_del [ 1021.918514][ T968] kobject: 'rx-0' (00000000b4a7b3bb): calling ktype release [ 1021.925977][ T968] kobject: 'rx-0': free name [ 1021.930624][ T968] kobject: 'tx-0' (0000000046e418f6): kobject_cleanup, parent 000000007793ddb9 [ 1021.939549][ T968] kobject: 'tx-0' (0000000046e418f6): auto cleanup 'remove' event [ 1021.947729][ T968] kobject: 'tx-0' (0000000046e418f6): kobject_uevent_env [ 1021.954830][ T968] kobject: 'tx-0' (0000000046e418f6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1021.965641][ T968] kobject: 'tx-0' (0000000046e418f6): auto cleanup kobject_del [ 1021.973230][ T968] kobject: 'tx-0' (0000000046e418f6): calling ktype release [ 1021.980530][ T968] kobject: 'tx-0': free name [ 1021.985138][ T968] kobject: 'queues' (000000007793ddb9): kobject_cleanup, parent 00000000868f1c0f [ 1021.994249][ T968] kobject: 'queues' (000000007793ddb9): calling ktype release [ 1022.001709][ T968] kobject: 'queues' (000000007793ddb9): kset_release [ 1022.008360][ T968] kobject: 'queues': free name [ 1022.013403][ T968] kobject: 'hsr_slave_1' (00000000ca1a16ad): kobject_uevent_env [ 1022.021306][ T968] kobject: 'hsr_slave_1' (00000000ca1a16ad): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.033375][ T968] kobject: 'batman_adv' (00000000c7e45d12): kobject_uevent_env [ 1022.040926][ T968] kobject: 'batman_adv' (00000000c7e45d12): kobject_uevent_env: filter function caused the event to drop! [ 1022.052234][ T968] kobject: 'batman_adv' (00000000c7e45d12): kobject_cleanup, parent 00000000868f1c0f [ 1022.061694][ T968] kobject: 'batman_adv' (00000000c7e45d12): calling ktype release [ 1022.069466][ T968] kobject: (00000000c7e45d12): dynamic_kobj_release [ 1022.076079][ T968] kobject: 'batman_adv': free name [ 1022.081300][ T968] kobject: 'rx-0' (000000003bc24b8d): kobject_cleanup, parent 0000000029512dae [ 1022.090260][ T968] kobject: 'rx-0' (000000003bc24b8d): auto cleanup 'remove' event [ 1022.098069][ T968] kobject: 'rx-0' (000000003bc24b8d): kobject_uevent_env [ 1022.105253][ T968] kobject: 'rx-0' (000000003bc24b8d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.116044][ T968] kobject: 'rx-0' (000000003bc24b8d): auto cleanup kobject_del [ 1022.123964][ T968] kobject: 'rx-0' (000000003bc24b8d): calling ktype release [ 1022.131249][ T968] kobject: 'rx-0': free name [ 1022.135853][ T968] kobject: 'tx-0' (00000000dee0d454): kobject_cleanup, parent 0000000029512dae [ 1022.144790][ T968] kobject: 'tx-0' (00000000dee0d454): auto cleanup 'remove' event [ 1022.152640][ T968] kobject: 'tx-0' (00000000dee0d454): kobject_uevent_env [ 1022.159656][ T968] kobject: 'tx-0' (00000000dee0d454): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.170418][ T968] kobject: 'tx-0' (00000000dee0d454): auto cleanup kobject_del [ 1022.177976][ T968] kobject: 'tx-0' (00000000dee0d454): calling ktype release [ 1022.185271][ T968] kobject: 'tx-0': free name [ 1022.189857][ T968] kobject: 'queues' (0000000029512dae): kobject_cleanup, parent 00000000868f1c0f [ 1022.199099][ T968] kobject: 'queues' (0000000029512dae): calling ktype release [ 1022.206582][ T968] kobject: 'queues' (0000000029512dae): kset_release [ 1022.213262][ T968] kobject: 'queues': free