x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:50:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:25 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x5102}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x400}) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 18:50:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2140.704969][ T8287] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2140.739048][ T8287] CPU: 0 PID: 8287 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2140.747002][ T8287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2140.747008][ T8287] Call Trace: [ 2140.747032][ T8287] dump_stack+0x172/0x1f0 [ 2140.747050][ T8287] dump_header+0x10f/0xb6c [ 2140.747092][ T8287] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2140.775818][ T8287] ? ___ratelimit+0x60/0x595 [ 2140.780511][ T8287] ? do_raw_spin_unlock+0x57/0x270 [ 2140.785642][ T8287] oom_kill_process.cold+0x10/0x15 [ 2140.790762][ T8287] out_of_memory+0x79a/0x1280 [ 2140.790780][ T8287] ? lock_downgrade+0x880/0x880 [ 2140.790793][ T8287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.790806][ T8287] ? oom_killer_disable+0x280/0x280 [ 2140.790816][ T8287] ? find_held_lock+0x35/0x130 [ 2140.790838][ T8287] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2140.790849][ T8287] ? memcg_event_wake+0x230/0x230 [ 2140.790869][ T8287] ? do_raw_spin_unlock+0x57/0x270 [ 2140.806618][ T8287] ? _raw_spin_unlock+0x2d/0x50 [ 2140.806639][ T8287] try_charge+0x102c/0x15c0 [ 2140.806651][ T8287] ? find_held_lock+0x35/0x130 [ 2140.806672][ T8287] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2140.832274][ T8287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.832294][ T8287] ? kasan_check_read+0x11/0x20 [ 2140.832313][ T8287] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2140.846399][ T8287] mem_cgroup_try_charge+0x24d/0x5e0 [ 2140.873816][ T8287] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2140.879452][ T8287] __handle_mm_fault+0x1e1f/0x3ec0 [ 2140.884568][ T8287] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2140.884583][ T8287] ? find_held_lock+0x35/0x130 [ 2140.884604][ T8287] ? handle_mm_fault+0x322/0xb30 [ 2140.899824][ T8287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2140.906070][ T8287] ? kasan_check_read+0x11/0x20 [ 2140.910929][ T8287] handle_mm_fault+0x43f/0xb30 [ 2140.915693][ T8287] __do_page_fault+0x5ef/0xda0 [ 2140.920468][ T8287] do_page_fault+0x71/0x581 [ 2140.924979][ T8287] ? page_fault+0x8/0x30 [ 2140.929226][ T8287] page_fault+0x1e/0x30 [ 2140.933379][ T8287] RIP: 0033:0x4032a2 [ 2140.937276][ T8287] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 2140.956871][ T8287] RSP: 002b:00007ffea95c5f80 EFLAGS: 00010246 [ 2140.956882][ T8287] RAX: 0000000000000000 RBX: 000000000020a6d5 RCX: 0000000000412a80 [ 2140.956889][ T8287] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffea95c70b0 [ 2140.956914][ T8287] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001605940 [ 2140.956921][ T8287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffea95c70b0 [ 2140.956934][ T8287] R13: 00007ffea95c70a0 R14: 0000000000000000 R15: 00007ffea95c70b0 [ 2141.018109][ T8287] memory: usage 1592kB, limit 0kB, failcnt 485 [ 2141.024470][ T8287] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2141.024483][ T8287] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2141.044132][ T8287] Memory cgroup stats for /syz4: cache:60KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 18:50:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) [ 2141.161232][ T8287] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8287,uid=0 [ 2141.209508][ T8287] Memory cgroup out of memory: Killed process 8287 (syz-executor.4) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB 18:50:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x5102}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x400}) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 18:50:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) [ 2141.290111][ T1043] oom_reaper: reaped process 8287 (syz-executor.4), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB 18:50:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:26 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:50:26 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x5102}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x400}) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, 0x0) 18:50:26 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r0, &(0x7f0000000680), 0x0}, 0x18) 18:50:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) [ 2142.651210][ T8349] IPVS: ftp: loaded support on port[0] = 21 [ 2142.777692][ T8349] chnl_net:caif_netlink_parms(): no params data found [ 2142.828609][ T8349] bridge0: port 1(bridge_slave_0) entered blocking state [ 2142.835962][ T8349] bridge0: port 1(bridge_slave_0) entered disabled state [ 2142.843996][ T8349] device bridge_slave_0 entered promiscuous mode [ 2142.851882][ T8349] bridge0: port 2(bridge_slave_1) entered blocking state [ 2142.859081][ T8349] bridge0: port 2(bridge_slave_1) entered disabled state [ 2142.866688][ T8349] device bridge_slave_1 entered promiscuous mode [ 2142.885144][ T8349] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2142.897135][ T8349] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2142.918397][ T8349] team0: Port device team_slave_0 added [ 2142.927254][ T8349] team0: Port device team_slave_1 added [ 2142.991559][ T8349] device hsr_slave_0 entered promiscuous mode [ 2143.029418][ T8349] device hsr_slave_1 entered promiscuous mode [ 2143.077664][ T8349] bridge0: port 2(bridge_slave_1) entered blocking state [ 2143.084875][ T8349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2143.092269][ T8349] bridge0: port 1(bridge_slave_0) entered blocking state [ 2143.099347][ T8349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2143.163676][ T8349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2143.176773][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2143.184739][ T7182] bridge0: port 1(bridge_slave_0) entered disabled state [ 2143.192685][ T7182] bridge0: port 2(bridge_slave_1) entered disabled state [ 2143.205248][ T8349] 8021q: adding VLAN 0 to HW filter on device team0 [ 2143.218351][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2143.227178][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2143.235562][T31533] bridge0: port 1(bridge_slave_0) entered blocking state [ 2143.242618][T31533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2143.250867][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2143.259399][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2143.267608][T31533] bridge0: port 2(bridge_slave_1) entered blocking state [ 2143.274690][T31533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2143.290484][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2143.299528][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2143.308140][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2143.317316][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2143.333556][ T8349] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2143.344562][ T8349] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2143.356968][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2143.366461][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2143.376217][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2143.384643][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2143.393037][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2143.401527][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2143.409722][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2143.418131][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2143.434904][ T8349] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2143.598555][ T8353] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2143.610136][ T8353] CPU: 0 PID: 8353 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2143.618062][ T8353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2143.628131][ T8353] Call Trace: [ 2143.631425][ T8353] dump_stack+0x172/0x1f0 [ 2143.635775][ T8353] dump_header+0x10f/0xb6c [ 2143.640244][ T8353] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2143.646257][ T8353] ? ___ratelimit+0x60/0x595 [ 2143.650868][ T8353] ? do_raw_spin_unlock+0x57/0x270 [ 2143.656017][ T8353] oom_kill_process.cold+0x10/0x15 [ 2143.661152][ T8353] out_of_memory+0x79a/0x1280 [ 2143.665861][ T8353] ? __sched_text_start+0x8/0x8 [ 2143.670742][ T8353] ? oom_killer_disable+0x280/0x280 [ 2143.675996][ T8353] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2143.681561][ T8353] ? memcg_event_wake+0x230/0x230 [ 2143.686623][ T8353] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2143.692449][ T8353] ? cgroup_file_notify+0x140/0x1b0 [ 2143.697678][ T8353] memory_max_write+0x169/0x300 [ 2143.702545][ T8353] ? kernfs_fop_write+0x204/0x480 [ 2143.707598][ T8353] ? mem_cgroup_write+0x360/0x360 [ 2143.712633][ T8353] ? lock_acquire+0x16f/0x3f0 [ 2143.717390][ T8353] ? kernfs_fop_write+0x227/0x480 [ 2143.722413][ T8353] cgroup_file_write+0x245/0x7a0 [ 2143.727346][ T8353] ? mem_cgroup_write+0x360/0x360 [ 2143.732370][ T8353] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2143.738012][ T8353] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2143.743632][ T8353] kernfs_fop_write+0x2ba/0x480 [ 2143.748479][ T8353] __vfs_write+0x8d/0x110 [ 2143.752793][ T8353] ? kernfs_fop_open+0xd90/0xd90 [ 2143.757741][ T8353] vfs_write+0x20c/0x580 [ 2143.762009][ T8353] ksys_write+0x14f/0x2d0 [ 2143.766335][ T8353] ? __ia32_sys_read+0xb0/0xb0 [ 2143.771115][ T8353] ? do_syscall_64+0x26/0x610 [ 2143.775809][ T8353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2143.781867][ T8353] ? do_syscall_64+0x26/0x610 [ 2143.786556][ T8353] __x64_sys_write+0x73/0xb0 [ 2143.791138][ T8353] do_syscall_64+0x103/0x610 [ 2143.795721][ T8353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2143.801620][ T8353] RIP: 0033:0x458da9 [ 2143.805523][ T8353] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2143.825119][ T8353] RSP: 002b:00007f1f05d37c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2143.833547][ T8353] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2143.841510][ T8353] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2143.849478][ T8353] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2143.857465][ T8353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1f05d386d4 [ 2143.865439][ T8353] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2143.899105][ T8353] memory: usage 4768kB, limit 0kB, failcnt 603776 [ 2143.905851][ T8353] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2143.914437][ T8353] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2143.924392][ T8353] Memory cgroup stats for /syz3: cache:100KB rss:4152KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4212KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2143.947012][ T8353] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8352,uid=0 [ 2143.964270][ T8353] Memory cgroup out of memory: Killed process 8352 (syz-executor.3) total-vm:72452kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2143.983937][ T1043] oom_reaper: reaped process 8352 (syz-executor.3), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB 18:50:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:50:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x5102}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x400}) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, 0x0) 18:50:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r0, &(0x7f0000000680), 0x0}, 0x18) 18:50:28 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2144.334097][ T8349] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2144.347732][ T8349] CPU: 1 PID: 8349 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2144.355667][ T8349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2144.365744][ T8349] Call Trace: [ 2144.369051][ T8349] dump_stack+0x172/0x1f0 [ 2144.373401][ T8349] dump_header+0x10f/0xb6c [ 2144.377854][ T8349] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2144.383672][ T8349] ? ___ratelimit+0x60/0x595 [ 2144.388288][ T8349] ? do_raw_spin_unlock+0x57/0x270 [ 2144.393403][ T8349] oom_kill_process.cold+0x10/0x15 [ 2144.398514][ T8349] out_of_memory+0x79a/0x1280 [ 2144.403191][ T8349] ? lock_downgrade+0x880/0x880 [ 2144.408032][ T8349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.414279][ T8349] ? oom_killer_disable+0x280/0x280 [ 2144.419474][ T8349] ? find_held_lock+0x35/0x130 [ 2144.424236][ T8349] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2144.429767][ T8349] ? memcg_event_wake+0x230/0x230 [ 2144.434783][ T8349] ? do_raw_spin_unlock+0x57/0x270 [ 2144.439883][ T8349] ? _raw_spin_unlock+0x2d/0x50 [ 2144.444724][ T8349] try_charge+0x102c/0x15c0 [ 2144.449214][ T8349] ? find_held_lock+0x35/0x130 [ 2144.453975][ T8349] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2144.459515][ T8349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.465768][ T8349] ? kasan_check_read+0x11/0x20 [ 2144.470613][ T8349] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2144.476150][ T8349] mem_cgroup_try_charge+0x24d/0x5e0 [ 2144.481436][ T8349] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2144.487061][ T8349] wp_page_copy+0x408/0x1740 [ 2144.491637][ T8349] ? find_held_lock+0x35/0x130 [ 2144.496393][ T8349] ? pmd_pfn+0x1d0/0x1d0 [ 2144.500623][ T8349] ? lock_downgrade+0x880/0x880 [ 2144.505473][ T8349] ? swp_swapcount+0x540/0x540 [ 2144.510225][ T8349] ? kasan_check_read+0x11/0x20 [ 2144.515149][ T8349] ? do_raw_spin_unlock+0x57/0x270 [ 2144.520341][ T8349] do_wp_page+0x48e/0x1500 [ 2144.524750][ T8349] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2144.530120][ T8349] __handle_mm_fault+0x22e8/0x3ec0 [ 2144.535237][ T8349] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2144.540768][ T8349] ? find_held_lock+0x35/0x130 [ 2144.545540][ T8349] ? handle_mm_fault+0x322/0xb30 [ 2144.550475][ T8349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.556705][ T8349] ? kasan_check_read+0x11/0x20 [ 2144.561551][ T8349] handle_mm_fault+0x43f/0xb30 [ 2144.566322][ T8349] __do_page_fault+0x5ef/0xda0 [ 2144.571082][ T8349] do_page_fault+0x71/0x581 [ 2144.575571][ T8349] ? page_fault+0x8/0x30 [ 2144.579805][ T8349] page_fault+0x1e/0x30 [ 2144.583946][ T8349] RIP: 0033:0x42ff36 [ 2144.587829][ T8349] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2144.607516][ T8349] RSP: 002b:00007ffea30f6640 EFLAGS: 00010206 [ 2144.613569][ T8349] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2144.621530][ T8349] RDX: 0000000001f54930 RSI: 0000000001f5c970 RDI: 0000000000000003 [ 2144.629488][ T8349] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001f53940 [ 2144.637446][ T8349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2144.645421][ T8349] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 2144.673210][ T8349] memory: usage 384kB, limit 0kB, failcnt 603784 [ 2144.681314][ T8349] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2144.695060][ T8355] IPVS: ftp: loaded support on port[0] = 21 [ 2144.723694][ T8349] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2144.733774][ T8349] Memory cgroup stats for /syz3: cache:100KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2144.763756][ T8349] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8349,uid=0 [ 2144.785805][ T8349] Memory cgroup out of memory: Killed process 8349 (syz-executor.3) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB 18:50:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r0, &(0x7f0000000680), 0x0}, 0x18) [ 2144.845480][ T1043] oom_reaper: reaped process 8349 (syz-executor.3), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB 18:50:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:29 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:29 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2146.264002][ T8355] chnl_net:caif_netlink_parms(): no params data found [ 2146.406613][ T8355] bridge0: port 1(bridge_slave_0) entered blocking state [ 2146.413912][ T8355] bridge0: port 1(bridge_slave_0) entered disabled state [ 2146.421916][ T8355] device bridge_slave_0 entered promiscuous mode [ 2146.430297][ T8355] bridge0: port 2(bridge_slave_1) entered blocking state [ 2146.437387][ T8355] bridge0: port 2(bridge_slave_1) entered disabled state [ 2146.445282][ T8355] device bridge_slave_1 entered promiscuous mode [ 2146.582879][ T8355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2146.593487][ T8355] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2146.728011][ T8355] team0: Port device team_slave_0 added [ 2146.735578][ T8355] team0: Port device team_slave_1 added [ 2146.811646][ T8355] device hsr_slave_0 entered promiscuous mode [ 2146.859364][ T8355] device hsr_slave_1 entered promiscuous mode [ 2147.189506][ T8355] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2147.201677][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2147.209401][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2147.220017][ T8355] 8021q: adding VLAN 0 to HW filter on device team0 [ 2147.227741][ T984] device bridge_slave_1 left promiscuous mode [ 2147.234491][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2147.280428][ T984] device bridge_slave_0 left promiscuous mode [ 2147.286617][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2147.331262][ T984] device bridge_slave_1 left promiscuous mode [ 2147.337458][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2147.380133][ T984] device bridge_slave_0 left promiscuous mode [ 2147.386313][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2150.691459][ T984] device hsr_slave_1 left promiscuous mode [ 2150.732938][ T984] device hsr_slave_0 left promiscuous mode [ 2150.792292][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2150.806912][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2150.817611][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2150.854545][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2150.925766][ T984] bond0 (unregistering): Released all slaves [ 2151.082238][ T984] device hsr_slave_1 left promiscuous mode [ 2151.124602][ T984] device hsr_slave_0 left promiscuous mode [ 2151.183982][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2151.196325][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2151.207725][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2151.265569][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2151.363982][ T984] bond0 (unregistering): Released all slaves [ 2151.469758][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2151.478287][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2151.489558][ T3458] bridge0: port 1(bridge_slave_0) entered blocking state [ 2151.496797][ T3458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2151.504691][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2151.513365][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2151.521919][ T3458] bridge0: port 2(bridge_slave_1) entered blocking state [ 2151.529042][ T3458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2151.536598][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2151.545618][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2151.556416][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2151.568569][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2151.577968][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2151.587795][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2151.599894][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2151.600493][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2151.622684][ T8355] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2151.633598][ T8355] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2151.645229][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2151.654257][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2151.665170][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2151.673882][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2151.683122][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2151.703703][ T8355] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2151.886161][ T8405] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2151.898181][ T8405] CPU: 1 PID: 8405 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2151.906085][ T8405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2151.916286][ T8405] Call Trace: [ 2151.919738][ T8405] dump_stack+0x172/0x1f0 [ 2151.924143][ T8405] dump_header+0x10f/0xb6c [ 2151.928625][ T8405] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2151.934545][ T8405] ? ___ratelimit+0x60/0x595 [ 2151.939294][ T8405] ? do_raw_spin_unlock+0x57/0x270 [ 2151.944594][ T8405] oom_kill_process.cold+0x10/0x15 [ 2151.950133][ T8405] out_of_memory+0x79a/0x1280 [ 2151.954971][ T8405] ? __sched_text_start+0x8/0x8 [ 2151.960045][ T8405] ? oom_killer_disable+0x280/0x280 [ 2151.965251][ T8405] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2151.970940][ T8405] ? memcg_event_wake+0x230/0x230 [ 2151.975964][ T8405] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2151.982048][ T8405] ? cgroup_file_notify+0x140/0x1b0 [ 2151.987303][ T8405] memory_max_write+0x169/0x300 [ 2151.992172][ T8405] ? kernfs_fop_write+0x204/0x480 [ 2151.997200][ T8405] ? mem_cgroup_write+0x360/0x360 [ 2152.002245][ T8405] ? lock_acquire+0x16f/0x3f0 [ 2152.007058][ T8405] ? kernfs_fop_write+0x227/0x480 [ 2152.012134][ T8405] cgroup_file_write+0x245/0x7a0 [ 2152.017121][ T8405] ? mem_cgroup_write+0x360/0x360 [ 2152.022388][ T8405] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2152.028040][ T8405] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2152.033706][ T8405] kernfs_fop_write+0x2ba/0x480 [ 2152.038599][ T8405] __vfs_write+0x8d/0x110 [ 2152.042933][ T8405] ? kernfs_fop_open+0xd90/0xd90 [ 2152.048014][ T8405] vfs_write+0x20c/0x580 [ 2152.052259][ T8405] ksys_write+0x14f/0x2d0 [ 2152.056704][ T8405] ? __ia32_sys_read+0xb0/0xb0 [ 2152.061559][ T8405] ? do_syscall_64+0x26/0x610 [ 2152.066829][ T8405] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.072887][ T8405] ? do_syscall_64+0x26/0x610 [ 2152.077560][ T8405] __x64_sys_write+0x73/0xb0 [ 2152.082193][ T8405] do_syscall_64+0x103/0x610 [ 2152.086779][ T8405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.092669][ T8405] RIP: 0033:0x458da9 [ 2152.096561][ T8405] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2152.116297][ T8405] RSP: 002b:00007fc9c8fdac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2152.124776][ T8405] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2152.132835][ T8405] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2152.140828][ T8405] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2152.148882][ T8405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9c8fdb6d4 [ 2152.156851][ T8405] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2152.172426][ T8405] memory: usage 5968kB, limit 0kB, failcnt 486 [ 2152.179106][ T8405] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2152.187042][ T8405] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2152.203266][ T8405] Memory cgroup stats for /syz4: cache:60KB rss:4152KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2152.226053][ T8405] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8404,uid=0 [ 2152.242125][ T8405] Memory cgroup out of memory: Killed process 8404 (syz-executor.4) total-vm:72452kB, anon-rss:4224kB, file-rss:35744kB, shmem-rss:0kB [ 2152.260420][ T1043] oom_reaper: reaped process 8404 (syz-executor.4), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB 18:50:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:50:36 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x0, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}], 0x6, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:50:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x5102}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x400}) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, 0x0) [ 2152.399522][ T8355] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2152.439100][ T8355] CPU: 1 PID: 8355 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2152.447045][ T8355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2152.457111][ T8355] Call Trace: [ 2152.460443][ T8355] dump_stack+0x172/0x1f0 [ 2152.464799][ T8355] dump_header+0x10f/0xb6c [ 2152.469242][ T8355] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2152.475265][ T8355] ? ___ratelimit+0x60/0x595 [ 2152.479877][ T8355] ? do_raw_spin_unlock+0x57/0x270 [ 2152.485016][ T8355] oom_kill_process.cold+0x10/0x15 [ 2152.490145][ T8355] out_of_memory+0x79a/0x1280 [ 2152.494842][ T8355] ? lock_downgrade+0x880/0x880 [ 2152.499709][ T8355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2152.505964][ T8355] ? oom_killer_disable+0x280/0x280 [ 2152.511172][ T8355] ? find_held_lock+0x35/0x130 [ 2152.515969][ T8355] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2152.521534][ T8355] ? memcg_event_wake+0x230/0x230 [ 2152.526676][ T8355] ? do_raw_spin_unlock+0x57/0x270 [ 2152.531907][ T8355] ? _raw_spin_unlock+0x2d/0x50 [ 2152.536802][ T8355] try_charge+0x102c/0x15c0 [ 2152.541438][ T8355] ? find_held_lock+0x35/0x130 [ 2152.546228][ T8355] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2152.551791][ T8355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2152.558141][ T8355] ? kasan_check_read+0x11/0x20 [ 2152.563015][ T8355] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2152.568587][ T8355] mem_cgroup_try_charge+0x24d/0x5e0 [ 2152.573903][ T8355] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2152.579562][ T8355] __handle_mm_fault+0x1e1f/0x3ec0 [ 2152.584701][ T8355] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2152.590266][ T8355] ? find_held_lock+0x35/0x130 [ 2152.595074][ T8355] ? handle_mm_fault+0x322/0xb30 [ 2152.600040][ T8355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2152.606308][ T8355] ? kasan_check_read+0x11/0x20 [ 2152.611191][ T8355] handle_mm_fault+0x43f/0xb30 [ 2152.615973][ T8355] __do_page_fault+0x5ef/0xda0 [ 2152.620764][ T8355] do_page_fault+0x71/0x581 [ 2152.625306][ T8355] ? page_fault+0x8/0x30 [ 2152.629564][ T8355] page_fault+0x1e/0x30 [ 2152.633734][ T8355] RIP: 0033:0x42f3ac [ 2152.637648][ T8355] Code: 83 c0 17 41 55 41 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 83 f8 20 b8 20 00 00 00 48 0f 42 e8 48 85 ff <48> 89 74 24 08 0f 84 3a 08 00 00 48 3b 2d ba 5b 62 00 77 70 89 ef [ 2152.661299][ T8355] RSP: 002b:00007ffdc6ce8fb0 EFLAGS: 00010202 [ 2152.667434][ T8355] RAX: 0000000000000020 RBX: 0000000000713640 RCX: 0000000000458114 [ 2152.675471][ T8355] RDX: 00007ffdc6ce90a0 RSI: 0000000000008030 RDI: 0000000000713640 [ 2152.683463][ T8355] RBP: 0000000000008040 R08: 0000000000000001 R09: 0000000001bfc940 [ 2152.691462][ T8355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdc6cea280 [ 2152.699456][ T8355] R13: 00007ffdc6cea270 R14: 0000000000000000 R15: 00007ffdc6cea280 18:50:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x0, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = getpid() perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) 18:50:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x0, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) [ 2153.039289][ T8355] memory: usage 1596kB, limit 0kB, failcnt 498 [ 2153.046719][ T8355] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 18:50:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x0, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:37 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2153.379146][ T8355] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2153.398488][ T8355] Memory cgroup stats for /syz4: cache:60KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2153.775418][ T8355] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8355,uid=0 [ 2153.825484][ T8355] Memory cgroup out of memory: Killed process 8355 (syz-executor.4) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 2153.906838][ T1043] oom_reaper: reaped process 8355 (syz-executor.4), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB 18:50:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:50:38 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x0, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:38 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x2f, 'rdma'}]}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000340)='memory.max\x00', 0x2, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffff9c, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='threaded\x00', 0x9) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r4, 0x3, 0x1, 0x4, &(0x7f00000000c0)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2154.415055][ T8452] IPVS: ftp: loaded support on port[0] = 21 [ 2154.722559][ T8452] chnl_net:caif_netlink_parms(): no params data found [ 2154.874657][ T8452] bridge0: port 1(bridge_slave_0) entered blocking state [ 2154.899924][ T8452] bridge0: port 1(bridge_slave_0) entered disabled state [ 2154.914576][ T8452] device bridge_slave_0 entered promiscuous mode [ 2154.923336][ T8452] bridge0: port 2(bridge_slave_1) entered blocking state [ 2154.942445][ T8452] bridge0: port 2(bridge_slave_1) entered disabled state [ 2154.952887][ T8452] device bridge_slave_1 entered promiscuous mode [ 2154.998177][ T8452] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2155.028794][ T8452] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2155.112319][ T8452] team0: Port device team_slave_0 added [ 2155.131048][ T8452] team0: Port device team_slave_1 added [ 2155.228171][ T8452] device hsr_slave_0 entered promiscuous mode [ 2155.279413][ T8452] device hsr_slave_1 entered promiscuous mode [ 2155.328388][ T8452] bridge0: port 2(bridge_slave_1) entered blocking state [ 2155.335551][ T8452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2155.342955][ T8452] bridge0: port 1(bridge_slave_0) entered blocking state [ 2155.350138][ T8452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2155.411492][ T7704] bridge0: port 1(bridge_slave_0) entered disabled state [ 2155.426731][ T7704] bridge0: port 2(bridge_slave_1) entered disabled state [ 2155.492028][ T8452] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2155.514455][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2155.529995][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2155.540608][ T8452] 8021q: adding VLAN 0 to HW filter on device team0 [ 2155.551089][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2155.560470][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2155.568898][ T4104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2155.576028][ T4104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2155.614332][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2155.640273][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2155.648664][ T3458] bridge0: port 2(bridge_slave_1) entered blocking state [ 2155.655773][ T3458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2155.664780][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2155.673896][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2155.683253][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2155.692326][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2155.701228][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2155.711914][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2155.720482][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2155.736529][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2155.745343][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2155.764731][ T8452] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2155.783385][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2155.795336][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2155.806562][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2155.827779][ T8452] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2155.967238][ T8475] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2155.979132][ T8475] CPU: 1 PID: 8475 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2155.987072][ T8475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2155.997140][ T8475] Call Trace: [ 2156.000473][ T8475] dump_stack+0x172/0x1f0 [ 2156.004819][ T8475] dump_header+0x10f/0xb6c [ 2156.009249][ T8475] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2156.015092][ T8475] ? ___ratelimit+0x60/0x595 [ 2156.019691][ T8475] ? do_raw_spin_unlock+0x57/0x270 [ 2156.024814][ T8475] oom_kill_process.cold+0x10/0x15 [ 2156.029941][ T8475] out_of_memory+0x79a/0x1280 [ 2156.034630][ T8475] ? __sched_text_start+0x8/0x8 [ 2156.039485][ T8475] ? retint_kernel+0x2d/0x2d [ 2156.044087][ T8475] ? oom_killer_disable+0x280/0x280 [ 2156.049308][ T8475] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2156.054862][ T8475] ? memcg_event_wake+0x230/0x230 [ 2156.059992][ T8475] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2156.065808][ T8475] ? cgroup_file_notify+0x140/0x1b0 [ 2156.071114][ T8475] memory_max_write+0x169/0x300 [ 2156.075995][ T8475] ? mem_cgroup_write+0x360/0x360 [ 2156.081030][ T8475] ? mem_cgroup_write+0x360/0x360 [ 2156.086080][ T8475] cgroup_file_write+0x245/0x7a0 [ 2156.091026][ T8475] ? mem_cgroup_write+0x360/0x360 [ 2156.096077][ T8475] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2156.101724][ T8475] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2156.107363][ T8475] kernfs_fop_write+0x2ba/0x480 [ 2156.112240][ T8475] __vfs_write+0x8d/0x110 [ 2156.116571][ T8475] ? kernfs_fop_open+0xd90/0xd90 [ 2156.121520][ T8475] vfs_write+0x20c/0x580 [ 2156.125776][ T8475] ksys_write+0x14f/0x2d0 [ 2156.130115][ T8475] ? __ia32_sys_read+0xb0/0xb0 [ 2156.134908][ T8475] ? do_syscall_64+0x26/0x610 [ 2156.139594][ T8475] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2156.145758][ T8475] ? do_syscall_64+0x26/0x610 [ 2156.150454][ T8475] __x64_sys_write+0x73/0xb0 [ 2156.155060][ T8475] do_syscall_64+0x103/0x610 [ 2156.159663][ T8475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2156.165564][ T8475] RIP: 0033:0x458da9 [ 2156.169469][ T8475] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2156.189080][ T8475] RSP: 002b:00007fb6fc055c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2156.197507][ T8475] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2156.205488][ T8475] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2156.213568][ T8475] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2156.221553][ T8475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6fc0566d4 [ 2156.229623][ T8475] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2156.249574][ T8475] memory: usage 4704kB, limit 0kB, failcnt 603785 [ 2156.256803][ T8475] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2156.267317][ T8475] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2156.274994][ T8475] Memory cgroup stats for /syz3: cache:100KB rss:4152KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4152KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2156.307093][ T8475] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8474,uid=0 [ 2156.325327][ T8475] Memory cgroup out of memory: Killed process 8474 (syz-executor.3) total-vm:72452kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2156.344183][ T1043] oom_reaper: reaped process 8474 (syz-executor.3), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 18:50:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}], 0x6, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:50:41 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:50:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x0, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:41 executing program 2: socket$kcm(0xa, 0x3, 0x11) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='memory.max\x00', 0x2, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffff9c, 0x2) write$cgroup_type(r3, &(0x7f00000003c0)='threaded\x00', 0x9) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) [ 2156.690480][ T8452] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2156.713511][ T8452] CPU: 0 PID: 8452 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2156.721522][ T8452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2156.731593][ T8452] Call Trace: [ 2156.734907][ T8452] dump_stack+0x172/0x1f0 [ 2156.739260][ T8452] dump_header+0x10f/0xb6c [ 2156.743695][ T8452] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2156.749522][ T8452] ? ___ratelimit+0x60/0x595 [ 2156.754730][ T8452] ? do_raw_spin_unlock+0x57/0x270 [ 2156.760486][ T8452] oom_kill_process.cold+0x10/0x15 [ 2156.765622][ T8452] out_of_memory+0x79a/0x1280 [ 2156.770315][ T8452] ? lock_downgrade+0x880/0x880 [ 2156.775182][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.781444][ T8452] ? oom_killer_disable+0x280/0x280 [ 2156.786657][ T8452] ? find_held_lock+0x35/0x130 [ 2156.791449][ T8452] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2156.797018][ T8452] ? memcg_event_wake+0x230/0x230 [ 2156.802121][ T8452] ? do_raw_spin_unlock+0x57/0x270 [ 2156.807255][ T8452] ? _raw_spin_unlock+0x2d/0x50 [ 2156.812146][ T8452] try_charge+0x102c/0x15c0 [ 2156.816660][ T8452] ? find_held_lock+0x35/0x130 [ 2156.821431][ T8452] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2156.821447][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.821464][ T8452] ? kasan_check_read+0x11/0x20 [ 2156.821479][ T8452] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2156.821500][ T8452] mem_cgroup_try_charge+0x24d/0x5e0 [ 2156.821520][ T8452] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2156.821540][ T8452] __handle_mm_fault+0x1e1f/0x3ec0 [ 2156.859720][ T8452] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2156.865283][ T8452] ? find_held_lock+0x35/0x130 [ 2156.870063][ T8452] ? handle_mm_fault+0x322/0xb30 [ 2156.875038][ T8452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.875057][ T8452] ? kasan_check_read+0x11/0x20 [ 2156.886211][ T8452] handle_mm_fault+0x43f/0xb30 [ 2156.890995][ T8452] __do_page_fault+0x5ef/0xda0 [ 2156.895779][ T8452] do_page_fault+0x71/0x581 [ 2156.900295][ T8452] ? page_fault+0x8/0x30 [ 2156.904637][ T8452] page_fault+0x1e/0x30 [ 2156.908795][ T8452] RIP: 0033:0x4032a2 [ 2156.912698][ T8452] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 2156.932319][ T8452] RSP: 002b:00007ffeda605eb0 EFLAGS: 00010246 [ 2156.938403][ T8452] RAX: 0000000000000000 RBX: 000000000020e581 RCX: 0000000000412a80 [ 2156.946376][ T8452] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffeda606fe0 [ 2156.946389][ T8452] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001c25940 [ 2156.962423][ T8452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffeda606fe0 [ 2156.970412][ T8452] R13: 00007ffeda606fd0 R14: 0000000000000000 R15: 00007ffeda606fe0 18:50:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x0, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) 18:50:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x0, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) [ 2157.399419][ T8452] memory: usage 332kB, limit 0kB, failcnt 603793 [ 2157.406249][ T8452] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2157.455359][ T8452] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2157.462476][ T8452] Memory cgroup stats for /syz3: cache:100KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2157.523211][ T8452] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8452,uid=0 18:50:42 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x0, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, &(0x7f0000000680), 0x0}, 0x18) [ 2157.568643][ T8452] Memory cgroup out of memory: Killed process 8452 (syz-executor.3) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2157.591208][ T1043] oom_reaper: reaped process 8452 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 18:50:42 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 18:50:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}], 0x6, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:50:43 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r0, &(0x7f0000000680), 0x0}, 0x18) [ 2158.758547][ T8519] IPVS: ftp: loaded support on port[0] = 21 [ 2159.125824][ T8519] chnl_net:caif_netlink_parms(): no params data found [ 2159.269698][ T8519] bridge0: port 1(bridge_slave_0) entered blocking state [ 2159.276791][ T8519] bridge0: port 1(bridge_slave_0) entered disabled state [ 2159.284584][ T8519] device bridge_slave_0 entered promiscuous mode [ 2159.292268][ T8519] bridge0: port 2(bridge_slave_1) entered blocking state [ 2159.299438][ T8519] bridge0: port 2(bridge_slave_1) entered disabled state [ 2159.307087][ T8519] device bridge_slave_1 entered promiscuous mode [ 2159.439489][ T8519] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2159.450109][ T8519] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2159.465618][ T8519] team0: Port device team_slave_0 added [ 2159.472660][ T8519] team0: Port device team_slave_1 added [ 2159.531724][ T8519] device hsr_slave_0 entered promiscuous mode [ 2159.589563][ T8519] device hsr_slave_1 entered promiscuous mode [ 2159.633667][ T984] device bridge_slave_1 left promiscuous mode [ 2159.640170][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2159.700180][ T984] device bridge_slave_0 left promiscuous mode [ 2159.706469][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2159.750314][ T984] device bridge_slave_1 left promiscuous mode [ 2159.756451][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2159.810127][ T984] device bridge_slave_0 left promiscuous mode [ 2159.816291][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2163.101749][ T984] device hsr_slave_1 left promiscuous mode [ 2163.144391][ T984] device hsr_slave_0 left promiscuous mode [ 2163.192425][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2163.205334][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2163.216424][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2163.253763][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2163.340151][ T984] bond0 (unregistering): Released all slaves [ 2163.502035][ T984] device hsr_slave_1 left promiscuous mode [ 2163.552430][ T984] device hsr_slave_0 left promiscuous mode [ 2163.592405][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2163.606634][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2163.618489][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2163.693150][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2163.764984][ T984] bond0 (unregistering): Released all slaves [ 2163.882868][ T8519] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2163.894142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2163.902447][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2163.913411][ T8519] 8021q: adding VLAN 0 to HW filter on device team0 [ 2163.928597][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2163.937637][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2163.946163][ T4104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2163.953248][ T4104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2163.976292][ T8519] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2163.986997][ T8519] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2163.998517][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2164.006432][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2164.015485][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2164.024542][ T7704] bridge0: port 2(bridge_slave_1) entered blocking state [ 2164.031641][ T7704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2164.039807][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2164.048243][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2164.056829][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2164.065251][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2164.073734][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2164.082333][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2164.090718][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2164.098841][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2164.107170][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2164.115346][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2164.124437][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2164.132306][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2164.150950][ T8519] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2164.333335][ T8529] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2164.352645][ T8529] CPU: 0 PID: 8529 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2164.360568][ T8529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2164.370650][ T8529] Call Trace: [ 2164.374049][ T8529] dump_stack+0x172/0x1f0 [ 2164.378367][ T8529] dump_header+0x10f/0xb6c [ 2164.382790][ T8529] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2164.388622][ T8529] ? ___ratelimit+0x60/0x595 [ 2164.393199][ T8529] ? do_raw_spin_unlock+0x57/0x270 [ 2164.398316][ T8529] oom_kill_process.cold+0x10/0x15 [ 2164.403439][ T8529] out_of_memory+0x79a/0x1280 [ 2164.408123][ T8529] ? __sched_text_start+0x8/0x8 [ 2164.412966][ T8529] ? oom_killer_disable+0x280/0x280 [ 2164.418164][ T8529] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2164.423713][ T8529] ? memcg_event_wake+0x230/0x230 [ 2164.428743][ T8529] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2164.434533][ T8529] ? cgroup_file_notify+0x140/0x1b0 [ 2164.439746][ T8529] memory_max_write+0x169/0x300 [ 2164.444616][ T8529] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2164.449908][ T8529] ? mem_cgroup_write+0x360/0x360 [ 2164.454921][ T8529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2164.460527][ T8529] cgroup_file_write+0x245/0x7a0 [ 2164.465464][ T8529] ? mem_cgroup_write+0x360/0x360 [ 2164.470501][ T8529] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2164.476129][ T8529] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2164.481759][ T8529] kernfs_fop_write+0x2ba/0x480 [ 2164.486618][ T8529] __vfs_write+0x8d/0x110 [ 2164.491554][ T8529] ? kernfs_fop_open+0xd90/0xd90 [ 2164.496483][ T8529] vfs_write+0x20c/0x580 [ 2164.500735][ T8529] ksys_write+0x14f/0x2d0 [ 2164.505087][ T8529] ? __ia32_sys_read+0xb0/0xb0 [ 2164.509853][ T8529] ? do_syscall_64+0x26/0x610 [ 2164.514519][ T8529] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2164.520781][ T8529] ? do_syscall_64+0x26/0x610 [ 2164.525465][ T8529] __x64_sys_write+0x73/0xb0 [ 2164.530041][ T8529] do_syscall_64+0x103/0x610 [ 2164.534621][ T8529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2164.540695][ T8529] RIP: 0033:0x458da9 [ 2164.544602][ T8529] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2164.564303][ T8529] RSP: 002b:00007f95dbc7cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2164.572740][ T8529] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2164.580706][ T8529] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2164.588675][ T8529] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2164.596631][ T8529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95dbc7d6d4 [ 2164.604859][ T8529] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2164.625155][ T8529] memory: usage 5952kB, limit 0kB, failcnt 499 [ 2164.632010][ T8529] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2164.639741][ T8529] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2164.646867][ T8529] Memory cgroup stats for /syz4: cache:60KB rss:4152KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2164.668791][ T8529] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8528,uid=0 [ 2164.685298][ T8529] Memory cgroup out of memory: Killed process 8528 (syz-executor.4) total-vm:72452kB, anon-rss:4224kB, file-rss:35744kB, shmem-rss:0kB [ 2164.705215][ T1043] oom_reaper: reaped process 8528 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 18:50:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:50:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 18:50:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {0x0}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:50:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r0, &(0x7f0000000680), 0x0}, 0x18) [ 2165.029822][ T8519] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2165.066957][ T8519] CPU: 0 PID: 8519 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2165.074875][ T8519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2165.084928][ T8519] Call Trace: [ 2165.088231][ T8519] dump_stack+0x172/0x1f0 [ 2165.092574][ T8519] dump_header+0x10f/0xb6c [ 2165.097007][ T8519] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2165.102819][ T8519] ? ___ratelimit+0x60/0x595 [ 2165.107410][ T8519] ? do_raw_spin_unlock+0x57/0x270 [ 2165.112521][ T8519] oom_kill_process.cold+0x10/0x15 [ 2165.117635][ T8519] out_of_memory+0x79a/0x1280 [ 2165.122311][ T8519] ? lock_downgrade+0x880/0x880 [ 2165.127159][ T8519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2165.133398][ T8519] ? oom_killer_disable+0x280/0x280 [ 2165.138594][ T8519] ? find_held_lock+0x35/0x130 [ 2165.143472][ T8519] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2165.149016][ T8519] ? memcg_event_wake+0x230/0x230 [ 2165.154041][ T8519] ? do_raw_spin_unlock+0x57/0x270 [ 2165.159149][ T8519] ? _raw_spin_unlock+0x2d/0x50 [ 2165.163998][ T8519] try_charge+0x102c/0x15c0 [ 2165.168494][ T8519] ? find_held_lock+0x35/0x130 [ 2165.173265][ T8519] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2165.178809][ T8519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2165.185055][ T8519] ? kasan_check_read+0x11/0x20 [ 2165.189908][ T8519] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2165.195457][ T8519] mem_cgroup_try_charge+0x24d/0x5e0 [ 2165.200753][ T8519] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2165.206394][ T8519] __handle_mm_fault+0x1e1f/0x3ec0 [ 2165.211507][ T8519] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2165.217063][ T8519] ? find_held_lock+0x35/0x130 [ 2165.221831][ T8519] ? handle_mm_fault+0x322/0xb30 [ 2165.226773][ T8519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2165.233016][ T8519] ? kasan_check_read+0x11/0x20 [ 2165.237881][ T8519] handle_mm_fault+0x43f/0xb30 [ 2165.242648][ T8519] __do_page_fault+0x5ef/0xda0 [ 2165.247430][ T8519] do_page_fault+0x71/0x581 [ 2165.251941][ T8519] ? page_fault+0x8/0x30 [ 2165.256205][ T8519] page_fault+0x1e/0x30 [ 2165.260354][ T8519] RIP: 0033:0x42f3ac [ 2165.264333][ T8519] Code: 83 c0 17 41 55 41 