name [ 1022.218191][ T968] kobject: 'veth1_to_hsr' (00000000f91925a2): kobject_uevent_env [ 1022.225924][ T968] kobject: 'veth1_to_hsr' (00000000f91925a2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.239911][ T968] kobject: 'batman_adv' (0000000039740642): kobject_uevent_env [ 1022.247695][ T968] kobject: 'batman_adv' (0000000039740642): kobject_uevent_env: filter function caused the event to drop! [ 1022.259137][ T968] kobject: 'batman_adv' (0000000039740642): kobject_cleanup, parent 00000000868f1c0f [ 1022.268675][ T968] kobject: 'batman_adv' (0000000039740642): calling ktype release [ 1022.276486][ T968] kobject: (0000000039740642): dynamic_kobj_release [ 1022.283087][ T968] kobject: 'batman_adv': free name [ 1022.288276][ T968] kobject: 'rx-0' (000000001eafab47): kobject_cleanup, parent 000000008994051b [ 1022.297233][ T968] kobject: 'rx-0' (000000001eafab47): auto cleanup 'remove' event [ 1022.305043][ T968] kobject: 'rx-0' (000000001eafab47): kobject_uevent_env [ 1022.312074][ T968] kobject: 'rx-0' (000000001eafab47): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.322857][ T968] kobject: 'rx-0' (000000001eafab47): auto cleanup kobject_del [ 1022.330441][ T968] kobject: 'rx-0' (000000001eafab47): calling ktype release [ 1022.338055][ T968] kobject: 'rx-0': free name [ 1022.342720][ T968] kobject: 'tx-0' (0000000052587fcf): kobject_cleanup, parent 000000008994051b [ 1022.351712][ T968] kobject: 'tx-0' (0000000052587fcf): auto cleanup 'remove' event [ 1022.359502][ T968] kobject: 'tx-0' (0000000052587fcf): kobject_uevent_env [ 1022.366839][ T968] kobject: 'tx-0' (0000000052587fcf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.377648][ T968] kobject: 'tx-0' (0000000052587fcf): auto cleanup kobject_del [ 1022.385253][ T968] kobject: 'tx-0' (0000000052587fcf): calling ktype release [ 1022.392541][ T968] kobject: 'tx-0': free name [ 1022.397123][ T968] kobject: 'queues' (000000008994051b): kobject_cleanup, parent 00000000868f1c0f [ 1022.406375][ T968] kobject: 'queues' (000000008994051b): calling ktype release [ 1022.413841][ T968] kobject: 'queues' (000000008994051b): kset_release [ 1022.420650][ T968] kobject: 'queues': free name [ 1022.425619][ T968] kobject: 'hsr_slave_0' (0000000064be31ce): kobject_uevent_env [ 1022.433294][ T968] kobject: 'hsr_slave_0' (0000000064be31ce): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.445632][ T968] kobject: 'batman_adv' (0000000099f7a7cf): kobject_uevent_env [ 1022.453218][ T968] kobject: 'batman_adv' (0000000099f7a7cf): kobject_uevent_env: filter function caused the event to drop! [ 1022.464554][ T968] kobject: 'batman_adv' (0000000099f7a7cf): kobject_cleanup, parent 00000000868f1c0f [ 1022.474037][ T968] kobject: 'batman_adv' (0000000099f7a7cf): calling ktype release [ 1022.481859][ T968] kobject: (0000000099f7a7cf): dynamic_kobj_release [ 1022.488520][ T968] kobject: 'batman_adv': free name [ 1022.493795][ T968] kobject: 'rx-0' (00000000e3e9b767): kobject_cleanup, parent 0000000092f82eca [ 1022.502753][ T968] kobject: 'rx-0' (00000000e3e9b767): auto cleanup 'remove' event [ 1022.510717][ T968] kobject: 'rx-0' (00000000e3e9b767): kobject_uevent_env [ 1022.517730][ T968] kobject: 'rx-0' (00000000e3e9b767): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.528516][ T968] kobject: 'rx-0' (00000000e3e9b767): auto cleanup kobject_del [ 1022.536094][ T968] kobject: 'rx-0' (00000000e3e9b767): calling ktype release [ 1022.543401][ T968] kobject: 'rx-0': free name [ 1022.548010][ T968] kobject: 'tx-0' (00000000f2c2f9d6): kobject_cleanup, parent 0000000092f82eca [ 1022.556952][ T968] kobject: 'tx-0' (00000000f2c2f9d6): auto cleanup 'remove' event [ 1022.564759][ T968] kobject: 'tx-0' (00000000f2c2f9d6): kobject_uevent_env [ 1022.571782][ T968] kobject: 'tx-0' (00000000f2c2f9d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.583420][ T968] kobject: 'tx-0' (00000000f2c2f9d6): auto cleanup kobject_del [ 1022.591419][ T968] kobject: 'tx-0' (00000000f2c2f9d6): calling ktype release [ 1022.599308][ T968] kobject: 'tx-0': free name [ 1022.603965][ T968] kobject: 'queues' (0000000092f82eca): kobject_cleanup, parent 00000000868f1c0f [ 1022.613299][ T968] kobject: 'queues' (0000000092f82eca): calling ktype release [ 1022.620794][ T968] kobject: 'queues' (0000000092f82eca): kset_release [ 1022.627463][ T968] kobject: 'queues': free name [ 1022.632520][ T968] kobject: 'veth0_to_hsr' (00000000326af054): kobject_uevent_env [ 1022.640622][ T968] kobject: 'veth0_to_hsr' (00000000326af054): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.652726][ T968] team0 (unregistering): Port device team_slave_1 removed [ 1022.660382][ T968] kobject: 'batman_adv' (00000000e56bed81): kobject_uevent_env [ 1022.667925][ T968] kobject: 'batman_adv' (00000000e56bed81): kobject_uevent_env: filter function caused the event to drop! [ 1022.679291][ T968] kobject: 'batman_adv' (00000000e56bed81): kobject_cleanup, parent 00000000868f1c0f [ 1022.688876][ T968] kobject: 'batman_adv' (00000000e56bed81): calling ktype release [ 1022.696849][ T968] kobject: (00000000e56bed81): dynamic_kobj_release [ 1022.703448][ T968] kobject: 'batman_adv': free name [ 1022.708644][ T968] kobject: 'rx-0' (0000000034cae48a): kobject_cleanup, parent 00000000801a1b6e [ 1022.717606][ T968] kobject: 'rx-0' (0000000034cae48a): auto cleanup 'remove' event [ 1022.725415][ T968] kobject: 'rx-0' (0000000034cae48a): kobject_uevent_env [ 1022.732450][ T968] kobject: 'rx-0' (0000000034cae48a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.743222][ T968] kobject: 'rx-0' (0000000034cae48a): auto cleanup kobject_del [ 1022.751236][ T968] kobject: 'rx-0' (0000000034cae48a): calling ktype release [ 1022.758504][ T968] kobject: 'rx-0': free name [ 1022.763149][ T968] kobject: 'tx-0' (00000000fdf0a6aa): kobject_cleanup, parent 00000000801a1b6e [ 1022.772091][ T968] kobject: 'tx-0' (00000000fdf0a6aa): auto cleanup 'remove' event [ 1022.779889][ T968] kobject: 'tx-0' (00000000fdf0a6aa): kobject_uevent_env [ 1022.786920][ T968] kobject: 'tx-0' (00000000fdf0a6aa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.797689][ T968] kobject: 'tx-0' (00000000fdf0a6aa): auto cleanup kobject_del [ 1022.805291][ T968] kobject: 'tx-0' (00000000fdf0a6aa): calling ktype release [ 1022.812678][ T968] kobject: 'tx-0': free name [ 1022.817259][ T968] kobject: 'queues' (00000000801a1b6e): kobject_cleanup, parent 00000000868f1c0f [ 1022.826389][ T968] kobject: 'queues' (00000000801a1b6e): calling ktype release [ 1022.833855][ T968] kobject: 'queues' (00000000801a1b6e): kset_release [ 1022.840562][ T968] kobject: 'queues': free name [ 1022.845531][ T968] kobject: 'team_slave_1' (000000002698470e): kobject_uevent_env [ 1022.853266][ T968] kobject: 'team_slave_1' (000000002698470e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.865370][ T968] kobject: 'batman_adv' (0000000015dd2562): kobject_uevent_env [ 1022.872943][ T968] kobject: 'batman_adv' (0000000015dd2562): kobject_uevent_env: filter function caused the event to drop! [ 1022.884263][ T968] kobject: 'batman_adv' (0000000015dd2562): kobject_cleanup, parent 00000000868f1c0f [ 1022.893724][ T968] kobject: 'batman_adv' (0000000015dd2562): calling ktype release [ 1022.901531][ T968] kobject: (0000000015dd2562): dynamic_kobj_release [ 1022.908094][ T968] kobject: 'batman_adv': free name [ 1022.913352][ T968] kobject: 'rx-0' (0000000092626783): kobject_cleanup, parent 00000000e012d04c [ 1022.922379][ T968] kobject: 'rx-0' (0000000092626783): auto cleanup 'remove' event [ 1022.930193][ T968] kobject: 'rx-0' (0000000092626783): kobject_uevent_env [ 1022.937923][ T968] kobject: 'rx-0' (0000000092626783): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1022.948703][ T968] kobject: 'rx-0' (0000000092626783): auto cleanup kobject_del [ 1022.956371][ T968] kobject: 'rx-0' (0000000092626783): calling ktype release [ 1022.963696][ T968] kobject: 'rx-0': free name [ 1022.968304][ T968] kobject: 'tx-0' (0000000096806f75): kobject_cleanup, parent 00000000e012d04c [ 1022.977251][ T968] kobject: 'tx-0' (0000000096806f75): auto cleanup 'remove' event [ 1022.985081][ T968] kobject: 'tx-0' (0000000096806f75): kobject_uevent_env [ 1022.992150][ T968] kobject: 'tx-0' (0000000096806f75): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1023.003097][ T968] kobject: 'tx-0' (0000000096806f75): auto cleanup kobject_del [ 1023.010917][ T968] kobject: 'tx-0' (0000000096806f75): calling ktype release [ 1023.018195][ T968] kobject: 'tx-0': free name [ 1023.023010][ T968] kobject: 'queues' (00000000e012d04c): kobject_cleanup, parent 00000000868f1c0f [ 1023.032127][ T968] kobject: 'queues' (00000000e012d04c): calling ktype release [ 1023.039579][ T968] kobject: 'queues' (00000000e012d04c): kset_release [ 1023.046359][ T968] kobject: 'queues': free name [ 1023.051336][ T968] kobject: 'veth1_to_team' (0000000068eef103): kobject_uevent_env [ 1023.059550][ T968] kobject: 'veth1_to_team' (0000000068eef103): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1023.071705][ T968] team0 (unregistering): Port device team_slave_0 removed [ 1023.079151][ T968] kobject: 'batman_adv' (0000000057fee70c): kobject_uevent_env [ 1023.086738][ T968] kobject: 'batman_adv' (0000000057fee70c): kobject_uevent_env: filter function caused the event to drop! [ 1023.098080][ T968] kobject: 'batman_adv' (0000000057fee70c): kobject_cleanup, parent 00000000868f1c0f [ 1023.107563][ T968] kobject: 'batman_adv' (0000000057fee70c): calling ktype release [ 1023.115384][ T968] kobject: (0000000057fee70c): dynamic_kobj_release