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 83 f8 20 b8 20 00 00 00 48 0f 42 e8 48 85 ff <48> 89 74 24 08 0f 84 3a 08 00 00 48 3b 2d ba 5b 62 00 77 70 89 ef [ 2165.283941][ T8519] RSP: 002b:00007fff2d4e7fd0 EFLAGS: 00010202 [ 2165.290002][ T8519] RAX: 0000000000000020 RBX: 0000000000713640 RCX: 0000000000458114 [ 2165.297971][ T8519] RDX: 00007fff2d4e80c0 RSI: 0000000000008030 RDI: 0000000000713640 [ 2165.305950][ T8519] RBP: 0000000000008040 R08: 0000000000000001 R09: 00000000016a2940 [ 2165.313914][ T8519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff2d4e92a0 [ 2165.321887][ T8519] R13: 00007fff2d4e9290 R14: 0000000000000000 R15: 00007fff2d4e92a0 [ 2165.344788][ T8519] memory: usage 1580kB, limit 0kB, failcnt 507 [ 2165.352114][ T8519] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2165.364489][ T8519] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2165.373201][ T8519] Memory cgroup stats for /syz4: cache:60KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB 18:50:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r0, &(0x7f0000000680), 0x0}, 0x18) [ 2165.399339][ T8519] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8519,uid=0 [ 2165.424752][ T8519] Memory cgroup out of memory: Killed process 8519 (syz-executor.4) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 2165.488341][ T1043] oom_reaper: reaped process 8519 (syz-executor.4), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB 18:50:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 18:50:50 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 18:50:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 18:50:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:50:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 18:50:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:50 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2166.630474][ T8583] IPVS: ftp: loaded support on port[0] = 21 [ 2167.025355][ T8583] chnl_net:caif_netlink_parms(): no params data found [ 2167.136654][ T8583] bridge0: port 1(bridge_slave_0) entered blocking state [ 2167.146840][ T8583] bridge0: port 1(bridge_slave_0) entered disabled state [ 2167.168535][ T8583] device bridge_slave_0 entered promiscuous mode [ 2167.188548][ T8583] bridge0: port 2(bridge_slave_1) entered blocking state [ 2167.214422][ T8583] bridge0: port 2(bridge_slave_1) entered disabled state [ 2167.230939][ T8583] device bridge_slave_1 entered promiscuous mode [ 2167.255108][ T8583] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2167.266191][ T8583] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2167.317275][ T8583] team0: Port device team_slave_0 added [ 2167.326285][ T8583] team0: Port device team_slave_1 added [ 2167.390973][ T8583] device hsr_slave_0 entered promiscuous mode [ 2167.435804][ T8583] device hsr_slave_1 entered promiscuous mode [ 2167.527513][ T8583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2167.540546][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2167.548291][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2167.560529][ T8583] 8021q: adding VLAN 0 to HW filter on device team0 [ 2167.570876][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2167.580011][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2167.588395][ T7704] bridge0: port 1(bridge_slave_0) entered blocking state [ 2167.597030][ T7704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2167.620736][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2167.628650][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2167.637677][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2167.646057][ T4104] bridge0: port 2(bridge_slave_1) entered blocking state [ 2167.655458][ T4104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2167.663832][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2167.672403][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2167.681103][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2167.689744][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2167.697967][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2167.706666][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2167.715027][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2167.723346][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2167.731617][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2167.739959][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2167.748594][ T4104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2167.759437][ T8583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2167.776075][ T8583] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2167.927037][ T8596] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2167.945879][ T8596] CPU: 1 PID: 8596 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2167.953785][ T8596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2167.963836][ T8596] Call Trace: [ 2167.967139][ T8596] dump_stack+0x172/0x1f0 [ 2167.971472][ T8596] dump_header+0x10f/0xb6c [ 2167.975890][ T8596] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2167.981693][ T8596] ? ___ratelimit+0x60/0x595 [ 2167.986284][ T8596] ? do_raw_spin_unlock+0x57/0x270 [ 2167.991407][ T8596] oom_kill_process.cold+0x10/0x15 [ 2167.996519][ T8596] out_of_memory+0x79a/0x1280 [ 2168.001199][ T8596] ? __sched_text_start+0x8/0x8 [ 2168.006047][ T8596] ? oom_killer_disable+0x280/0x280 [ 2168.011255][ T8596] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2168.016792][ T8596] ? memcg_event_wake+0x230/0x230 [ 2168.021823][ T8596] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2168.027625][ T8596] ? cgroup_file_notify+0x140/0x1b0 [ 2168.032831][ T8596] memory_max_write+0x169/0x300 [ 2168.037677][ T8596] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2168.043134][ T8596] ? mem_cgroup_write+0x360/0x360 [ 2168.048160][ T8596] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2168.053624][ T8596] cgroup_file_write+0x245/0x7a0 [ 2168.058559][ T8596] ? mem_cgroup_write+0x360/0x360 [ 2168.063579][ T8596] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2168.069215][ T8596] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2168.074848][ T8596] kernfs_fop_write+0x2ba/0x480 [ 2168.079703][ T8596] __vfs_write+0x8d/0x110 [ 2168.084028][ T8596] ? kernfs_fop_open+0xd90/0xd90 [ 2168.088965][ T8596] vfs_write+0x20c/0x580 [ 2168.093210][ T8596] ksys_write+0x14f/0x2d0 [ 2168.097542][ T8596] ? __ia32_sys_read+0xb0/0xb0 [ 2168.102308][ T8596] ? do_syscall_64+0x26/0x610 [ 2168.106982][ T8596] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2168.113045][ T8596] ? do_syscall_64+0x26/0x610 [ 2168.117728][ T8596] __x64_sys_write+0x73/0xb0 [ 2168.122312][ T8596] do_syscall_64+0x103/0x610 [ 2168.126907][ T8596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2168.132792][ T8596] RIP: 0033:0x458da9 [ 2168.136683][ T8596] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2168.156290][ T8596] RSP: 002b:00007f118dce9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2168.164680][ T8596] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2168.172632][ T8596] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2168.180580][ T8596] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2168.188526][ T8596] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f118dcea6d4 [ 2168.196470][ T8596] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2168.213663][ T8596] memory: usage 4764kB, limit 0kB, failcnt 603794 [ 2168.220565][ T8596] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2168.228121][ T8596] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2168.235390][ T8596] Memory cgroup stats for /syz3: cache:100KB rss:4160KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4216KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2168.257524][ T8596] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8595,uid=0 [ 2168.273460][ T8596] Memory cgroup out of memory: Killed process 8595 (syz-executor.3) total-vm:72584kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2168.299276][ T1043] oom_reaper: reaped process 8595 (syz-executor.3), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 18:50:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {0x0}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:50:53 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/244, 0xf4}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000002c0)}, 0x40000000000000) 18:50:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:50:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:50:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={0xffffffffffffffff, &(0x7f0000000680), 0x0}, 0x18) [ 2168.712522][ T8583] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2168.725977][ T8583] CPU: 0 PID: 8583 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2168.733880][ T8583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2168.744018][ T8583] Call Trace: [ 2168.747331][ T8583] dump_stack+0x172/0x1f0 [ 2168.751663][ T8583] dump_header+0x10f/0xb6c [ 2168.756106][ T8583] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 18:50:53 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2168.762339][ T8583] ? ___ratelimit+0x60/0x595 [ 2168.766933][ T8583] ? do_raw_spin_unlock+0x57/0x270 [ 2168.772052][ T8583] oom_kill_process.cold+0x10/0x15 [ 2168.777178][ T8583] out_of_memory+0x79a/0x1280 [ 2168.781860][ T8583] ? lock_downgrade+0x880/0x880 [ 2168.786712][ T8583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2168.792976][ T8583] ? oom_killer_disable+0x280/0x280 [ 2168.798167][ T8583] ? find_held_lock+0x35/0x130 [ 2168.802939][ T8583] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2168.808485][ T8583] ? memcg_event_wake+0x230/0x230 [ 2168.813512][ T8583] ? do_raw_spin_unlock+0x57/0x270 [ 2168.818622][ T8583] ? _raw_spin_unlock+0x2d/0x50 [ 2168.823481][ T8583] try_charge+0x102c/0x15c0 [ 2168.827982][ T8583] ? find_held_lock+0x35/0x130 [ 2168.832757][ T8583] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2168.838315][ T8583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2168.844556][ T8583] ? kasan_check_read+0x11/0x20 [ 2168.849403][ T8583] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2168.854938][ T8583] mem_cgroup_try_charge+0x24d/0x5e0 [ 2168.860222][ T8583] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2168.865847][ T8583] wp_page_copy+0x408/0x1740 [ 2168.870421][ T8583] ? find_held_lock+0x35/0x130 [ 2168.875177][ T8583] ? pmd_pfn+0x1d0/0x1d0 [ 2168.879405][ T8583] ? lock_downgrade+0x880/0x880 [ 2168.884238][ T8583] ? swp_swapcount+0x540/0x540 [ 2168.888988][ T8583] ? kasan_check_read+0x11/0x20 [ 2168.893839][ T8583] ? do_raw_spin_unlock+0x57/0x270 [ 2168.898942][ T8583] do_wp_page+0x48e/0x1500 [ 2168.903350][ T8583] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2168.908717][ T8583] __handle_mm_fault+0x22e8/0x3ec0 [ 2168.913819][ T8583] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2168.919345][ T8583] ? find_held_lock+0x35/0x130 [ 2168.924091][ T8583] ? handle_mm_fault+0x322/0xb30 [ 2168.929027][ T8583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2168.935261][ T8583] ? kasan_check_read+0x11/0x20 [ 2168.940099][ T8583] handle_mm_fault+0x43f/0xb30 [ 2168.944852][ T8583] __do_page_fault+0x5ef/0xda0 [ 2168.949607][ T8583] do_page_fault+0x71/0x581 [ 2168.954092][ T8583] ? page_fault+0x8/0x30 [ 2168.958326][ T8583] page_fault+0x1e/0x30 [ 2168.962465][ T8583] RIP: 0033:0x4032a2 [ 2168.966345][ T8583] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 2168.985931][ T8583] RSP: 002b:00007ffc2e294be0 EFLAGS: 00010246 [ 2168.991979][ T8583] RAX: 0000000000000000 RBX: 0000000000211442 RCX: 0000000000412a80 [ 2168.999933][ T8583] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffc2e295d10 [ 2169.007885][ T8583] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000240d940 [ 2169.015836][ T8583] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc2e295d10 [ 2169.023788][ T8583] R13: 00007ffc2e295d00 R14: 0000000000000000 R15: 00007ffc2e295d10 [ 2169.039432][ T8583] memory: usage 352kB, limit 0kB, failcnt 603802 [ 2169.054457][ T8583] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2169.086055][ T8583] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2169.112682][ T8583] Memory cgroup stats for /syz3: cache:100KB rss:104KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB 18:50:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {0x0}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2169.285099][ T8583] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8583,uid=0 [ 2169.381718][ T8583] Memory cgroup out of memory: Killed process 8583 (syz-executor.3) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2169.444366][ T1043] oom_reaper: reaped process 8583 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2169.512108][ T8614] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2169.573306][ T8614] CPU: 1 PID: 8614 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2169.581229][ T8614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2169.591865][ T8614] Call Trace: [ 2169.595171][ T8614] dump_stack+0x172/0x1f0 [ 2169.599508][ T8614] dump_header+0x10f/0xb6c [ 2169.603922][ T8614] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2169.609727][ T8614] ? ___ratelimit+0x60/0x595 [ 2169.614318][ T8614] ? do_raw_spin_unlock+0x57/0x270 [ 2169.619438][ T8614] oom_kill_process.cold+0x10/0x15 [ 2169.624577][ T8614] out_of_memory+0x79a/0x1280 [ 2169.629287][ T8614] ? __sched_text_start+0x8/0x8 [ 2169.634152][ T8614] ? oom_killer_disable+0x280/0x280 [ 2169.639363][ T8614] ? cgroup_file_notify+0x140/0x1b0 [ 2169.644577][ T8614] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2169.650127][ T8614] ? memcg_event_wake+0x230/0x230 [ 2169.655184][ T8614] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2169.661000][ T8614] ? cgroup_file_notify+0x140/0x1b0 [ 2169.666217][ T8614] memory_max_write+0x169/0x300 [ 2169.671081][ T8614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2169.676573][ T8614] ? mem_cgroup_write+0x360/0x360 [ 2169.681597][ T8614] ? retint_kernel+0x2d/0x2d [ 2169.686215][ T8614] cgroup_file_write+0x245/0x7a0 [ 2169.691180][ T8614] ? mem_cgroup_write+0x360/0x360 [ 2169.696213][ T8614] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2169.701866][ T8614] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2169.707500][ T8614] kernfs_fop_write+0x2ba/0x480 [ 2169.712360][ T8614] ? __sb_start_write+0x1ac/0x360 [ 2169.717397][ T8614] __vfs_write+0x8d/0x110 [ 2169.721744][ T8614] ? kernfs_fop_open+0xd90/0xd90 [ 2169.726716][ T8614] vfs_write+0x20c/0x580 [ 2169.730968][ T8614] ksys_write+0x14f/0x2d0 [ 2169.735307][ T8614] ? __ia32_sys_read+0xb0/0xb0 [ 2169.740077][ T8614] ? do_syscall_64+0x26/0x610 [ 2169.744757][ T8614] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2169.750852][ T8614] ? do_syscall_64+0x26/0x610 [ 2169.755545][ T8614] __x64_sys_write+0x73/0xb0 [ 2169.760160][ T8614] do_syscall_64+0x103/0x610 [ 2169.764759][ T8614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2169.770655][ T8614] RIP: 0033:0x458da9 [ 2169.774550][ T8614] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2169.794160][ T8614] RSP: 002b:00007f51ad641c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2169.802581][ T8614] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2169.810677][ T8614] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 18:50:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={0xffffffffffffffff, &(0x7f0000000680), 0x0}, 0x18) 18:50:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={0xffffffffffffffff, &(0x7f0000000680), 0x0}, 0x18) 18:50:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, 0x0, 0x0}, 0x18) 18:50:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, 0x0, 0x0}, 0x18) 18:50:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r1, 0x0, 0x0}, 0x18) [ 2169.818654][ T8614] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2169.826716][ T8614] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f51ad6426d4 [ 2169.834794][ T8614] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2169.851389][ T8614] memory: usage 5224kB, limit 0kB, failcnt 367153 [ 2169.866886][ T8614] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2169.877316][ T8614] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2169.897570][ T8614] Memory cgroup stats for /syz2: cache:0KB rss:4312KB rss_huge:4096KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4228KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2169.979635][ T8614] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8613,uid=0 [ 2170.029346][ T8614] Memory cgroup out of memory: Killed process 8613 (syz-executor.2) total-vm:72448kB, anon-rss:4236kB, file-rss:35792kB, shmem-rss:0kB [ 2170.063428][ T1043] oom_reaper: reaped process 8613 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 18:50:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {0x0}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:50:54 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2171.037443][ T8643] IPVS: ftp: loaded support on port[0] = 21 [ 2171.632478][ T8643] chnl_net:caif_netlink_parms(): no params data found [ 2171.865212][ T8643] bridge0: port 1(bridge_slave_0) entered blocking state [ 2171.880734][ T8643] bridge0: port 1(bridge_slave_0) entered disabled state [ 2171.888739][ T8643] device bridge_slave_0 entered promiscuous mode [ 2171.902927][ T8643] bridge0: port 2(bridge_slave_1) entered blocking state [ 2171.915067][ T8643] bridge0: port 2(bridge_slave_1) entered disabled state [ 2171.926365][ T8643] device bridge_slave_1 entered promiscuous mode [ 2172.178454][ T8643] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2172.190283][ T8643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2172.216596][ T984] device bridge_slave_1 left promiscuous mode [ 2172.222983][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2172.280016][ T984] device bridge_slave_0 left promiscuous mode [ 2172.286237][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2172.343600][ T984] device bridge_slave_1 left promiscuous mode [ 2172.355033][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2172.402656][ T984] device bridge_slave_0 left promiscuous mode [ 2172.408852][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2179.181638][ T984] device hsr_slave_1 left promiscuous mode [ 2179.234104][ T984] device hsr_slave_0 left promiscuous mode [ 2179.303860][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2179.326040][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2179.354737][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2179.394565][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2179.538404][ T984] bond0 (unregistering): Released all slaves [ 2179.692181][ T984] device hsr_slave_1 left promiscuous mode [ 2179.764251][ T984] device hsr_slave_0 left promiscuous mode [ 2179.823797][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2179.846117][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2179.868130][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2179.924478][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2180.078581][ T984] bond0 (unregistering): Released all slaves [ 2180.214276][ T8643] team0: Port device team_slave_0 added [ 2180.224306][ T8643] team0: Port device team_slave_1 added [ 2180.311728][ T8643] device hsr_slave_0 entered promiscuous mode [ 2180.349332][ T8643] device hsr_slave_1 entered promiscuous mode [ 2180.491861][ T8643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2180.517928][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2180.537631][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2180.591904][ T8643] 8021q: adding VLAN 0 to HW filter on device team0 [ 2180.672965][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2180.684829][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2180.698245][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 2180.705479][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2180.719226][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2180.727917][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2180.742644][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 2180.749762][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2180.764187][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2180.773995][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2180.798838][ T8643] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2180.816448][ T8643] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2180.842929][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2180.859428][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2180.868286][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2180.883540][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2180.894510][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2180.907094][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2180.918336][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2180.943598][ T8643] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2180.975027][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2180.983957][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 18:51:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:51:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:51:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:51:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:51:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:51:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:51:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:51:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) 18:51:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:51:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:51:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2182.405223][ T8677] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2182.430837][ T8677] CPU: 0 PID: 8677 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2182.438783][ T8677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2182.448848][ T8677] Call Trace: [ 2182.452164][ T8677] dump_stack+0x172/0x1f0 [ 2182.456522][ T8677] dump_header+0x10f/0xb6c [ 2182.460973][ T8677] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2182.466797][ T8677] ? ___ratelimit+0x60/0x595 [ 2182.471405][ T8677] ? do_raw_spin_unlock+0x57/0x270 [ 2182.476536][ T8677] oom_kill_process.cold+0x10/0x15 [ 2182.481666][ T8677] out_of_memory+0x79a/0x1280 [ 2182.486455][ T8677] ? __sched_text_start+0x8/0x8 [ 2182.491328][ T8677] ? oom_killer_disable+0x280/0x280 [ 2182.496534][ T8677] ? cgroup_file_notify+0x140/0x1b0 [ 2182.501766][ T8677] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2182.507341][ T8677] ? memcg_event_wake+0x230/0x230 [ 2182.512415][ T8677] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2182.518233][ T8677] ? cgroup_file_notify+0x140/0x1b0 [ 2182.523449][ T8677] memory_max_write+0x169/0x300 [ 2182.528323][ T8677] ? kernfs_fop_write+0x204/0x480 [ 2182.533373][ T8677] ? mem_cgroup_write+0x360/0x360 [ 2182.538421][ T8677] ? lock_acquire+0x16f/0x3f0 [ 2182.543105][ T8677] ? kernfs_fop_write+0x227/0x480 [ 2182.548155][ T8677] cgroup_file_write+0x245/0x7a0 [ 2182.553107][ T8677] ? mem_cgroup_write+0x360/0x360 [ 2182.558135][ T8677] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2182.563795][ T8677] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2182.569452][ T8677] kernfs_fop_write+0x2ba/0x480 [ 2182.574321][ T8677] __vfs_write+0x8d/0x110 [ 2182.578656][ T8677] ? kernfs_fop_open+0xd90/0xd90 [ 2182.583619][ T8677] vfs_write+0x20c/0x580 [ 2182.587882][ T8677] ksys_write+0x14f/0x2d0 [ 2182.592229][ T8677] ? __ia32_sys_read+0xb0/0xb0 [ 2182.597007][ T8677] ? do_syscall_64+0x26/0x610 [ 2182.601691][ T8677] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.607766][ T8677] ? do_syscall_64+0x26/0x610 [ 2182.612478][ T8677] __x64_sys_write+0x73/0xb0 [ 2182.617082][ T8677] do_syscall_64+0x103/0x610 [ 2182.621690][ T8677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.627588][ T8677] RIP: 0033:0x458da9 [ 2182.631486][ T8677] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2182.653438][ T8677] RSP: 002b:00007f33b8e31c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2182.661853][ T8677] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2182.669846][ T8677] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2182.677823][ T8677] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2182.685803][ T8677] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f33b8e326d4 [ 2182.693786][ T8677] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2182.729440][ T8677] memory: usage 6264kB, limit 0kB, failcnt 508 [ 2182.754823][ T8677] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 18:51:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2182.780639][ T8677] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2182.802139][ T8677] Memory cgroup stats for /syz4: cache:60KB rss:4172KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4228KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2182.925272][ T8677] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8676,uid=0 [ 2182.959696][ T8677] Memory cgroup out of memory: Killed process 8676 (syz-executor.4) total-vm:72448kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 2183.095742][ T1043] oom_reaper: reaped process 8676 (syz-executor.4), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB 18:51:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:51:07 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2183.518879][ T8703] IPVS: ftp: loaded support on port[0] = 21 18:51:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) [ 2183.573780][ T8643] syz-executor.4 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 2183.632172][ T8643] CPU: 1 PID: 8643 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2183.640094][ T8643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2183.640099][ T8643] Call Trace: [ 2183.640131][ T8643] dump_stack+0x172/0x1f0 [ 2183.640149][ T8643] dump_header+0x10f/0xb6c [ 2183.640168][ T8643] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2183.668092][ T8643] ? ___ratelimit+0x60/0x595 [ 2183.672694][ T8643] ? do_raw_spin_unlock+0x57/0x270 [ 2183.677816][ T8643] oom_kill_process.cold+0x10/0x15 [ 2183.682915][ T8643] out_of_memory+0x79a/0x1280 [ 2183.682932][ T8643] ? lock_downgrade+0x880/0x880 [ 2183.682945][ T8643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2183.682961][ T8643] ? oom_killer_disable+0x280/0x280 [ 2183.698668][ T8643] ? find_held_lock+0x35/0x130 [ 2183.698695][ T8643] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2183.714146][ T8643] ? memcg_event_wake+0x230/0x230 [ 2183.714167][ T8643] ? do_raw_spin_unlock+0x57/0x270 [ 2183.724268][ T8643] ? _raw_spin_unlock+0x2d/0x50 [ 2183.729127][ T8643] try_charge+0x102c/0x15c0 [ 2183.729141][ T8643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2183.729155][ T8643] ? should_fail+0x1de/0x852 [ 2183.729177][ T8643] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2183.744469][ T8643] ? rcu_read_lock_sched_held+0x110/0x130 [ 2183.744483][ T8643] ? __alloc_pages_nodemask+0x599/0x7e0 [ 2183.744504][ T8643] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2183.761737][ T8643] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2183.761756][ T8643] ? cache_grow_begin+0x594/0x860 [ 2183.772465][ T8643] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2183.772483][ T8643] ? trace_hardirqs_on+0x67/0x230 [ 2183.782746][ T8643] cache_grow_begin+0x5c0/0x860 [ 2183.782762][ T8643] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2183.782775][ T8643] ? __cpuset_node_allowed+0x136/0x540 [ 2183.782792][ T8643] fallback_alloc+0x1fd/0x2d0 [ 2183.804291][ T8643] ____cache_alloc_node+0x1be/0x1e0 [ 2183.804314][ T8643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2183.804331][ T8643] kmem_cache_alloc+0x1e8/0x6f0 [ 2183.820388][ T8643] ? __save_stack_trace+0x99/0x100 [ 2183.820408][ T8643] __alloc_file+0x27/0x300 [ 2183.834736][ T8643] alloc_empty_file+0x72/0x170 [ 2183.834759][ T8643] path_openat+0xef/0x46e0 [ 2183.843902][ T8643] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2183.849712][ T8643] ? kasan_slab_alloc+0xf/0x20 [ 2183.854470][ T8643] ? kmem_cache_alloc+0x11a/0x6f0 [ 2183.854482][ T8643] ? getname_flags+0xd6/0x5b0 [ 2183.854497][ T8643] ? getname+0x1a/0x20 [ 2183.868219][ T8643] ? do_sys_open+0x2c9/0x5d0 [ 2183.872803][ T8643] ? __x64_sys_open+0x7e/0xc0 [ 2183.872817][ T8643] ? do_syscall_64+0x103/0x610 [ 2183.872832][ T8643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2183.872855][ T8643] ? __lock_acquire+0x548/0x3fb0 [ 2183.872872][ T8643] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2183.888335][ T8643] ? __alloc_fd+0x44d/0x560 [ 2183.888353][ T8643] do_filp_open+0x1a1/0x280 [ 2183.903112][ T8643] ? may_open_dev+0x100/0x100 [ 2183.903130][ T8643] ? lock_downgrade+0x880/0x880 [ 2183.903150][ T8643] ? kasan_check_read+0x11/0x20 [ 2183.912291][ T8643] ? do_raw_spin_unlock+0x57/0x270 [ 2183.921942][ T8643] ? _raw_spin_unlock+0x2d/0x50 [ 2183.921956][ T8643] ? __alloc_fd+0x44d/0x560 [ 2183.921982][ T8643] do_sys_open+0x3fe/0x5d0 [ 2183.921999][ T8643] ? filp_open+0x80/0x80 [ 2183.940792][ T8643] ? __detach_mounts+0x320/0x320 [ 2183.940815][ T8643] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2183.949952][ T8643] ? do_syscall_64+0x26/0x610 [ 2183.949968][ T8643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2183.949978][ T8643] ? do_syscall_64+0x26/0x610 [ 2183.949997][ T8643] __x64_sys_open+0x7e/0xc0 [ 2183.960089][ T8643] do_syscall_64+0x103/0x610 [ 2183.960109][ T8643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2183.960123][ T8643] RIP: 0033:0x456dd0 [ 2183.970817][ T8643] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 2183.970825][ T8643] RSP: 002b:00007ffcae1d6c10 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 2183.970842][ T8643] RAX: ffffffffffffffda RBX: 0000000000214c6a RCX: 0000000000456dd0 [ 2183.979886][ T8643] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffcae1d7df0 [ 2183.979894][ T8643] RBP: 0000000000000009 R08: 0000000000000001 R09: 0000000002603940 [ 2183.979902][ T8643] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffcae1d7df0 [ 2183.979909][ T8643] R13: 00007ffcae1d7de0 R14: 0000000000000000 R15: 00007ffcae1d7df0 [ 2184.068351][ T8643] memory: usage 1884kB, limit 0kB, failcnt 520 [ 2184.080672][ T8643] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2184.088295][ T8643] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2184.100998][ T8643] Memory cgroup stats for /syz4: cache:60KB rss:4KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:48KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2184.151317][ T8643] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8643,uid=0 [ 2184.179778][ T8643] Memory cgroup out of memory: Killed process 8643 (syz-executor.4) total-vm:72316kB, anon-rss:92kB, file-rss:35712kB, shmem-rss:0kB [ 2184.205573][ T1043] oom_reaper: reaped process 8643 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2184.278683][ T8703] chnl_net:caif_netlink_parms(): no params data found [ 2184.756622][ T8703] bridge0: port 1(bridge_slave_0) entered blocking state [ 2184.780084][ T8703] bridge0: port 1(bridge_slave_0) entered disabled state [ 2184.787836][ T8703] device bridge_slave_0 entered promiscuous mode [ 2184.816414][ T8703] bridge0: port 2(bridge_slave_1) entered blocking state [ 2184.833991][ T8703] bridge0: port 2(bridge_slave_1) entered disabled state [ 2184.852094][ T8703] device bridge_slave_1 entered promiscuous mode [ 2184.896210][ T8703] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2184.921991][ T8703] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2184.967225][ T8703] team0: Port device team_slave_0 added [ 2184.991125][ T8703] team0: Port device team_slave_1 added [ 2185.045166][ T8703] device hsr_slave_0 entered promiscuous mode [ 2185.104354][ T8703] device hsr_slave_1 entered promiscuous mode [ 2185.167752][ T8703] bridge0: port 2(bridge_slave_1) entered blocking state [ 2185.174877][ T8703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2185.182269][ T8703] bridge0: port 1(bridge_slave_0) entered blocking state [ 2185.189356][ T8703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2185.257116][ T7182] bridge0: port 1(bridge_slave_0) entered disabled state [ 2185.269912][ T7182] bridge0: port 2(bridge_slave_1) entered disabled state [ 2185.307715][ T8703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2185.336187][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2185.349745][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2185.374822][ T8703] 8021q: adding VLAN 0 to HW filter on device team0 [ 2185.407310][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2185.423040][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2185.434292][ T8646] bridge0: port 1(bridge_slave_0) entered blocking state [ 2185.441398][ T8646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2185.473450][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2185.482464][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2185.491452][ T7182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2185.498507][ T7182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2185.507379][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2185.516176][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2185.525921][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2185.534947][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2185.543809][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2185.552901][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2185.570261][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2185.578661][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2185.597746][ T8703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2185.617158][ T8703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2185.625396][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2185.640199][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2185.648352][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2186.027369][ T8703] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2186.537971][ T8725] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2186.557273][ T8725] CPU: 1 PID: 8725 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2186.565190][ T8725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2186.575241][ T8725] Call Trace: [ 2186.578539][ T8725] dump_stack+0x172/0x1f0 [ 2186.582878][ T8725] dump_header+0x10f/0xb6c [ 2186.587298][ T8725] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2186.593104][ T8725] ? ___ratelimit+0x60/0x595 [ 2186.597700][ T8725] ? do_raw_spin_unlock+0x57/0x270 [ 2186.602814][ T8725] oom_kill_process.cold+0x10/0x15 [ 2186.607930][ T8725] out_of_memory+0x79a/0x1280 [ 2186.612608][ T8725] ? retint_kernel+0x2d/0x2d [ 2186.617185][ T8725] ? oom_killer_disable+0x280/0x280 [ 2186.622372][ T8725] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2186.627893][ T8725] ? memcg_event_wake+0x230/0x230 [ 2186.632900][ T8725] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2186.638685][ T8725] ? cgroup_file_notify+0x140/0x1b0 [ 2186.643870][ T8725] memory_max_write+0x169/0x300 [ 2186.648700][ T8725] ? kernfs_fop_write+0x204/0x480 [ 2186.653710][ T8725] ? mem_cgroup_write+0x360/0x360 [ 2186.659469][ T8725] ? lock_acquire+0x16f/0x3f0 [ 2186.664147][ T8725] ? kernfs_fop_write+0x227/0x480 [ 2186.669170][ T8725] cgroup_file_write+0x245/0x7a0 [ 2186.674102][ T8725] ? mem_cgroup_write+0x360/0x360 [ 2186.679128][ T8725] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2186.684761][ T8725] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2186.690374][ T8725] kernfs_fop_write+0x2ba/0x480 [ 2186.695208][ T8725] __vfs_write+0x8d/0x110 [ 2186.699516][ T8725] ? kernfs_fop_open+0xd90/0xd90 [ 2186.704435][ T8725] vfs_write+0x20c/0x580 [ 2186.708661][ T8725] ksys_write+0x14f/0x2d0 [ 2186.712973][ T8725] ? __ia32_sys_read+0xb0/0xb0 [ 2186.717718][ T8725] ? do_syscall_64+0x26/0x610 [ 2186.722387][ T8725] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.728430][ T8725] ? do_syscall_64+0x26/0x610 [ 2186.733091][ T8725] __x64_sys_write+0x73/0xb0 [ 2186.737669][ T8725] do_syscall_64+0x103/0x610 [ 2186.742239][ T8725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.748106][ T8725] RIP: 0033:0x458da9 [ 2186.751987][ T8725] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2186.771622][ T8725] RSP: 002b:00007f5b50765c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2186.780016][ T8725] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2186.787974][ T8725] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2186.795945][ T8725] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2186.803900][ T8725] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b507666d4 [ 2186.811851][ T8725] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2186.831031][ T8725] memory: usage 4736kB, limit 0kB, failcnt 603803 [ 2186.837703][ T8725] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2186.851181][ T8725] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2186.858114][ T8725] Memory cgroup stats for /syz3: [ 2186.858215][ T8725] cache:100KB rss:4180KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2186.903114][ T8725] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8724,uid=0 [ 2186.927424][ T8725] Memory cgroup out of memory: Killed process 8724 (syz-executor.3) total-vm:72452kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2186.960112][ T1043] oom_reaper: reaped process 8724 (syz-executor.3), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 18:51:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2187.325551][ T8703] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2187.336995][ T8703] CPU: 0 PID: 8703 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2187.344893][ T8703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2187.354940][ T8703] Call Trace: [ 2187.358233][ T8703] dump_stack+0x172/0x1f0 [ 2187.362567][ T8703] dump_header+0x10f/0xb6c [ 2187.366981][ T8703] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2187.372789][ T8703] ? ___ratelimit+0x60/0x595 [ 2187.377374][ T8703] ? do_raw_spin_unlock+0x57/0x270 [ 2187.382487][ T8703] oom_kill_process.cold+0x10/0x15 [ 2187.387596][ T8703] out_of_memory+0x79a/0x1280 [ 2187.392271][ T8703] ? lock_downgrade+0x880/0x880 [ 2187.397120][ T8703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2187.403364][ T8703] ? oom_killer_disable+0x280/0x280 [ 2187.408553][ T8703] ? find_held_lock+0x35/0x130 [ 2187.413326][ T8703] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2187.418868][ T8703] ? memcg_event_wake+0x230/0x230 [ 2187.423881][ T8703] ? do_raw_spin_unlock+0x57/0x270 [ 2187.428981][ T8703] ? _raw_spin_unlock+0x2d/0x50 [ 2187.433823][ T8703] try_charge+0x102c/0x15c0 [ 2187.438301][ T8703] ? find_held_lock+0x35/0x130 [ 2187.443049][ T8703] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2187.448584][ T8703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2187.454901][ T8703] ? kasan_check_read+0x11/0x20 [ 2187.459741][ T8703] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2187.465274][ T8703] mem_cgroup_try_charge+0x24d/0x5e0 [ 2187.470551][ T8703] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2187.476173][ T8703] wp_page_copy+0x408/0x1740 [ 2187.480747][ T8703] ? find_held_lock+0x35/0x130 [ 2187.485499][ T8703] ? pmd_pfn+0x1d0/0x1d0 [ 2187.489735][ T8703] ? lock_downgrade+0x880/0x880 [ 2187.494575][ T8703] ? swp_swapcount+0x540/0x540 [ 2187.499329][ T8703] ? kasan_check_read+0x11/0x20 [ 2187.504168][ T8703] ? do_raw_spin_unlock+0x57/0x270 [ 2187.509269][ T8703] do_wp_page+0x48e/0x1500 [ 2187.513675][ T8703] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2187.519046][ T8703] __handle_mm_fault+0x22e8/0x3ec0 [ 2187.524157][ T8703] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2187.529691][ T8703] ? find_held_lock+0x35/0x130 [ 2187.534443][ T8703] ? handle_mm_fault+0x322/0xb30 [ 2187.539378][ T8703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2187.545606][ T8703] ? kasan_check_read+0x11/0x20 [ 2187.550443][ T8703] handle_mm_fault+0x43f/0xb30 [ 2187.555201][ T8703] __do_page_fault+0x5ef/0xda0 [ 2187.559964][ T8703] do_page_fault+0x71/0x581 [ 2187.564459][ T8703] ? page_fault+0x8/0x30 [ 2187.568678][ T8703] page_fault+0x1e/0x30 [ 2187.572811][ T8703] RIP: 0033:0x4032a2 [ 2187.576684][ T8703] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 2187.596267][ T8703] RSP: 002b:00007ffe64dedd00 EFLAGS: 00010246 [ 2187.603473][ T8703] RAX: 0000000000000000 RBX: 0000000000215ccf RCX: 0000000000412a80 [ 2187.611601][ T8703] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe64deee30 [ 2187.619568][ T8703] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000161b940 [ 2187.627528][ T8703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe64deee30 [ 2187.635478][ T8703] R13: 00007ffe64deee20 R14: 0000000000000000 R15: 00007ffe64deee30 [ 2187.644246][ T8703] memory: usage 364kB, limit 0kB, failcnt 603811 [ 2187.653903][ T8703] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2187.661620][ T8703] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2187.668461][ T8703] Memory cgroup stats for [ 2187.668469][ T8703] /syz3: cache:100KB rss:16KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2187.691459][ T8703] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8703,uid=0 [ 2187.691544][ T8703] Memory cgroup out of memory: Killed process 8703 (syz-executor.3) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2187.721153][ T1043] oom_reaper: reaped process 8703 (syz-executor.3), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2189.419896][ T984] device bridge_slave_1 left promiscuous mode [ 2189.426145][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2189.480024][ T984] device bridge_slave_0 left promiscuous mode [ 2189.486223][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2189.541577][ T984] device bridge_slave_1 left promiscuous mode [ 2189.547775][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2189.600006][ T984] device bridge_slave_0 left promiscuous mode [ 2189.606204][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2195.871767][ T984] device hsr_slave_1 left promiscuous mode [ 2195.914132][ T984] device hsr_slave_0 left promiscuous mode [ 2195.973591][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2195.996847][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2196.018108][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2196.083138][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2196.215922][ T984] bond0 (unregistering): Released all slaves [ 2196.362062][ T984] device hsr_slave_1 left promiscuous mode [ 2196.404165][ T984] device hsr_slave_0 left promiscuous mode [ 2196.463625][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2196.478093][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2196.493289][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2196.545277][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2196.696132][ T984] bond0 (unregistering): Released all slaves [ 2200.829912][ T984] device bridge_slave_1 left promiscuous mode [ 2200.836276][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2200.894656][ T984] device bridge_slave_0 left promiscuous mode [ 2200.901450][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.071491][ T984] device hsr_slave_1 left promiscuous mode [ 2204.114036][ T984] device hsr_slave_0 left promiscuous mode [ 2204.173492][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2204.188003][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2204.203178][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2204.254485][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2204.378370][ T984] bond0 (unregistering): Released all slaves 18:52:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:52:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) 18:52:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:52:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:06 executing program 0: 18:52:06 executing program 0: 18:52:06 executing program 0: 18:52:06 executing program 0: 18:52:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2242.990902][ T8761] IPVS: ftp: loaded support on port[0] = 21 [ 2243.098105][ T8761] chnl_net:caif_netlink_parms(): no params data found [ 2243.178207][ T8761] bridge0: port 1(bridge_slave_0) entered blocking state [ 2243.185422][ T8761] bridge0: port 1(bridge_slave_0) entered disabled state [ 2243.193416][ T8761] device bridge_slave_0 entered promiscuous mode [ 2243.260696][ T8761] bridge0: port 2(bridge_slave_1) entered blocking state [ 2243.267789][ T8761] bridge0: port 2(bridge_slave_1) entered disabled state [ 2243.289958][ T8761] device bridge_slave_1 entered promiscuous mode [ 2243.316790][ T984] device bridge_slave_1 left promiscuous mode [ 2243.334083][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2243.420007][ T984] device bridge_slave_0 left promiscuous mode [ 2243.426180][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2244.972055][ T984] device hsr_slave_1 left promiscuous mode [ 2245.013781][ T984] device hsr_slave_0 left promiscuous mode [ 2245.082088][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2245.093460][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2245.105465][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2245.164350][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2245.252301][ T984] bond0 (unregistering): Released all slaves [ 2245.392932][ T8761] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2245.402803][ T8761] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2245.419714][ T8761] team0: Port device team_slave_0 added [ 2245.429207][ T8761] team0: Port device team_slave_1 added [ 2245.431675][ T8766] IPVS: ftp: loaded support on port[0] = 21 [ 2245.491599][ T8761] device hsr_slave_0 entered promiscuous mode [ 2245.559258][ T8761] device hsr_slave_1 entered promiscuous mode [ 2245.633282][ T8765] IPVS: ftp: loaded support on port[0] = 21 [ 2245.746816][ T8761] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2245.758979][ T8765] chnl_net:caif_netlink_parms(): no params data found [ 2245.782959][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2245.791606][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2245.840505][ T8761] 8021q: adding VLAN 0 to HW filter on device team0 [ 2245.922833][ T8765] bridge0: port 1(bridge_slave_0) entered blocking state [ 2245.936040][ T8765] bridge0: port 1(bridge_slave_0) entered disabled state [ 2245.944311][ T8765] device bridge_slave_0 entered promiscuous mode [ 2245.960121][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2245.968648][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2245.989549][ T8621] bridge0: port 1(bridge_slave_0) entered blocking state [ 2245.996625][ T8621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2246.004845][ T8765] bridge0: port 2(bridge_slave_1) entered blocking state [ 2246.016525][ T8765] bridge0: port 2(bridge_slave_1) entered disabled state [ 2246.024916][ T8765] device bridge_slave_1 entered promiscuous mode [ 2246.036993][ T8766] chnl_net:caif_netlink_parms(): no params data found [ 2246.061357][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2246.069505][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2246.078004][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2246.086487][ T8621] bridge0: port 2(bridge_slave_1) entered blocking state [ 2246.093602][ T8621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2246.101778][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2246.111038][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2246.119730][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2246.128258][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2246.136777][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2246.145910][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2246.154295][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2246.168875][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2246.190983][ T8761] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2246.207983][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2246.227809][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2246.238240][ T8765] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2246.248679][ T8765] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2246.284445][ T8761] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2246.307744][ T8765] team0: Port device team_slave_0 added [ 2246.328560][ T8765] team0: Port device team_slave_1 added [ 2246.354979][ T8766] bridge0: port 1(bridge_slave_0) entered blocking state [ 2246.376229][ T8766] bridge0: port 1(bridge_slave_0) entered disabled state [ 2246.388342][ T8766] device bridge_slave_0 entered promiscuous mode [ 2246.421494][ T8765] device hsr_slave_0 entered promiscuous mode [ 2246.465885][ T8765] device hsr_slave_1 entered promiscuous mode [ 2246.520528][ T8766] bridge0: port 2(bridge_slave_1) entered blocking state [ 2246.527613][ T8766] bridge0: port 2(bridge_slave_1) entered disabled state [ 2246.553878][ T8766] device bridge_slave_1 entered promiscuous mode [ 2246.606357][ T8766] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2246.644843][ T8766] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2246.709372][ T8765] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2246.723726][ T8766] team0: Port device team_slave_0 added [ 2246.732272][ T8766] team0: Port device team_slave_1 added [ 2246.745897][ T8765] 8021q: adding VLAN 0 to HW filter on device team0 [ 2246.766795][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2246.808493][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2246.829483][ T8775] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2246.848581][ T8775] CPU: 0 PID: 8775 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2246.856827][ T8775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2246.856841][ T8775] Call Trace: [ 2246.870180][ T8775] dump_stack+0x172/0x1f0 [ 2246.870210][ T8775] dump_header+0x10f/0xb6c [ 2246.870232][ T8775] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2246.870251][ T8775] ? ___ratelimit+0x60/0x595 [ 2246.870267][ T8775] ? do_raw_spin_unlock+0x57/0x270 [ 2246.870292][ T8775] oom_kill_process.cold+0x10/0x15 [ 2246.870315][ T8775] out_of_memory+0x79a/0x1280 [ 2246.870328][ T8775] ? retint_kernel+0x2d/0x2d [ 2246.870355][ T8775] ? oom_killer_disable+0x280/0x280 [ 2246.870391][ T8775] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2246.870407][ T8775] ? memcg_event_wake+0x230/0x230 [ 2246.870440][ T8775] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2246.879172][ T8775] ? cgroup_file_notify+0x140/0x1b0 [ 2246.879203][ T8775] memory_max_write+0x169/0x300 [ 2246.879231][ T8775] ? mem_cgroup_write+0x360/0x360 [ 2246.879281][ T8775] cgroup_file_write+0x245/0x7a0 [ 2246.889647][ T8775] ? mem_cgroup_write+0x360/0x360 [ 2246.889666][ T8775] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2246.889701][ T8775] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2246.889718][ T8775] kernfs_fop_write+0x2ba/0x480 [ 2246.889747][ T8775] __vfs_write+0x8d/0x110 [ 2246.899937][ T8775] ? kernfs_fop_open+0xd90/0xd90 [ 2246.899965][ T8775] vfs_write+0x20c/0x580 [ 2246.899996][ T8775] ksys_write+0x14f/0x2d0 [ 2246.900021][ T8775] ? __ia32_sys_read+0xb0/0xb0 [ 2246.900042][ T8775] ? do_syscall_64+0x26/0x610 [ 2246.900064][ T8775] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2246.909300][ T8775] ? do_syscall_64+0x26/0x610 [ 2246.909333][ T8775] __x64_sys_write+0x73/0xb0 [ 2246.909368][ T8775] do_syscall_64+0x103/0x610 [ 2246.909393][ T8775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2246.909409][ T8775] RIP: 0033:0x458da9 [ 2246.920108][ T8775] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2246.920119][ T8775] RSP: 002b:00007f28dd298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2246.920143][ T8775] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2246.920153][ T8775] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2246.920165][ T8775] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2246.920175][ T8775] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28dd2996d4 [ 2246.920185][ T8775] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2246.925215][ T8775] memory: usage 4668kB, limit 0kB, failcnt 626661 [ 2246.942276][ T8775] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2246.958018][ T8775] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2246.968619][ T8775] Memory cgroup stats for /syz2: cache:0KB rss:4220KB rss_huge:4096KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2246.977832][ T8775] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8774,uid=0 [ 2246.992528][ T8775] Memory cgroup out of memory: Killed process 8774 (syz-executor.2) total-vm:72452kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2247.004741][ T1043] oom_reaper: reaped process 8774 (syz-executor.2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 2247.189144][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2247.198484][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2247.206920][ T7182] bridge0: port 1(bridge_slave_0) entered blocking state [ 2247.214038][ T7182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2247.229114][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2247.237870][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2247.254602][ T7182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2247.261754][ T7182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2247.275441][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 18:52:11 executing program 2: 18:52:11 executing program 0: 18:52:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2247.320827][ T8766] device hsr_slave_0 entered promiscuous mode [ 2247.341722][ T8761] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2247.361312][ T8761] CPU: 0 PID: 8761 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2247.369232][ T8761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2247.369569][ T8766] device hsr_slave_1 entered promiscuous mode [ 2247.379277][ T8761] Call Trace: [ 2247.379299][ T8761] dump_stack+0x172/0x1f0 [ 2247.379317][ T8761] dump_header+0x10f/0xb6c [ 2247.379331][ T8761] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2247.379345][ T8761] ? ___ratelimit+0x60/0x595 [ 2247.379362][ T8761] ? do_raw_spin_unlock+0x57/0x270 [ 2247.412902][ T8761] oom_kill_process.cold+0x10/0x15 [ 2247.418006][ T8761] out_of_memory+0x79a/0x1280 [ 2247.422673][ T8761] ? lock_downgrade+0x880/0x880 [ 2247.427519][ T8761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2247.433753][ T8761] ? oom_killer_disable+0x280/0x280 [ 2247.438960][ T8761] ? find_held_lock+0x35/0x130 [ 2247.443741][ T8761] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2247.449294][ T8761] ? memcg_event_wake+0x230/0x230 [ 2247.454421][ T8761] ? do_raw_spin_unlock+0x57/0x270 [ 2247.459542][ T8761] ? _raw_spin_unlock+0x2d/0x50 [ 2247.464402][ T8761] try_charge+0x102c/0x15c0 [ 2247.468905][ T8761] ? find_held_lock+0x35/0x130 [ 2247.473676][ T8761] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2247.479249][ T8761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2247.485504][ T8761] ? kasan_check_read+0x11/0x20 [ 2247.490361][ T8761] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2247.495916][ T8761] mem_cgroup_try_charge+0x24d/0x5e0 [ 2247.501211][ T8761] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2247.506850][ T8761] wp_page_copy+0x408/0x1740 [ 2247.511446][ T8761] ? find_held_lock+0x35/0x130 [ 2247.516224][ T8761] ? pmd_pfn+0x1d0/0x1d0 [ 2247.520479][ T8761] ? lock_downgrade+0x880/0x880 [ 2247.525329][ T8761] ? swp_swapcount+0x540/0x540 [ 2247.530121][ T8761] ? kasan_check_read+0x11/0x20 [ 2247.534981][ T8761] ? do_raw_spin_unlock+0x57/0x270 [ 2247.540102][ T8761] do_wp_page+0x48e/0x1500 [ 2247.544529][ T8761] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2247.549914][ T8761] __handle_mm_fault+0x22e8/0x3ec0 [ 2247.555036][ T8761] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2247.560588][ T8761] ? find_held_lock+0x35/0x130 [ 2247.565359][ T8761] ? handle_mm_fault+0x322/0xb30 [ 2247.570310][ T8761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2247.576561][ T8761] ? kasan_check_read+0x11/0x20 [ 2247.581439][ T8761] handle_mm_fault+0x43f/0xb30 [ 2247.587752][ T8761] __do_page_fault+0x5ef/0xda0 [ 2247.592531][ T8761] do_page_fault+0x71/0x581 [ 2247.597037][ T8761] ? page_fault+0x8/0x30 [ 2247.601285][ T8761] page_fault+0x1e/0x30 [ 2247.605436][ T8761] RIP: 0033:0x4032a2 [ 2247.609332][ T8761] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 2247.628936][ T8761] RSP: 002b:00007ffe11d2bbe0 EFLAGS: 00010246 [ 2247.635009][ T8761] RAX: 0000000000000000 RBX: 000000000022487c RCX: 0000000000412a80 [ 2247.642990][ T8761] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe11d2cd10 [ 2247.653755][ T8761] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000002483940 [ 2247.661753][ T8761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe11d2cd10 [ 2247.669751][ T8761] R13: 00007ffe11d2cd00 R14: 0000000000000000 R15: 00007ffe11d2cd10 [ 2247.688670][ T8761] memory: usage 296kB, limit 0kB, failcnt 626669 [ 2247.698476][ T8761] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2247.713088][ T8761] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2247.737251][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2247.744400][ T8761] Memory cgroup stats for /syz2: cache:0KB rss:56KB rss_huge:0KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2247.759677][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2247.807481][ T8761] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8761,uid=0 [ 2247.855985][ T8765] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2247.866518][ T8761] Memory cgroup out of memory: Killed process 8761 (syz-executor.2) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2247.867146][ T1043] oom_reaper: reaped process 8761 (syz-executor.2), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2247.898591][ T8765] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2247.915590][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2247.925087][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2247.959826][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2247.984210][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2247.998388][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2248.006847][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2248.020619][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2248.029003][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2248.037328][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2248.045141][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2248.081875][ T8766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2248.094505][ T8765] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2248.111151][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2248.120294][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2248.318255][ T8790] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2248.345645][ T8790] CPU: 1 PID: 8790 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2248.353683][ T8790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2248.363740][ T8790] Call Trace: [ 2248.367050][ T8790] dump_stack+0x172/0x1f0 [ 2248.371565][ T8790] dump_header+0x10f/0xb6c [ 2248.375986][ T8790] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2248.382144][ T8790] ? ___ratelimit+0x60/0x595 [ 2248.386736][ T8790] ? do_raw_spin_unlock+0x57/0x270 [ 2248.391856][ T8790] oom_kill_process.cold+0x10/0x15 [ 2248.396966][ T8790] out_of_memory+0x79a/0x1280 [ 2248.401646][ T8790] ? __sched_text_start+0x8/0x8 [ 2248.406502][ T8790] ? oom_killer_disable+0x280/0x280 [ 2248.411712][ T8790] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2248.417258][ T8790] ? memcg_event_wake+0x230/0x230 [ 2248.422286][ T8790] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2248.428096][ T8790] ? cgroup_file_notify+0x140/0x1b0 [ 2248.433301][ T8790] memory_max_write+0x169/0x300 [ 2248.438152][ T8790] ? kernfs_fop_write+0x204/0x480 [ 2248.443179][ T8790] ? mem_cgroup_write+0x360/0x360 [ 2248.448201][ T8790] ? lock_acquire+0x16f/0x3f0 [ 2248.452962][ T8790] ? kernfs_fop_write+0x227/0x480 [ 2248.457995][ T8790] cgroup_file_write+0x245/0x7a0 [ 2248.462943][ T8790] ? mem_cgroup_write+0x360/0x360 [ 2248.467969][ T8790] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2248.473617][ T8790] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2248.479252][ T8790] kernfs_fop_write+0x2ba/0x480 [ 2248.484107][ T8790] __vfs_write+0x8d/0x110 [ 2248.488435][ T8790] ? kernfs_fop_open+0xd90/0xd90 [ 2248.493375][ T8790] vfs_write+0x20c/0x580 [ 2248.497622][ T8790] ksys_write+0x14f/0x2d0 [ 2248.501956][ T8790] ? __ia32_sys_read+0xb0/0xb0 [ 2248.506720][ T8790] ? do_syscall_64+0x26/0x610 [ 2248.511392][ T8790] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2248.517452][ T8790] ? do_syscall_64+0x26/0x610 [ 2248.522135][ T8790] __x64_sys_write+0x73/0xb0 [ 2248.526723][ T8790] do_syscall_64+0x103/0x610 [ 2248.531305][ T8790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2248.537196][ T8790] RIP: 0033:0x458da9 [ 2248.541080][ T8790] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2248.560667][ T8790] RSP: 002b:00007f8da01e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2248.569056][ T8790] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2248.577007][ T8790] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2248.584965][ T8790] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2248.592920][ T8790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8da01e26d4 [ 2248.600889][ T8790] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2248.615425][ T8790] memory: usage 4756kB, limit 0kB, failcnt 603812 [ 2248.622186][ T8790] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2248.622284][ T8790] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2248.622366][ T8790] Memory cgroup stats for /syz3: cache:100KB rss:4164KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4192KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2248.622774][ T8790] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8789,uid=0 [ 2248.623508][ T8790] Memory cgroup out of memory: Killed process 8789 (syz-executor.3) total-vm:72452kB, anon-rss:4180kB, file-rss:34816kB, shmem-rss:0kB [ 2248.693481][ T1043] oom_reaper: reaped process 8789 (syz-executor.3), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2248.709289][ T8766] 8021q: adding VLAN 0 to HW filter on device team0 [ 2248.745645][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2248.755537][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2248.770379][ T8625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2248.771439][ T8765] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2248.777438][ T8625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2248.801055][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2248.809114][ T8765] CPU: 1 PID: 8765 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2248.812887][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2248.817037][ T8765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2248.825405][ T8625] bridge0: port 2(bridge_slave_1) entered blocking state [ 2248.835024][ T8765] Call Trace: [ 2248.835050][ T8765] dump_stack+0x172/0x1f0 [ 2248.835082][ T8765] dump_header+0x10f/0xb6c [ 2248.842111][ T8625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2248.845345][ T8765] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2248.850056][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2248.854425][ T8765] ? ___ratelimit+0x60/0x595 [ 2248.875265][ T8765] ? do_raw_spin_unlock+0x57/0x270 [ 2248.880619][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2248.884928][ T8765] oom_kill_process.cold+0x10/0x15 [ 2248.897373][ T8765] out_of_memory+0x79a/0x1280 [ 2248.902043][ T8765] ? lock_downgrade+0x880/0x880 [ 2248.902056][ T8765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2248.902072][ T8765] ? oom_killer_disable+0x280/0x280 [ 2248.907496][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2248.913129][ T8765] ? find_held_lock+0x35/0x130 [ 2248.913153][ T8765] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2248.913169][ T8765] ? memcg_event_wake+0x230/0x230 [ 2248.919075][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2248.926220][ T8765] ? do_raw_spin_unlock+0x57/0x270 [ 2248.954465][ T8765] ? _raw_spin_unlock+0x2d/0x50 [ 2248.956312][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2248.959321][ T8765] try_charge+0x102c/0x15c0 [ 2248.959335][ T8765] ? find_held_lock+0x35/0x130 [ 2248.959358][ T8765] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2248.973086][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2248.976384][ T8765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2248.996022][ T8765] ? kasan_check_read+0x11/0x20 [ 2249.000861][ T8765] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2249.006390][ T8765] mem_cgroup_try_charge+0x24d/0x5e0 [ 2249.011660][ T8765] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2249.017274][ T8765] wp_page_copy+0x408/0x1740 [ 2249.021861][ T8765] ? find_held_lock+0x35/0x130 [ 2249.026615][ T8765] ? pmd_pfn+0x1d0/0x1d0 [ 2249.030840][ T8765] ? lock_downgrade+0x880/0x880 [ 2249.035672][ T8765] ? swp_swapcount+0x540/0x540 [ 2249.040418][ T8765] ? kasan_check_read+0x11/0x20 [ 2249.045249][ T8765] ? do_raw_spin_unlock+0x57/0x270 [ 2249.050344][ T8765] do_wp_page+0x48e/0x1500 [ 2249.054744][ T8765] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2249.060105][ T8765] __handle_mm_fault+0x22e8/0x3ec0 [ 2249.065202][ T8765] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2249.070724][ T8765] ? find_held_lock+0x35/0x130 [ 2249.075471][ T8765] ? handle_mm_fault+0x322/0xb30 [ 2249.080398][ T8765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2249.086634][ T8765] ? kasan_check_read+0x11/0x20 [ 2249.091473][ T8765] handle_mm_fault+0x43f/0xb30 [ 2249.096220][ T8765] __do_page_fault+0x5ef/0xda0 [ 2249.100970][ T8765] do_page_fault+0x71/0x581 [ 2249.105458][ T8765] ? page_fault+0x8/0x30 [ 2249.109682][ T8765] page_fault+0x1e/0x30 [ 2249.113828][ T8765] RIP: 0033:0x42ff36 [ 2249.117703][ T8765] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2249.137284][ T8765] RSP: 002b:00007ffc4a8f1530 EFLAGS: 00010206 [ 2249.143345][ T8765] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2249.151312][ T8765] RDX: 000000000240a930 RSI: 0000000002412970 RDI: 0000000000000003 [ 2249.159263][ T8765] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002409940 [ 2249.167212][ T8765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2249.175166][ T8765] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 2249.184120][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2249.213081][ T8766] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2249.219031][ T8765] memory: usage 384kB, limit 0kB, failcnt 603820 [ 2249.226115][ T8766] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2249.230223][ T8765] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2249.248204][ T8765] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2249.256098][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2249.263915][ T8765] Memory cgroup stats for /syz3: cache:100KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2249.280116][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2249.285153][ T8765] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8765,uid=0 [ 2249.300326][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2249.308430][ T8765] Memory cgroup out of memory: Killed process 8765 (syz-executor.3) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 2249.321252][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2249.330088][ T1043] oom_reaper: reaped process 8765 (syz-executor.3), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2249.343246][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2249.362163][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2249.381370][ T8766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2249.620818][ T8793] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2249.632587][ T8793] CPU: 0 PID: 8793 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2249.640482][ T8793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2249.657212][ T8793] Call Trace: [ 2249.660499][ T8793] dump_stack+0x172/0x1f0 [ 2249.664821][ T8793] dump_header+0x10f/0xb6c [ 2249.669242][ T8793] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2249.675046][ T8793] ? ___ratelimit+0x60/0x595 [ 2249.679621][ T8793] ? do_raw_spin_unlock+0x57/0x270 [ 2249.684723][ T8793] oom_kill_process.cold+0x10/0x15 [ 2249.689851][ T8793] out_of_memory+0x79a/0x1280 [ 2249.694540][ T8793] ? __sched_text_start+0x8/0x8 [ 2249.699377][ T8793] ? oom_killer_disable+0x280/0x280 [ 2249.704573][ T8793] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2249.710113][ T8793] ? memcg_event_wake+0x230/0x230 [ 2249.715146][ T8793] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2249.720951][ T8793] ? cgroup_file_notify+0x140/0x1b0 [ 2249.726153][ T8793] memory_max_write+0x169/0x300 [ 2249.730999][ T8793] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2249.736474][ T8793] ? mem_cgroup_write+0x360/0x360 [ 2249.741489][ T8793] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2249.746944][ T8793] cgroup_file_write+0x245/0x7a0 [ 2249.751883][ T8793] ? mem_cgroup_write+0x360/0x360 [ 2249.756908][ T8793] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2249.762545][ T8793] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2249.768162][ T8793] kernfs_fop_write+0x2ba/0x480 [ 2249.773027][ T8793] __vfs_write+0x8d/0x110 [ 2249.777357][ T8793] ? kernfs_fop_open+0xd90/0xd90 [ 2249.782283][ T8793] vfs_write+0x20c/0x580 [ 2249.786517][ T8793] ksys_write+0x14f/0x2d0 [ 2249.790856][ T8793] ? __ia32_sys_read+0xb0/0xb0 [ 2249.795623][ T8793] ? do_syscall_64+0x26/0x610 [ 2249.800291][ T8793] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2249.806345][ T8793] ? do_syscall_64+0x26/0x610 [ 2249.811034][ T8793] __x64_sys_write+0x73/0xb0 [ 2249.815625][ T8793] do_syscall_64+0x103/0x610 [ 2249.820204][ T8793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2249.826075][ T8793] RIP: 0033:0x458da9 [ 2249.829973][ T8793] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2249.849582][ T8793] RSP: 002b:00007f3975da1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2249.858006][ T8793] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2249.865962][ T8793] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2249.874014][ T8793] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2249.881984][ T8793] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3975da26d4 [ 2249.890049][ T8793] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2249.937770][ T8793] memory: usage 6016kB, limit 0kB, failcnt 521 [ 2249.945280][ T8793] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2249.953420][ T8793] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2249.960703][ T8793] Memory cgroup stats for /syz4: cache:60KB rss:4152KB rss_huge:4096KB [ 2249.960890][ T8793] shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4212KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2249.984458][ T8793] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8792,uid=0 [ 2249.999956][ T8793] Memory cgroup out of memory: Killed process 8792 (syz-executor.4) total-vm:72452kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB 18:52:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:52:14 executing program 0: 18:52:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:14 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e115963293", 0x2e}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:52:14 executing program 2: [ 2250.176161][ T8766] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2250.219153][ T8766] CPU: 1 PID: 8766 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2250.227088][ T8766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2250.237147][ T8766] Call Trace: [ 2250.240455][ T8766] dump_stack+0x172/0x1f0 [ 2250.244801][ T8766] dump_header+0x10f/0xb6c [ 2250.249227][ T8766] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2250.255038][ T8766] ? ___ratelimit+0x60/0x595 [ 2250.259635][ T8766] ? do_raw_spin_unlock+0x57/0x270 [ 2250.264827][ T8766] oom_kill_process.cold+0x10/0x15 [ 2250.269955][ T8766] out_of_memory+0x79a/0x1280 [ 2250.274635][ T8766] ? lock_downgrade+0x880/0x880 [ 2250.279487][ T8766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2250.285730][ T8766] ? oom_killer_disable+0x280/0x280 [ 2250.290937][ T8766] ? find_held_lock+0x35/0x130 [ 2250.295725][ T8766] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2250.301280][ T8766] ? memcg_event_wake+0x230/0x230 [ 2250.306312][ T8766] ? do_raw_spin_unlock+0x57/0x270 [ 2250.311425][ T8766] ? _raw_spin_unlock+0x2d/0x50 [ 2250.316299][ T8766] try_charge+0x102c/0x15c0 [ 2250.320815][ T8766] ? find_held_lock+0x35/0x130 [ 2250.325591][ T8766] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2250.331140][ T8766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2250.337385][ T8766] ? kasan_check_read+0x11/0x20 [ 2250.342245][ T8766] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2250.347805][ T8766] mem_cgroup_try_charge+0x24d/0x5e0 [ 2250.353105][ T8766] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2250.358743][ T8766] wp_page_copy+0x408/0x1740 [ 2250.363334][ T8766] ? find_held_lock+0x35/0x130 [ 2250.368106][ T8766] ? pmd_pfn+0x1d0/0x1d0 [ 2250.372353][ T8766] ? lock_downgrade+0x880/0x880 [ 2250.377208][ T8766] ? swp_swapcount+0x540/0x540 [ 2250.381991][ T8766] ? kasan_check_read+0x11/0x20 [ 2250.386844][ T8766] ? do_raw_spin_unlock+0x57/0x270 [ 2250.391954][ T8766] do_wp_page+0x48e/0x1500 [ 2250.396377][ T8766] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2250.401762][ T8766] __handle_mm_fault+0x22e8/0x3ec0 [ 2250.406889][ T8766] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2250.412452][ T8766] ? find_held_lock+0x35/0x130 [ 2250.417223][ T8766] ? handle_mm_fault+0x322/0xb30 [ 2250.422169][ T8766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2250.428411][ T8766] ? kasan_check_read+0x11/0x20 [ 2250.433270][ T8766] handle_mm_fault+0x43f/0xb30 [ 2250.438048][ T8766] __do_page_fault+0x5ef/0xda0 [ 2250.442825][ T8766] do_page_fault+0x71/0x581 [ 2250.447330][ T8766] ? page_fault+0x8/0x30 [ 2250.451571][ T8766] page_fault+0x1e/0x30 [ 2250.455721][ T8766] RIP: 0033:0x42ff36 [ 2250.459613][ T8766] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2250.479222][ T8766] RSP: 002b:00007ffc159eb8d0 EFLAGS: 00010206 [ 2250.485396][ T8766] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2250.493382][ T8766] RDX: 00000000022b9930 RSI: 00000000022c1970 RDI: 0000000000000003 [ 2250.501367][ T8766] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000022b8940 [ 2250.509347][ T8766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 18:52:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) [ 2250.517322][ T8766] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 18:52:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2250.743655][ T8766] memory: usage 1636kB, limit 0kB, failcnt 529 [ 2250.770541][ T8766] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2250.781461][ T8766] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 18:52:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e115963293", 0x2e}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2250.792734][ T8766] Memory cgroup stats for /syz4: cache:60KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2250.841860][ T8766] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8766,uid=0 [ 2250.872970][ T8766] Memory cgroup out of memory: Killed process 8766 (syz-executor.4) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 2250.934258][ T1043] oom_reaper: reaped process 8766 (syz-executor.4), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2250.946698][ T8804] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2250.983062][ T8804] CPU: 1 PID: 8804 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2250.990995][ T8804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2251.001051][ T8804] Call Trace: [ 2251.004350][ T8804] dump_stack+0x172/0x1f0 [ 2251.008684][ T8804] dump_header+0x10f/0xb6c [ 2251.013106][ T8804] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2251.018931][ T8804] ? ___ratelimit+0x60/0x595 [ 2251.023526][ T8804] ? do_raw_spin_unlock+0x57/0x270 [ 2251.028644][ T8804] oom_kill_process.cold+0x10/0x15 [ 2251.033762][ T8804] out_of_memory+0x79a/0x1280 [ 2251.038465][ T8804] ? retint_kernel+0x2d/0x2d [ 2251.043237][ T8804] ? oom_killer_disable+0x280/0x280 [ 2251.048448][ T8804] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2251.054000][ T8804] ? memcg_event_wake+0x230/0x230 [ 2251.059044][ T8804] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2251.064869][ T8804] ? cgroup_file_notify+0x140/0x1b0 [ 2251.070091][ T8804] memory_max_write+0x169/0x300 [ 2251.074953][ T8804] ? retint_kernel+0x2d/0x2d [ 2251.079558][ T8804] ? mem_cgroup_write+0x360/0x360 [ 2251.084598][ T8804] cgroup_file_write+0x245/0x7a0 [ 2251.089541][ T8804] ? mem_cgroup_write+0x360/0x360 [ 2251.094569][ T8804] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2251.100222][ T8804] ? __sanitizer_cov_trace_const_cmp4+0x1/0x20 [ 2251.106392][ T8804] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2251.112036][ T8804] kernfs_fop_write+0x2ba/0x480 [ 2251.116915][ T8804] __vfs_write+0x8d/0x110 [ 2251.121256][ T8804] ? kernfs_fop_open+0xd90/0xd90 [ 2251.126215][ T8804] vfs_write+0x20c/0x580 [ 2251.130506][ T8804] ksys_write+0x14f/0x2d0 [ 2251.134862][ T8804] ? __ia32_sys_read+0xb0/0xb0 [ 2251.139639][ T8804] ? do_syscall_64+0x26/0x610 [ 2251.144328][ T8804] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2251.150412][ T8804] ? do_syscall_64+0x26/0x610 [ 2251.155122][ T8804] __x64_sys_write+0x73/0xb0 [ 2251.159744][ T8804] do_syscall_64+0x103/0x610 [ 2251.164348][ T8804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2251.170249][ T8804] RIP: 0033:0x458da9 [ 2251.174153][ T8804] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2251.193771][ T8804] RSP: 002b:00007fb9e933cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2251.202203][ T8804] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2251.210191][ T8804] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000008 [ 2251.218172][ T8804] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2251.226157][ T8804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9e933d6d4 18:52:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e115963293", 0x2e}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2251.234280][ T8804] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff 18:52:15 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2251.486569][ T8804] memory: usage 5688kB, limit 0kB, failcnt 109 [ 2251.501719][ T8804] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2251.512374][ T8804] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2251.529129][ T8804] Memory cgroup stats for /syz0: cache:456KB rss:4180KB rss_huge:4096KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:4236KB inactive_file:8KB active_file:8KB unevictable:0KB [ 2251.551089][ T8804] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8803,uid=0 [ 2251.566601][ T8804] Memory cgroup out of memory: Killed process 8803 (syz-executor.0) total-vm:72448kB, anon-rss:4236kB, file-rss:35788kB, shmem-rss:0kB [ 2251.583861][ T1043] oom_reaper: reaped process 8803 (syz-executor.0), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB 18:52:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}], 0x6, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2251.720085][ T4631] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2251.757696][ T4631] CPU: 0 PID: 4631 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2251.765625][ T4631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2251.775689][ T4631] Call Trace: [ 2251.778988][ T4631] dump_stack+0x172/0x1f0 [ 2251.783319][ T4631] dump_header+0x10f/0xb6c [ 2251.787733][ T4631] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2251.793545][ T4631] ? ___ratelimit+0x60/0x595 [ 2251.798140][ T4631] ? do_raw_spin_unlock+0x57/0x270 [ 2251.803259][ T4631] oom_kill_process.cold+0x10/0x15 [ 2251.808367][ T4631] out_of_memory+0x79a/0x1280 [ 2251.813051][ T4631] ? lock_downgrade+0x880/0x880 [ 2251.817910][ T4631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2251.824159][ T4631] ? oom_killer_disable+0x280/0x280 [ 2251.829355][ T4631] ? find_held_lock+0x35/0x130 [ 2251.834131][ T4631] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2251.839675][ T4631] ? memcg_event_wake+0x230/0x230 [ 2251.844702][ T4631] ? do_raw_spin_unlock+0x57/0x270 [ 2251.849821][ T4631] ? _raw_spin_unlock+0x2d/0x50 [ 2251.854678][ T4631] try_charge+0x102c/0x15c0 [ 2251.859192][ T4631] ? find_held_lock+0x35/0x130 [ 2251.863977][ T4631] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2251.869534][ T4631] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2251.875093][ T4631] ? find_held_lock+0x35/0x130 [ 2251.879871][ T4631] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2251.885436][ T4631] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2251.890994][ T4631] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2251.896233][ T4631] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2251.901807][ T4631] __memcg_kmem_charge+0x136/0x300 [ 2251.906931][ T4631] __alloc_pages_nodemask+0x437/0x7e0 [ 2251.912311][ T4631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2251.918550][ T4631] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2251.924251][ T4631] ? copy_process.part.0+0x1d08/0x7980 [ 2251.929689][ T4631] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2251.934948][ T4631] ? trace_hardirqs_on+0x67/0x230 [ 2251.939948][ T4631] ? kasan_check_read+0x11/0x20 [ 2251.944778][ T4631] copy_process.part.0+0x3e0/0x7980 [ 2251.949957][ T4631] ? __lock_acquire+0x548/0x3fb0 [ 2251.954874][ T4631] ? wp_page_reuse+0x159/0x1d0 [ 2251.959641][ T4631] ? __might_fault+0x12b/0x1e0 [ 2251.964388][ T4631] ? __cleanup_sighand+0x60/0x60 [ 2251.969319][ T4631] ? lock_downgrade+0x880/0x880 [ 2251.974169][ T4631] _do_fork+0x257/0xfd0 [ 2251.978309][ T4631] ? fork_idle+0x1d0/0x1d0 [ 2251.982710][ T4631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2251.988149][ T4631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2251.993585][ T4631] ? do_syscall_64+0x26/0x610 [ 2251.998261][ T4631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2252.004305][ T4631] ? do_syscall_64+0x26/0x610 [ 2252.008976][ T4631] __x64_sys_clone+0xbf/0x150 [ 2252.013648][ T4631] do_syscall_64+0x103/0x610 [ 2252.018219][ T4631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2252.024087][ T4631] RIP: 0033:0x45737a [ 2252.027957][ T4631] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2252.047536][ T4631] RSP: 002b:00007fff80fb8350 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2252.055924][ T4631] RAX: ffffffffffffffda RBX: 00007fff80fb8350 RCX: 000000000045737a [ 2252.063874][ T4631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2252.071822][ T4631] RBP: 00007fff80fb8390 R08: 0000000000000001 R09: 0000000002887940 [ 2252.079792][ T4631] R10: 0000000002887c10 R11: 0000000000000246 R12: 0000000000000001 [ 2252.087741][ T4631] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff80fb83e0 [ 2252.097418][ T4631] memory: usage 1264kB, limit 0kB, failcnt 117 [ 2252.113371][ T4631] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2252.121341][ T4631] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2252.128314][ T4631] Memory cgroup stats for /syz0: cache:456KB rss:68KB rss_huge:0KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:52KB inactive_file:8KB active_file:0KB unevictable:0KB [ 2252.151283][ T4631] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4631,uid=0 [ 2252.168687][ T4631] Memory cgroup out of memory: Killed process 4631 (syz-executor.0) total-vm:72316kB, anon-rss:96kB, file-rss:35712kB, shmem-rss:0kB [ 2252.183405][ T1043] oom_reaper: reaped process 4631 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 18:52:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:52:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2252.257539][ T8824] IPVS: ftp: loaded support on port[0] = 21 18:52:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:52:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2253.035270][ T8836] IPVS: ftp: loaded support on port[0] = 21 [ 2253.353573][ T8824] chnl_net:caif_netlink_parms(): no params data found [ 2253.436418][ T8836] chnl_net:caif_netlink_parms(): no params data found [ 2253.480781][ T8824] bridge0: port 1(bridge_slave_0) entered blocking state [ 2253.487878][ T8824] bridge0: port 1(bridge_slave_0) entered disabled state [ 2253.496453][ T8824] device bridge_slave_0 entered promiscuous mode [ 2253.566361][ T8824] bridge0: port 2(bridge_slave_1) entered blocking state [ 2253.573822][ T8824] bridge0: port 2(bridge_slave_1) entered disabled state [ 2253.581852][ T8824] device bridge_slave_1 entered promiscuous mode [ 2253.588688][ T8836] bridge0: port 1(bridge_slave_0) entered blocking state [ 2253.596209][ T8836] bridge0: port 1(bridge_slave_0) entered disabled state [ 2253.604989][ T8836] device bridge_slave_0 entered promiscuous mode [ 2253.616992][ T8836] bridge0: port 2(bridge_slave_1) entered blocking state [ 2253.624174][ T8836] bridge0: port 2(bridge_slave_1) entered disabled state [ 2253.632153][ T8836] device bridge_slave_1 entered promiscuous mode [ 2253.639840][ T984] device bridge_slave_1 left promiscuous mode [ 2253.646013][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2253.720168][ T984] device bridge_slave_0 left promiscuous mode [ 2253.726352][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2255.402029][ T984] device hsr_slave_1 left promiscuous mode [ 2255.454332][ T984] device hsr_slave_0 left promiscuous mode [ 2255.514711][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2255.526136][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2255.537305][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2255.586868][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2255.680277][ T984] bond0 (unregistering): Released all slaves [ 2255.786603][ T8836] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2255.800986][ T8824] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2255.810808][ T8824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2255.824193][ T8836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2255.842013][ T8847] IPVS: ftp: loaded support on port[0] = 21 [ 2255.855368][ T8824] team0: Port device team_slave_0 added [ 2255.876654][ T8824] team0: Port device team_slave_1 added [ 2255.892317][ T8836] team0: Port device team_slave_0 added [ 2255.961757][ T8824] device hsr_slave_0 entered promiscuous mode [ 2255.999511][ T8824] device hsr_slave_1 entered promiscuous mode [ 2256.064158][ T8836] team0: Port device team_slave_1 added [ 2256.142047][ T8836] device hsr_slave_0 entered promiscuous mode [ 2256.199477][ T8836] device hsr_slave_1 entered promiscuous mode [ 2256.378276][ T8824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2256.434704][ T8824] 8021q: adding VLAN 0 to HW filter on device team0 [ 2256.442421][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2256.463276][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2256.471689][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2256.480128][ T8847] chnl_net:caif_netlink_parms(): no params data found [ 2256.500213][ T8836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2256.520348][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2256.529868][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2256.538234][ T7182] bridge0: port 1(bridge_slave_0) entered blocking state [ 2256.545334][ T7182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2256.553384][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2256.562602][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2256.571374][ T7182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2256.578424][ T7182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2256.586448][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2256.595358][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2256.604661][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2256.624592][ T8836] 8021q: adding VLAN 0 to HW filter on device team0 [ 2256.645037][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2256.657251][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2256.673120][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2256.685891][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2256.697916][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2256.714278][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2256.764087][ T8824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2256.784945][ T8824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2256.807489][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2256.824740][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2256.836686][ T7182] bridge0: port 1(bridge_slave_0) entered blocking state [ 2256.843793][ T7182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2256.859267][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2256.867927][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2256.884150][ T7182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2256.891255][ T7182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2256.907446][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2256.916264][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2256.933104][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2256.945914][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2256.966808][ T8836] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2256.985290][ T8836] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2257.003825][ T8847] bridge0: port 1(bridge_slave_0) entered blocking state [ 2257.012217][ T8847] bridge0: port 1(bridge_slave_0) entered disabled state [ 2257.020464][ T8847] device bridge_slave_0 entered promiscuous mode [ 2257.028414][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2257.044385][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2257.054319][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2257.068741][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2257.085511][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2257.095335][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2257.111441][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2257.125983][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2257.145642][ T8847] bridge0: port 2(bridge_slave_1) entered blocking state [ 2257.159010][ T8847] bridge0: port 2(bridge_slave_1) entered disabled state [ 2257.166976][ T8847] device bridge_slave_1 entered promiscuous mode [ 2257.192285][ T8836] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2257.199603][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2257.215491][ T8847] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2257.242468][ T8824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2257.257798][ T8847] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2257.318469][ T8847] team0: Port device team_slave_0 added [ 2257.330463][ T8847] team0: Port device team_slave_1 added 18:52:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:21 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}], 0x6, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:52:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2257.462363][ T8847] device hsr_slave_0 entered promiscuous mode [ 2257.549367][ T8847] device hsr_slave_1 entered promiscuous mode [ 2257.561082][ T8857] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2257.619891][ T8847] bridge0: port 2(bridge_slave_1) entered blocking state [ 2257.627022][ T8847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2257.638583][ T8857] CPU: 0 PID: 8857 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2257.650163][ T8857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2257.660237][ T8857] Call Trace: [ 2257.663559][ T8857] dump_stack+0x172/0x1f0 [ 2257.667913][ T8857] dump_header+0x10f/0xb6c [ 2257.672353][ T8857] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2257.678193][ T8857] ? ___ratelimit+0x60/0x595 [ 2257.682809][ T8857] ? do_raw_spin_unlock+0x57/0x270 [ 2257.687964][ T8857] oom_kill_process.cold+0x10/0x15 [ 2257.693107][ T8857] out_of_memory+0x79a/0x1280 [ 2257.697825][ T8857] ? oom_killer_disable+0x280/0x280 [ 2257.703061][ T8857] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2257.708626][ T8857] ? memcg_event_wake+0x230/0x230 [ 2257.713684][ T8857] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2257.719518][ T8857] ? cgroup_file_notify+0x140/0x1b0 [ 2257.724750][ T8857] memory_max_write+0x169/0x300 [ 2257.729626][ T8857] ? kernfs_fop_write+0x204/0x480 [ 2257.734685][ T8857] ? mem_cgroup_write+0x360/0x360 [ 2257.739735][ T8857] ? lock_acquire+0x16f/0x3f0 [ 2257.744454][ T8857] ? kernfs_fop_write+0x227/0x480 [ 2257.749519][ T8857] cgroup_file_write+0x245/0x7a0 [ 2257.754488][ T8857] ? mem_cgroup_write+0x360/0x360 [ 2257.759545][ T8857] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2257.765221][ T8857] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2257.770893][ T8857] kernfs_fop_write+0x2ba/0x480 [ 2257.775793][ T8857] __vfs_write+0x8d/0x110 [ 2257.780158][ T8857] ? kernfs_fop_open+0xd90/0xd90 [ 2257.785128][ T8857] vfs_write+0x20c/0x580 [ 2257.789416][ T8857] ksys_write+0x14f/0x2d0 [ 2257.793773][ T8857] ? __ia32_sys_read+0xb0/0xb0 [ 2257.798566][ T8857] ? do_syscall_64+0x26/0x610 [ 2257.803258][ T8857] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2257.809352][ T8857] ? do_syscall_64+0x26/0x610 [ 2257.814061][ T8857] __x64_sys_write+0x73/0xb0 [ 2257.818672][ T8857] do_syscall_64+0x103/0x610 [ 2257.823311][ T8857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2257.829220][ T8857] RIP: 0033:0x458da9 [ 2257.833126][ T8857] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2257.852750][ T8857] RSP: 002b:00007f48b8583c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2257.861206][ T8857] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2257.869202][ T8857] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2257.877195][ T8857] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2257.885209][ T8857] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48b85846d4 [ 2257.893206][ T8857] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2257.959479][ T8646] bridge0: port 2(bridge_slave_1) entered disabled state [ 2258.039109][ T8857] memory: usage 4808kB, limit 0kB, failcnt 603821 [ 2258.082735][ T8857] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2258.159126][ T8857] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2258.188260][ T8847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2258.192499][ T8857] Memory cgroup stats for /syz3: cache:100KB rss:4148KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4216KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2258.244563][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2258.257630][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2258.259135][ T8857] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8855,uid=0 [ 2258.286891][ T8847] 8021q: adding VLAN 0 to HW filter on device team0 [ 2258.324653][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2258.341500][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2258.350047][ T8857] Memory cgroup out of memory: Killed process 8855 (syz-executor.3) total-vm:72584kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 2258.358087][ T8621] bridge0: port 1(bridge_slave_0) entered blocking state [ 2258.371046][ T8621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2258.397910][ T1043] oom_reaper: reaped process 8855 (syz-executor.3), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 2258.481326][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2258.495307][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2258.505672][ T8624] bridge0: port 2(bridge_slave_1) entered blocking state [ 2258.512809][ T8624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2258.522499][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 18:52:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:22 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:22 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0", 0x45}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2258.531484][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2258.540802][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2258.546607][ T8836] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2258.553659][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2258.580493][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2258.596818][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2258.596979][ T8836] CPU: 1 PID: 8836 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2258.606933][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2258.612540][ T8836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2258.612545][ T8836] Call Trace: [ 2258.612570][ T8836] dump_stack+0x172/0x1f0 [ 2258.612588][ T8836] dump_header+0x10f/0xb6c [ 2258.612603][ T8836] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2258.612618][ T8836] ? ___ratelimit+0x60/0x595 [ 2258.612631][ T8836] ? do_raw_spin_unlock+0x57/0x270 [ 2258.612646][ T8836] oom_kill_process.cold+0x10/0x15 [ 2258.612662][ T8836] out_of_memory+0x79a/0x1280 [ 2258.612675][ T8836] ? lock_downgrade+0x880/0x880 [ 2258.612689][ T8836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2258.612702][ T8836] ? oom_killer_disable+0x280/0x280 [ 2258.612711][ T8836] ? find_held_lock+0x35/0x130 [ 2258.612731][ T8836] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2258.612742][ T8836] ? memcg_event_wake+0x230/0x230 [ 2258.612758][ T8836] ? do_raw_spin_unlock+0x57/0x270 [ 2258.612771][ T8836] ? _raw_spin_unlock+0x2d/0x50 [ 2258.612786][ T8836] try_charge+0x102c/0x15c0 [ 2258.612797][ T8836] ? find_held_lock+0x35/0x130 [ 2258.612817][ T8836] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2258.612833][ T8836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2258.612850][ T8836] ? kasan_check_read+0x11/0x20 [ 2258.612866][ T8836] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2258.612884][ T8836] mem_cgroup_try_charge+0x24d/0x5e0 [ 2258.621805][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2258.630753][ T8836] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2258.630770][ T8836] wp_page_copy+0x408/0x1740 [ 2258.630783][ T8836] ? find_held_lock+0x35/0x130 [ 2258.630801][ T8836] ? pmd_pfn+0x1d0/0x1d0 [ 2258.630815][ T8836] ? lock_downgrade+0x880/0x880 [ 2258.630832][ T8836] ? swp_swapcount+0x540/0x540 [ 2258.637650][ T8847] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2258.638437][ T8836] ? kasan_check_read+0x11/0x20 [ 2258.657505][ T8847] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2258.658309][ T8836] ? do_raw_spin_unlock+0x57/0x270 [ 2258.658328][ T8836] do_wp_page+0x48e/0x1500 [ 2258.658356][ T8836] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2258.700682][ T8847] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2258.704795][ T8836] __handle_mm_fault+0x22e8/0x3ec0 [ 2258.704816][ T8836] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2258.724440][ T8836] ? find_held_lock+0x35/0x130 [ 2258.724459][ T8836] ? handle_mm_fault+0x322/0xb30 [ 2258.848579][ T8836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2258.854828][ T8836] ? kasan_check_read+0x11/0x20 [ 2258.859700][ T8836] handle_mm_fault+0x43f/0xb30 [ 2258.864461][ T8836] __do_page_fault+0x5ef/0xda0 [ 2258.869227][ T8836] do_page_fault+0x71/0x581 [ 2258.873737][ T8836] ? page_fault+0x8/0x30 [ 2258.877992][ T8836] page_fault+0x1e/0x30 [ 2258.882157][ T8836] RIP: 0033:0x4032a2 [ 2258.886055][ T8836] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 2258.905667][ T8836] RSP: 002b:00007fff67924dd0 EFLAGS: 00010246 [ 2258.906281][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2258.911730][ T8836] RAX: 0000000000000000 RBX: 00000000002274fc RCX: 0000000000412a80 [ 2258.911739][ T8836] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff67925f00 [ 2258.911747][ T8836] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000015cb940 [ 2258.911753][ T8836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff67925f00 [ 2258.911760][ T8836] R13: 00007fff67925ef0 R14: 0000000000000000 R15: 00007fff67925f00 [ 2258.971240][ T8836] memory: usage 392kB, limit 0kB, failcnt 603837 [ 2258.979075][ T8836] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2258.999240][ T8836] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2259.020244][ T8836] Memory cgroup stats for /syz3: cache:100KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2259.069275][ T8836] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8836,uid=0 [ 2259.092658][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2259.113655][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2259.125230][ T8836] Memory cgroup out of memory: Killed process 8836 (syz-executor.3) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 2259.193613][ T8896] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2259.199301][ T1043] oom_reaper: reaped process 8836 (syz-executor.3), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2259.253223][ T8896] CPU: 0 PID: 8896 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2259.261181][ T8896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2259.271260][ T8896] Call Trace: [ 2259.274582][ T8896] dump_stack+0x172/0x1f0 [ 2259.278947][ T8896] dump_header+0x10f/0xb6c [ 2259.283392][ T8896] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2259.289223][ T8896] ? ___ratelimit+0x60/0x595 [ 2259.293838][ T8896] ? do_raw_spin_unlock+0x57/0x270 [ 2259.298984][ T8896] oom_kill_process.cold+0x10/0x15 [ 2259.304127][ T8896] out_of_memory+0x79a/0x1280 [ 2259.308825][ T8896] ? retint_kernel+0x2d/0x2d [ 2259.313458][ T8896] ? oom_killer_disable+0x280/0x280 [ 2259.318710][ T8896] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2259.320933][ T8899] IPVS: ftp: loaded support on port[0] = 21 [ 2259.324270][ T8896] ? memcg_event_wake+0x230/0x230 [ 2259.324315][ T8896] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2259.335223][ T8896] ? cgroup_file_notify+0x140/0x1b0 [ 2259.335258][ T8896] memory_max_write+0x169/0x300 [ 2259.346272][ T8896] ? mem_cgroup_write+0x360/0x360 [ 2259.346321][ T8896] cgroup_file_write+0x245/0x7a0 [ 2259.356149][ T8896] ? mem_cgroup_write+0x360/0x360 [ 2259.356169][ T8896] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2259.356204][ T8896] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2259.366199][ T8896] kernfs_fop_write+0x2ba/0x480 [ 2259.366231][ T8896] __vfs_write+0x8d/0x110 [ 2259.366248][ T8896] ? kernfs_fop_open+0xd90/0xd90 [ 2259.377480][ T8896] vfs_write+0x20c/0x580 [ 2259.377512][ T8896] ksys_write+0x14f/0x2d0 [ 2259.386682][ T8896] ? __ia32_sys_read+0xb0/0xb0 [ 2259.386737][ T8896] ? do_syscall_64+0x26/0x610 [ 2259.395866][ T8896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2259.395883][ T8896] ? do_syscall_64+0x26/0x610 [ 2259.395916][ T8896] __x64_sys_write+0x73/0xb0 [ 2259.404969][ T8896] do_syscall_64+0x103/0x610 [ 2259.404994][ T8896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2259.405011][ T8896] RIP: 0033:0x458da9 [ 2259.415720][ T8896] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2259.415732][ T8896] RSP: 002b:00007f8b82f37c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2259.415748][ T8896] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2259.415762][ T8896] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2259.424990][ T8896] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2259.425002][ T8896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b82f386d4 18:52:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2259.425013][ T8896] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2259.474194][ T8896] memory: usage 6020kB, limit 0kB, failcnt 530 18:52:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2259.552989][ T8896] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2259.621446][ T8896] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2259.634495][ T8896] Memory cgroup stats for /syz4: cache:60KB rss:4200KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2259.675263][ T8896] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8894,uid=0 [ 2259.718296][ T8896] Memory cgroup out of memory: Killed process 8894 (syz-executor.4) total-vm:72452kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2259.735662][ T1043] oom_reaper: reaped process 8894 (syz-executor.4), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 18:52:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:52:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2259.825783][ T8847] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2259.853836][ T8847] CPU: 1 PID: 8847 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2259.861779][ T8847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2259.871929][ T8847] Call Trace: [ 2259.875241][ T8847] dump_stack+0x172/0x1f0 [ 2259.879583][ T8847] dump_header+0x10f/0xb6c [ 2259.884007][ T8847] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2259.889819][ T8847] ? ___ratelimit+0x60/0x595 [ 2259.894408][ T8847] ? do_raw_spin_unlock+0x57/0x270 [ 2259.899532][ T8847] oom_kill_process.cold+0x10/0x15 [ 2259.904656][ T8847] out_of_memory+0x79a/0x1280 [ 2259.909346][ T8847] ? lock_downgrade+0x880/0x880 [ 2259.914196][ T8847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2259.920548][ T8847] ? oom_killer_disable+0x280/0x280 [ 2259.925743][ T8847] ? find_held_lock+0x35/0x130 [ 2259.930518][ T8847] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2259.936061][ T8847] ? memcg_event_wake+0x230/0x230 [ 2259.941210][ T8847] ? do_raw_spin_unlock+0x57/0x270 [ 2259.946336][ T8847] ? _raw_spin_unlock+0x2d/0x50 [ 2259.951204][ T8847] try_charge+0x102c/0x15c0 [ 2259.955712][ T8847] ? find_held_lock+0x35/0x130 [ 2259.960489][ T8847] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2259.966047][ T8847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2259.972306][ T8847] ? kasan_check_read+0x11/0x20 [ 2259.977179][ T8847] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2259.982738][ T8847] mem_cgroup_try_charge+0x24d/0x5e0 [ 2259.988034][ T8847] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2259.993672][ T8847] wp_page_copy+0x408/0x1740 [ 2259.998276][ T8847] ? find_held_lock+0x35/0x130 [ 2260.003050][ T8847] ? pmd_pfn+0x1d0/0x1d0 [ 2260.007307][ T8847] ? lock_downgrade+0x880/0x880 [ 2260.012170][ T8847] ? swp_swapcount+0x540/0x540 [ 2260.016940][ T8847] ? kasan_check_read+0x11/0x20 [ 2260.021794][ T8847] ? do_raw_spin_unlock+0x57/0x270 [ 2260.026920][ T8847] do_wp_page+0x48e/0x1500 [ 2260.031356][ T8847] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2260.036734][ T8847] __handle_mm_fault+0x22e8/0x3ec0 [ 2260.041857][ T8847] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2260.047412][ T8847] ? find_held_lock+0x35/0x130 [ 2260.052194][ T8847] ? handle_mm_fault+0x322/0xb30 [ 2260.057155][ T8847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2260.063408][ T8847] ? kasan_check_read+0x11/0x20 [ 2260.068286][ T8847] handle_mm_fault+0x43f/0xb30 [ 2260.073059][ T8847] __do_page_fault+0x5ef/0xda0 [ 2260.077851][ T8847] do_page_fault+0x71/0x581 [ 2260.082368][ T8847] ? page_fault+0x8/0x30 [ 2260.086614][ T8847] page_fault+0x1e/0x30 [ 2260.090773][ T8847] RIP: 0033:0x42ff36 [ 2260.094677][ T8847] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2260.114292][ T8847] RSP: 002b:00007ffea0512290 EFLAGS: 00010206 [ 2260.120365][ T8847] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2260.128343][ T8847] RDX: 0000000001f6b930 RSI: 0000000001f73970 RDI: 0000000000000003 [ 2260.136324][ T8847] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001f6a940 [ 2260.144302][ T8847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2260.152286][ T8847] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 18:52:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2260.355489][ T8847] memory: usage 1632kB, limit 0kB, failcnt 542 [ 2260.365474][ T8847] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2260.374792][ T8847] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2260.382959][ T8847] Memory cgroup stats for /syz4: cache:60KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB 18:52:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2260.403780][ T8847] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8847,uid=0 [ 2260.437591][ T8847] Memory cgroup out of memory: Killed process 8847 (syz-executor.4) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2260.473692][ T1043] oom_reaper: reaped process 8847 (syz-executor.4), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2261.825975][ T8899] chnl_net:caif_netlink_parms(): no params data found [ 2261.856604][ T8899] bridge0: port 1(bridge_slave_0) entered blocking state [ 2261.864344][ T8899] bridge0: port 1(bridge_slave_0) entered disabled state [ 2261.872321][ T8899] device bridge_slave_0 entered promiscuous mode [ 2262.057282][ T8899] bridge0: port 2(bridge_slave_1) entered blocking state [ 2262.064477][ T8899] bridge0: port 2(bridge_slave_1) entered disabled state [ 2262.072639][ T8899] device bridge_slave_1 entered promiscuous mode [ 2262.087695][ T8899] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2262.097948][ T8899] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2262.117006][ T8899] team0: Port device team_slave_0 added [ 2262.124787][ T8899] team0: Port device team_slave_1 added [ 2262.382353][ T8899] device hsr_slave_0 entered promiscuous mode [ 2262.419486][ T8899] device hsr_slave_1 entered promiscuous mode [ 2262.696020][ T8899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2262.707084][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2262.716887][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2262.908423][ T8899] 8021q: adding VLAN 0 to HW filter on device team0 [ 2262.917646][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2262.926468][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2262.935133][ T8646] bridge0: port 1(bridge_slave_0) entered blocking state [ 2262.942219][ T8646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2262.950985][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2263.168038][ T8899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2263.179565][ T8899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2263.191508][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2263.201081][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2263.209493][ T7182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2263.216529][ T7182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2263.224257][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2263.232819][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2263.242308][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2263.251153][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2263.259657][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2263.268029][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2263.276443][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2263.284852][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2263.293241][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2263.301608][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2263.504393][ T8899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2263.512537][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2263.520532][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2263.531213][ T984] device bridge_slave_1 left promiscuous mode [ 2263.537386][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2263.590079][ T984] device bridge_slave_0 left promiscuous mode [ 2263.596295][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2263.660240][ T984] device bridge_slave_1 left promiscuous mode [ 2263.666397][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2263.730104][ T984] device bridge_slave_0 left promiscuous mode [ 2263.736330][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2263.791114][ T984] device bridge_slave_1 left promiscuous mode [ 2263.797308][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2263.839884][ T984] device bridge_slave_0 left promiscuous mode [ 2263.846052][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2268.872252][ T984] device hsr_slave_1 left promiscuous mode [ 2268.934560][ T984] device hsr_slave_0 left promiscuous mode [ 2268.994325][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2269.005922][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2269.017129][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2269.053940][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2269.123354][ T984] bond0 (unregistering): Released all slaves [ 2269.281935][ T984] device hsr_slave_1 left promiscuous mode [ 2269.323370][ T984] device hsr_slave_0 left promiscuous mode [ 2269.382844][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2269.396558][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2269.408218][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2269.454907][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2269.529213][ T984] bond0 (unregistering): Released all slaves [ 2269.671429][ T984] device hsr_slave_1 left promiscuous mode [ 2269.732836][ T984] device hsr_slave_0 left promiscuous mode [ 2269.785634][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2269.797112][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2269.809356][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2269.853062][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2269.946382][ T984] bond0 (unregistering): Released all slaves [ 2270.222204][ T8935] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2270.234539][ T8935] CPU: 1 PID: 8935 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2270.242451][ T8935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2270.242464][ T8935] Call Trace: [ 2270.255808][ T8935] dump_stack+0x172/0x1f0 [ 2270.260148][ T8935] dump_header+0x10f/0xb6c [ 2270.260166][ T8935] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2270.260183][ T8935] ? ___ratelimit+0x60/0x595 [ 2270.260197][ T8935] ? do_raw_spin_unlock+0x57/0x270 [ 2270.260216][ T8935] oom_kill_process.cold+0x10/0x15 [ 2270.270416][ T8935] out_of_memory+0x79a/0x1280 [ 2270.270439][ T8935] ? __sched_text_start+0x8/0x8 [ 2270.270455][ T8935] ? oom_killer_disable+0x280/0x280 [ 2270.270487][ T8935] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2270.280159][ T8935] ? memcg_event_wake+0x230/0x230 [ 2270.280183][ T8935] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2270.280201][ T8935] ? cgroup_file_notify+0x140/0x1b0 [ 2270.280227][ T8935] memory_max_write+0x169/0x300 [ 2270.289974][ T8935] ? mem_cgroup_write+0x360/0x360 [ 2270.290003][ T8935] cgroup_file_write+0x245/0x7a0 [ 2270.290018][ T8935] ? mem_cgroup_write+0x360/0x360 [ 2270.290035][ T8935] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2270.300049][ T8935] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2270.300064][ T8935] kernfs_fop_write+0x2ba/0x480 [ 2270.300088][ T8935] __vfs_write+0x8d/0x110 [ 2270.300105][ T8935] ? kernfs_fop_open+0xd90/0xd90 [ 2270.310635][ T8935] vfs_write+0x20c/0x580 [ 2270.310657][ T8935] ksys_write+0x14f/0x2d0 [ 2270.310677][ T8935] ? __ia32_sys_read+0xb0/0xb0 [ 2270.321638][ T8935] ? do_syscall_64+0x26/0x610 [ 2270.321655][ T8935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2270.321669][ T8935] ? do_syscall_64+0x26/0x610 [ 2270.321689][ T8935] __x64_sys_write+0x73/0xb0 [ 2270.321707][ T8935] do_syscall_64+0x103/0x610 [ 2270.331541][ T8935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2270.331554][ T8935] RIP: 0033:0x458da9 [ 2270.331568][ T8935] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2270.331586][ T8935] RSP: 002b:00007fc411c2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2270.331599][ T8935] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2270.331611][ T8935] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2270.341518][ T8935] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2270.341528][ T8935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc411c306d4 [ 2270.341537][ T8935] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2270.348310][ T8935] memory: usage 5216kB, limit 0kB, failcnt 122 [ 2270.377714][ T8935] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2270.404710][ T8935] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2270.440444][ T8935] Memory cgroup stats for /syz0: cache:456KB rss:4224KB rss_huge:4096KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:4208KB inactive_file:0KB active_file:8KB unevictable:0KB [ 2270.456763][ T8935] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8934,uid=0 [ 2270.472793][ T8935] Memory cgroup out of memory: Killed process 8934 (syz-executor.0) total-vm:72452kB, anon-rss:4228kB, file-rss:35788kB, shmem-rss:0kB [ 2270.495185][ T1043] oom_reaper: reaped process 8934 (syz-executor.0), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 18:52:35 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:35 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:52:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0", 0x45}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:52:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) [ 2270.933646][ T8899] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2270.948785][ T8899] CPU: 1 PID: 8899 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2270.956701][ T8899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2270.966757][ T8899] Call Trace: [ 2270.970056][ T8899] dump_stack+0x172/0x1f0 [ 2270.974394][ T8899] dump_header+0x10f/0xb6c [ 2270.978816][ T8899] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2270.984625][ T8899] ? ___ratelimit+0x60/0x595 [ 2270.989215][ T8899] ? do_raw_spin_unlock+0x57/0x270 [ 2270.994328][ T8899] oom_kill_process.cold+0x10/0x15 [ 2270.999449][ T8899] out_of_memory+0x79a/0x1280 [ 2271.004127][ T8899] ? lock_downgrade+0x880/0x880 [ 2271.008975][ T8899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2271.015215][ T8899] ? oom_killer_disable+0x280/0x280 [ 2271.020412][ T8899] ? find_held_lock+0x35/0x130 [ 2271.025195][ T8899] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2271.030744][ T8899] ? memcg_event_wake+0x230/0x230 [ 2271.035777][ T8899] ? do_raw_spin_unlock+0x57/0x270 [ 2271.040890][ T8899] ? _raw_spin_unlock+0x2d/0x50 [ 2271.045743][ T8899] try_charge+0x102c/0x15c0 [ 2271.050247][ T8899] ? find_held_lock+0x35/0x130 [ 2271.055019][ T8899] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2271.060579][ T8899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2271.066827][ T8899] ? kasan_check_read+0x11/0x20 [ 2271.071687][ T8899] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2271.077239][ T8899] mem_cgroup_try_charge+0x24d/0x5e0 [ 2271.082550][ T8899] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2271.088196][ T8899] wp_page_copy+0x408/0x1740 [ 2271.092796][ T8899] ? find_held_lock+0x35/0x130 [ 2271.097584][ T8899] ? pmd_pfn+0x1d0/0x1d0 [ 2271.101834][ T8899] ? lock_downgrade+0x880/0x880 [ 2271.106687][ T8899] ? swp_swapcount+0x540/0x540 [ 2271.111463][ T8899] ? kasan_check_read+0x11/0x20 [ 2271.116315][ T8899] ? do_raw_spin_unlock+0x57/0x270 [ 2271.121441][ T8899] do_wp_page+0x48e/0x1500 [ 2271.125876][ T8899] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2271.131267][ T8899] __handle_mm_fault+0x22e8/0x3ec0 [ 2271.136389][ T8899] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2271.141939][ T8899] ? find_held_lock+0x35/0x130 [ 2271.146711][ T8899] ? handle_mm_fault+0x322/0xb30 [ 2271.151663][ T8899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2271.157909][ T8899] ? kasan_check_read+0x11/0x20 [ 2271.162768][ T8899] handle_mm_fault+0x43f/0xb30 [ 2271.167555][ T8899] __do_page_fault+0x5ef/0xda0 [ 2271.172327][ T8899] do_page_fault+0x71/0x581 [ 2271.176831][ T8899] ? page_fault+0x8/0x30 [ 2271.181077][ T8899] page_fault+0x1e/0x30 [ 2271.185242][ T8899] RIP: 0033:0x42ff36 [ 2271.189141][ T8899] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2271.208752][ T8899] RSP: 002b:00007fff04d2d460 EFLAGS: 00010206 [ 2271.214824][ T8899] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2271.222800][ T8899] RDX: 0000000002606930 RSI: 000000000260e970 RDI: 0000000000000003 [ 2271.230949][ T8899] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002605940 [ 2271.238927][ T8899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2271.246906][ T8899] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 18:52:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2271.390011][ T8899] memory: usage 840kB, limit 0kB, failcnt 130 [ 2271.409457][ T8899] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2271.416969][ T8899] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 18:52:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2271.918820][ T8899] Memory cgroup stats for /syz0: cache:456KB rss:64KB rss_huge:0KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:36KB inactive_file:0KB active_file:4KB unevictable:0KB [ 2271.963842][ T8899] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8899,uid=0 [ 2271.999056][ T8899] Memory cgroup out of memory: Killed process 8899 (syz-executor.0) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2272.028262][ T1043] oom_reaper: reaped process 8899 (syz-executor.0), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2272.040980][ T8943] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2272.091026][ T8943] CPU: 1 PID: 8943 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2272.098967][ T8943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2272.109029][ T8943] Call Trace: [ 2272.112341][ T8943] dump_stack+0x172/0x1f0 [ 2272.116694][ T8943] dump_header+0x10f/0xb6c [ 2272.121123][ T8943] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2272.126937][ T8943] ? ___ratelimit+0x60/0x595 [ 2272.131566][ T8943] ? do_raw_spin_unlock+0x57/0x270 18:52:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2272.136779][ T8943] oom_kill_process.cold+0x10/0x15 [ 2272.141900][ T8943] out_of_memory+0x79a/0x1280 [ 2272.146592][ T8943] ? retint_kernel+0x2d/0x2d [ 2272.151192][ T8943] ? oom_killer_disable+0x280/0x280 [ 2272.156413][ T8943] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2272.161969][ T8943] ? memcg_event_wake+0x230/0x230 [ 2272.161993][ T8943] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2272.162013][ T8943] ? cgroup_file_notify+0x140/0x1b0 [ 2272.172812][ T8943] memory_max_write+0x169/0x300 [ 2272.172832][ T8943] ? mem_cgroup_write+0x360/0x360 [ 2272.172863][ T8943] cgroup_file_write+0x245/0x7a0 [ 2272.192807][ T8943] ? mem_cgroup_write+0x360/0x360 [ 2272.197842][ T8943] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2272.203499][ T8943] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2272.209134][ T8943] kernfs_fop_write+0x2ba/0x480 [ 2272.214002][ T8943] __vfs_write+0x8d/0x110 [ 2272.218336][ T8943] ? kernfs_fop_open+0xd90/0xd90 [ 2272.223296][ T8943] vfs_write+0x20c/0x580 [ 2272.227553][ T8943] ksys_write+0x14f/0x2d0 [ 2272.231892][ T8943] ? __ia32_sys_read+0xb0/0xb0 [ 2272.236671][ T8943] ? do_syscall_64+0x26/0x610 [ 2272.241361][ T8943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2272.247439][ T8943] ? do_syscall_64+0x26/0x610 [ 2272.252143][ T8943] __x64_sys_write+0x73/0xb0 [ 2272.256744][ T8943] do_syscall_64+0x103/0x610 [ 2272.261355][ T8943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2272.267247][ T8943] RIP: 0033:0x458da9 [ 2272.271144][ T8943] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2272.290761][ T8943] RSP: 002b:00007f481d2ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2272.299182][ T8943] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2272.307164][ T8943] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2272.315144][ T8943] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2272.323123][ T8943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f481d2de6d4 [ 2272.331102][ T8943] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2272.480415][ T8943] memory: usage 4968kB, limit 0kB, failcnt 626670 [ 2272.487029][ T8943] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2272.526051][ T8943] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 18:52:37 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2272.574463][ T8943] Memory cgroup stats for /syz2: cache:0KB rss:4328KB rss_huge:4096KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4232KB inactive_file:0KB active_file:0KB unevictable:0KB 18:52:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2272.939089][ T8943] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8938,uid=0 [ 2273.047226][ T8943] Memory cgroup out of memory: Killed process 8943 (syz-executor.2) total-vm:72448kB, anon-rss:4232kB, file-rss:35804kB, shmem-rss:0kB 18:52:37 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2273.089904][ T8965] IPVS: ftp: loaded support on port[0] = 21 [ 2273.090190][ T8973] IPVS: ftp: loaded support on port[0] = 21 [ 2273.141446][ T1043] oom_reaper: reaped process 8943 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 18:52:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) [ 2273.235183][ T8824] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2273.281114][ T8824] CPU: 0 PID: 8824 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2273.289031][ T8824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2273.289037][ T8824] Call Trace: [ 2273.289060][ T8824] dump_stack+0x172/0x1f0 [ 2273.289081][ T8824] dump_header+0x10f/0xb6c [ 2273.289096][ T8824] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2273.289114][ T8824] ? ___ratelimit+0x60/0x595 [ 2273.321510][ T8824] ? do_raw_spin_unlock+0x57/0x270 [ 2273.326631][ T8824] oom_kill_process.cold+0x10/0x15 [ 2273.331746][ T8824] out_of_memory+0x79a/0x1280 [ 2273.336426][ T8824] ? lock_downgrade+0x880/0x880 [ 2273.341269][ T8824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2273.347507][ T8824] ? oom_killer_disable+0x280/0x280 [ 2273.352695][ T8824] ? find_held_lock+0x35/0x130 [ 2273.352718][ T8824] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2273.362978][ T8824] ? memcg_event_wake+0x230/0x230 [ 2273.362997][ T8824] ? do_raw_spin_unlock+0x57/0x270 [ 2273.363011][ T8824] ? _raw_spin_unlock+0x2d/0x50 [ 2273.363027][ T8824] try_charge+0x102c/0x15c0 [ 2273.363038][ T8824] ? find_held_lock+0x35/0x130 [ 2273.363056][ T8824] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2273.363069][ T8824] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2273.363083][ T8824] ? find_held_lock+0x35/0x130 [ 2273.363096][ T8824] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2273.363124][ T8824] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2273.398326][ T8824] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2273.419296][ T8824] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2273.419315][ T8824] __memcg_kmem_charge+0x136/0x300 [ 2273.419334][ T8824] __alloc_pages_nodemask+0x437/0x7e0 [ 2273.419347][ T8824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2273.419364][ T8824] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2273.429987][ T8824] ? copy_process.part.0+0x1d08/0x7980 [ 2273.430005][ T8824] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2273.430020][ T8824] ? trace_hardirqs_on+0x67/0x230 [ 2273.430034][ T8824] ? kasan_check_read+0x11/0x20 [ 2273.430053][ T8824] copy_process.part.0+0x3e0/0x7980 [ 2273.430069][ T8824] ? __lock_acquire+0x548/0x3fb0 [ 2273.430083][ T8824] ? wp_page_reuse+0x159/0x1d0 [ 2273.430106][ T8824] ? __might_fault+0x12b/0x1e0 [ 2273.458336][ T8824] ? __cleanup_sighand+0x60/0x60 [ 2273.458354][ T8824] ? lock_downgrade+0x880/0x880 [ 2273.478322][ T8824] _do_fork+0x257/0xfd0 [ 2273.478341][ T8824] ? fork_idle+0x1d0/0x1d0 [ 2273.497590][ T8824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2273.497606][ T8824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2273.517038][ T8824] ? do_syscall_64+0x26/0x610 [ 2273.517053][ T8824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2273.517069][ T8824] ? do_syscall_64+0x26/0x610 [ 2273.527782][ T8824] __x64_sys_clone+0xbf/0x150 [ 2273.537100][ T8824] do_syscall_64+0x103/0x610 [ 2273.541694][ T8824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2273.547582][ T8824] RIP: 0033:0x45737a [ 2273.547597][ T8824] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2273.547604][ T8824] RSP: 002b:00007fff55ebef50 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 18:52:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:38 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2273.571085][ T8824] RAX: ffffffffffffffda RBX: 00007fff55ebef50 RCX: 000000000045737a [ 2273.571094][ T8824] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2273.571103][ T8824] RBP: 00007fff55ebef90 R08: 0000000000000001 R09: 000000000212e940 [ 2273.571111][ T8824] R10: 000000000212ec10 R11: 0000000000000246 R12: 0000000000000001 [ 2273.571118][ T8824] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff55ebefe0 [ 2273.720501][ T8824] memory: usage 580kB, limit 0kB, failcnt 626678 [ 2273.726930][ T8824] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2273.735018][ T8824] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2273.757423][ T8824] Memory cgroup stats for /syz2: cache:0KB rss:160KB rss_huge:0KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:48KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2273.849059][ T8824] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8824,uid=0 18:52:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2273.908652][ T8824] Memory cgroup out of memory: Killed process 8824 (syz-executor.2) total-vm:72316kB, anon-rss:92kB, file-rss:35712kB, shmem-rss:0kB [ 2273.973085][ T1043] oom_reaper: reaped process 8824 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2274.060434][ T8965] chnl_net:caif_netlink_parms(): no params data found [ 2274.142769][ T8973] chnl_net:caif_netlink_parms(): no params data found [ 2274.588570][ T8965] bridge0: port 1(bridge_slave_0) entered blocking state [ 2274.609029][ T8965] bridge0: port 1(bridge_slave_0) entered disabled state [ 2274.616976][ T8965] device bridge_slave_0 entered promiscuous mode [ 2274.640616][ T8973] bridge0: port 1(bridge_slave_0) entered blocking state [ 2274.647775][ T8973] bridge0: port 1(bridge_slave_0) entered disabled state [ 2274.659245][ T8973] device bridge_slave_0 entered promiscuous mode [ 2274.667236][ T8965] bridge0: port 2(bridge_slave_1) entered blocking state [ 2274.674833][ T8965] bridge0: port 2(bridge_slave_1) entered disabled state [ 2274.683101][ T8965] device bridge_slave_1 entered promiscuous mode [ 2274.695519][ T8973] bridge0: port 2(bridge_slave_1) entered blocking state [ 2274.703002][ T8973] bridge0: port 2(bridge_slave_1) entered disabled state [ 2274.711092][ T8973] device bridge_slave_1 entered promiscuous mode [ 2274.731629][ T8965] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2274.754028][ T8965] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2274.765599][ T8973] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2274.786005][ T8965] team0: Port device team_slave_0 added [ 2274.793512][ T8965] team0: Port device team_slave_1 added [ 2274.800663][ T8973] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2274.838823][ T8973] team0: Port device team_slave_0 added [ 2274.901543][ T8965] device hsr_slave_0 entered promiscuous mode [ 2274.949429][ T8965] device hsr_slave_1 entered promiscuous mode [ 2275.058167][ T8965] bridge0: port 2(bridge_slave_1) entered blocking state [ 2275.065301][ T8965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2275.072686][ T8965] bridge0: port 1(bridge_slave_0) entered blocking state [ 2275.079769][ T8965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2275.098206][ T8973] team0: Port device team_slave_1 added [ 2275.160723][ T8973] device hsr_slave_0 entered promiscuous mode [ 2275.216047][ T8973] device hsr_slave_1 entered promiscuous mode [ 2275.289728][ T8621] bridge0: port 1(bridge_slave_0) entered disabled state [ 2275.297450][ T8621] bridge0: port 2(bridge_slave_1) entered disabled state [ 2275.322041][ T8994] IPVS: ftp: loaded support on port[0] = 21 [ 2275.392005][ T8965] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2275.428064][ T8973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2275.444281][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2275.452714][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2275.466298][ T8965] 8021q: adding VLAN 0 to HW filter on device team0 [ 2275.481206][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2275.489831][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2275.501246][ T8973] 8021q: adding VLAN 0 to HW filter on device team0 [ 2275.517795][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2275.527689][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2275.536187][ T8646] bridge0: port 1(bridge_slave_0) entered blocking state [ 2275.543273][ T8646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2275.563011][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2275.571999][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2275.580577][ T8621] bridge0: port 1(bridge_slave_0) entered blocking state [ 2275.587645][ T8621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2275.596437][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2275.605353][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2275.613881][ T8621] bridge0: port 2(bridge_slave_1) entered blocking state [ 2275.620976][ T8621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2275.628555][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2275.637605][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2275.645936][ T8621] bridge0: port 2(bridge_slave_1) entered blocking state [ 2275.653024][ T8621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2275.661925][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2275.694787][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2275.718498][ T8994] chnl_net:caif_netlink_parms(): no params data found [ 2275.732345][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2275.741804][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2275.751112][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2275.760133][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2275.768383][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2275.776900][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2275.785409][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2275.794362][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2275.802620][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2275.811759][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2275.820136][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2275.830562][ T8965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2276.326314][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2276.335752][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2276.344578][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2276.610041][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2276.617953][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2276.628227][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2276.636733][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2276.645199][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2276.667625][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2276.676094][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2276.686291][ T8973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2276.698757][ T8994] bridge0: port 1(bridge_slave_0) entered blocking state [ 2276.706448][ T8994] bridge0: port 1(bridge_slave_0) entered disabled state [ 2276.714639][ T8994] device bridge_slave_0 entered promiscuous mode [ 2276.982657][ T8973] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2276.993538][ T8965] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2277.002705][ T8994] bridge0: port 2(bridge_slave_1) entered blocking state [ 2277.010792][ T8994] bridge0: port 2(bridge_slave_1) entered disabled state [ 2277.018425][ T8994] device bridge_slave_1 entered promiscuous mode [ 2277.090994][ T8998] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2277.101587][ T8998] CPU: 0 PID: 8998 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2277.109490][ T8998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2277.119558][ T8998] Call Trace: [ 2277.122864][ T8998] dump_stack+0x172/0x1f0 [ 2277.127213][ T8998] dump_header+0x10f/0xb6c [ 2277.131646][ T8998] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2277.137467][ T8998] ? ___ratelimit+0x60/0x595 [ 2277.142069][ T8998] ? do_raw_spin_unlock+0x57/0x270 [ 2277.147200][ T8998] oom_kill_process.cold+0x10/0x15 [ 2277.152332][ T8998] out_of_memory+0x79a/0x1280 [ 2277.157025][ T8998] ? __sched_text_start+0x8/0x8 [ 2277.161896][ T8998] ? oom_killer_disable+0x280/0x280 [ 2277.167099][ T8998] ? cgroup_file_notify+0x140/0x1b0 [ 2277.172338][ T8998] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2277.177894][ T8998] ? memcg_event_wake+0x230/0x230 [ 2277.182948][ T8998] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2277.188783][ T8998] ? cgroup_file_notify+0x140/0x1b0 [ 2277.194012][ T8998] memory_max_write+0x169/0x300 [ 2277.198872][ T8998] ? kernfs_fop_write+0x204/0x480 [ 2277.203916][ T8998] ? mem_cgroup_write+0x360/0x360 [ 2277.208949][ T8998] ? lock_acquire+0x16f/0x3f0 [ 2277.213638][ T8998] ? kernfs_fop_write+0x227/0x480 [ 2277.218690][ T8998] cgroup_file_write+0x245/0x7a0 [ 2277.223641][ T8998] ? mem_cgroup_write+0x360/0x360 [ 2277.228670][ T8998] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2277.234336][ T8998] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2277.239980][ T8998] kernfs_fop_write+0x2ba/0x480 [ 2277.244849][ T8998] __vfs_write+0x8d/0x110 [ 2277.249177][ T8998] ? kernfs_fop_open+0xd90/0xd90 [ 2277.254139][ T8998] vfs_write+0x20c/0x580 [ 2277.258405][ T8998] ksys_write+0x14f/0x2d0 [ 2277.262769][ T8998] ? __ia32_sys_read+0xb0/0xb0 [ 2277.267546][ T8998] ? do_syscall_64+0x26/0x610 [ 2277.272233][ T8998] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2277.278307][ T8998] ? do_syscall_64+0x26/0x610 [ 2277.283010][ T8998] __x64_sys_write+0x73/0xb0 [ 2277.287617][ T8998] do_syscall_64+0x103/0x610 [ 2277.292225][ T8998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2277.298130][ T8998] RIP: 0033:0x458da9 [ 2277.302029][ T8998] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2277.321644][ T8998] RSP: 002b:00007f77f89dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2277.330068][ T8998] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2277.338054][ T8998] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000006 [ 2277.346038][ T8998] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2277.354017][ T8998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77f89dc6d4 [ 2277.361997][ T8998] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2277.372214][ T8998] memory: usage 5960kB, limit 0kB, failcnt 543 [ 2277.378577][ T8998] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2277.386530][ T8998] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2277.393649][ T8998] Memory cgroup stats for /syz4: cache:60KB rss:4256KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2277.415275][ T8998] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8997,uid=0 [ 2277.430924][ T8998] Memory cgroup out of memory: Killed process 8997 (syz-executor.4) total-vm:72452kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2277.446747][ T1043] oom_reaper: reaped process 8997 (syz-executor.4), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 2277.554806][ T8973] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2277.579005][ T8973] CPU: 0 PID: 8973 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2277.588432][ T8973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2277.598520][ T8973] Call Trace: [ 2277.598541][ T8973] dump_stack+0x172/0x1f0 [ 2277.598558][ T8973] dump_header+0x10f/0xb6c [ 2277.598573][ T8973] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2277.598587][ T8973] ? ___ratelimit+0x60/0x595 [ 2277.598601][ T8973] ? do_raw_spin_unlock+0x57/0x270 [ 2277.598617][ T8973] oom_kill_process.cold+0x10/0x15 [ 2277.598631][ T8973] out_of_memory+0x79a/0x1280 [ 2277.598647][ T8973] ? lock_downgrade+0x880/0x880 [ 2277.610630][ T8973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2277.620976][ T8973] ? oom_killer_disable+0x280/0x280 [ 2277.620988][ T8973] ? find_held_lock+0x35/0x130 [ 2277.621011][ T8973] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2277.621024][ T8973] ? memcg_event_wake+0x230/0x230 [ 2277.621042][ T8973] ? do_raw_spin_unlock+0x57/0x270 [ 2277.621059][ T8973] ? _raw_spin_unlock+0x2d/0x50 [ 2277.621076][ T8973] try_charge+0x102c/0x15c0 [ 2277.621095][ T8973] ? find_held_lock+0x35/0x130 [ 2277.621115][ T8973] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2277.621133][ T8973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2277.635976][ T8973] ? kasan_check_read+0x11/0x20 [ 2277.650676][ T8973] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2277.650693][ T8973] mem_cgroup_try_charge+0x24d/0x5e0 [ 2277.650713][ T8973] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2277.650729][ T8973] wp_page_copy+0x408/0x1740 [ 2277.650742][ T8973] ? find_held_lock+0x35/0x130 [ 2277.650762][ T8973] ? pmd_pfn+0x1d0/0x1d0 [ 2277.650774][ T8973] ? lock_downgrade+0x880/0x880 [ 2277.650788][ T8973] ? swp_swapcount+0x540/0x540 [ 2277.650804][ T8973] ? kasan_check_read+0x11/0x20 [ 2277.650816][ T8973] ? do_raw_spin_unlock+0x57/0x270 [ 2277.650831][ T8973] do_wp_page+0x48e/0x1500 [ 2277.650848][ T8973] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2277.650870][ T8973] __handle_mm_fault+0x22e8/0x3ec0 [ 2277.650889][ T8973] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2277.650901][ T8973] ? find_held_lock+0x35/0x130 [ 2277.650915][ T8973] ? handle_mm_fault+0x322/0xb30 [ 2277.650939][ T8973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2277.650955][ T8973] ? kasan_check_read+0x11/0x20 [ 2277.650974][ T8973] handle_mm_fault+0x43f/0xb30 [ 2277.650991][ T8973] __do_page_fault+0x5ef/0xda0 [ 2277.651011][ T8973] do_page_fault+0x71/0x581 [ 2277.651029][ T8973] ? page_fault+0x8/0x30 [ 2277.671501][ T8973] page_fault+0x1e/0x30 [ 2277.671512][ T8973] RIP: 0033:0x42ff36 [ 2277.671526][ T8973] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2277.671532][ T8973] RSP: 002b:00007ffff040e690 EFLAGS: 00010206 [ 2277.671542][ T8973] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2277.671549][ T8973] RDX: 0000000001c3d930 RSI: 0000000001c45970 RDI: 0000000000000003 [ 2277.671557][ T8973] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001c3c940 [ 2277.671564][ T8973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2277.671570][ T8973] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 2277.748752][ T8973] memory: usage 1584kB, limit 0kB, failcnt 551 [ 2277.768553][ T8973] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2277.786261][ T8973] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2277.795233][ T8973] Memory cgroup stats for /syz4: cache:60KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2277.824437][ T8973] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8973,uid=0 [ 2277.867833][ T8973] Memory cgroup out of memory: Killed process 8973 (syz-executor.4) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2278.095102][ T9001] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2278.105937][ T9001] CPU: 0 PID: 9001 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2278.113838][ T9001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2278.123903][ T9001] Call Trace: [ 2278.127217][ T9001] dump_stack+0x172/0x1f0 [ 2278.131571][ T9001] dump_header+0x10f/0xb6c [ 2278.136125][ T9001] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2278.141951][ T9001] ? ___ratelimit+0x60/0x595 [ 2278.146553][ T9001] ? do_raw_spin_unlock+0x57/0x270 [ 2278.151686][ T9001] oom_kill_process.cold+0x10/0x15 [ 2278.156825][ T9001] out_of_memory+0x79a/0x1280 [ 2278.161524][ T9001] ? __sched_text_start+0x8/0x8 [ 2278.166394][ T9001] ? oom_killer_disable+0x280/0x280 [ 2278.171629][ T9001] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2278.177188][ T9001] ? memcg_event_wake+0x230/0x230 [ 2278.182243][ T9001] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2278.188069][ T9001] ? cgroup_file_notify+0x140/0x1b0 [ 2278.193292][ T9001] memory_max_write+0x169/0x300 [ 2278.198153][ T9001] ? kernfs_fop_write+0x204/0x480 [ 2278.203195][ T9001] ? mem_cgroup_write+0x360/0x360 [ 2278.208228][ T9001] ? lock_acquire+0x16f/0x3f0 [ 2278.212910][ T9001] ? kernfs_fop_write+0x227/0x480 [ 2278.217954][ T9001] cgroup_file_write+0x245/0x7a0 [ 2278.222905][ T9001] ? mem_cgroup_write+0x360/0x360 [ 2278.227940][ T9001] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2278.233604][ T9001] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2278.239244][ T9001] kernfs_fop_write+0x2ba/0x480 [ 2278.244119][ T9001] __vfs_write+0x8d/0x110 [ 2278.248466][ T9001] ? kernfs_fop_open+0xd90/0xd90 [ 2278.253427][ T9001] vfs_write+0x20c/0x580 [ 2278.257698][ T9001] ksys_write+0x14f/0x2d0 [ 2278.262053][ T9001] ? __ia32_sys_read+0xb0/0xb0 [ 2278.266829][ T9001] ? do_syscall_64+0x26/0x610 [ 2278.271601][ T9001] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2278.277677][ T9001] ? do_syscall_64+0x26/0x610 [ 2278.282380][ T9001] __x64_sys_write+0x73/0xb0 [ 2278.287001][ T9001] do_syscall_64+0x103/0x610 [ 2278.291617][ T9001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2278.297517][ T9001] RIP: 0033:0x458da9 [ 2278.301421][ T9001] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2278.321059][ T9001] RSP: 002b:00007fe5809fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2278.329487][ T9001] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2278.337464][ T9001] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2278.345447][ T9001] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2278.353429][ T9001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5809fe6d4 [ 2278.361410][ T9001] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2278.377466][ T9001] memory: usage 4712kB, limit 0kB, failcnt 603838 [ 2278.390960][ T9001] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2278.407171][ T9001] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2278.417596][ T9001] Memory cgroup stats for /syz3: cache:100KB rss:4152KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2278.449470][ T9001] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8999,uid=0 [ 2278.476273][ T9001] Memory cgroup out of memory: Killed process 8999 (syz-executor.3) total-vm:72452kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2278.507950][ T1043] oom_reaper: reaped process 8999 (syz-executor.3), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2278.548427][ T8994] bond0: Enslaving bond_slave_0 as an active interface with an up link 18:52:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0", 0x45}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:52:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000240), 0x12) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 18:52:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:52:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2278.880284][ T8965] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2278.921507][ T8994] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2278.930676][ T8965] CPU: 0 PID: 8965 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2278.938586][ T8965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2278.948645][ T8965] Call Trace: [ 2278.951950][ T8965] dump_stack+0x172/0x1f0 [ 2278.956294][ T8965] dump_header+0x10f/0xb6c [ 2278.960721][ T8965] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2278.966533][ T8965] ? ___ratelimit+0x60/0x595 [ 2278.971124][ T8965] ? do_raw_spin_unlock+0x57/0x270 [ 2278.976249][ T8965] oom_kill_process.cold+0x10/0x15 [ 2278.981367][ T8965] out_of_memory+0x79a/0x1280 [ 2278.986057][ T8965] ? lock_downgrade+0x880/0x880 [ 2278.990916][ T8965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2278.997164][ T8965] ? oom_killer_disable+0x280/0x280 [ 2279.002373][ T8965] ? find_held_lock+0x35/0x130 [ 2279.007160][ T8965] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2279.012715][ T8965] ? memcg_event_wake+0x230/0x230 [ 2279.017755][ T8965] ? do_raw_spin_unlock+0x57/0x270 [ 2279.022869][ T8965] ? _raw_spin_unlock+0x2d/0x50 [ 2279.027719][ T8965] try_charge+0x102c/0x15c0 [ 2279.027733][ T8965] ? find_held_lock+0x35/0x130 [ 2279.027757][ T8965] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2279.042546][ T8965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2279.049065][ T8965] ? kasan_check_read+0x11/0x20 [ 2279.053930][ T8965] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2279.059480][ T8965] mem_cgroup_try_charge+0x24d/0x5e0 [ 2279.064779][ T8965] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2279.070421][ T8965] wp_page_copy+0x408/0x1740 [ 2279.070434][ T8965] ? find_held_lock+0x35/0x130 [ 2279.070452][ T8965] ? pmd_pfn+0x1d0/0x1d0 [ 2279.070465][ T8965] ? lock_downgrade+0x880/0x880 [ 2279.070478][ T8965] ? swp_swapcount+0x540/0x540 [ 2279.070496][ T8965] ? kasan_check_read+0x11/0x20 [ 2279.070510][ T8965] ? do_raw_spin_unlock+0x57/0x270 [ 2279.070525][ T8965] do_wp_page+0x48e/0x1500 [ 2279.070542][ T8965] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2279.070566][ T8965] __handle_mm_fault+0x22e8/0x3ec0 [ 2279.070584][ T8965] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2279.070596][ T8965] ? find_held_lock+0x35/0x130 [ 2279.070608][ T8965] ? handle_mm_fault+0x322/0xb30 [ 2279.070629][ T8965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2279.070643][ T8965] ? kasan_check_read+0x11/0x20 [ 2279.070659][ T8965] handle_mm_fault+0x43f/0xb30 [ 2279.070675][ T8965] __do_page_fault+0x5ef/0xda0 [ 2279.070699][ T8965] do_page_fault+0x71/0x581 [ 2279.108193][ T8965] ? page_fault+0x8/0x30 [ 2279.108211][ T8965] page_fault+0x1e/0x30 [ 2279.140097][ T8965] RIP: 0033:0x42ff36 [ 2279.140111][ T8965] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2279.140123][ T8965] RSP: 002b:00007ffdfbb3a7f0 EFLAGS: 00010206 [ 2279.149699][ T8965] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2279.149707][ T8965] RDX: 0000000001b14930 RSI: 0000000001b1c970 RDI: 0000000000000003 [ 2279.149714][ T8965] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001b13940 [ 2279.149721][ T8965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2279.149728][ T8965] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 2279.349597][ T8965] memory: usage 340kB, limit 0kB, failcnt 603846 [ 2279.357186][ T8965] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2279.394775][ T8965] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2279.428276][ T8965] Memory cgroup stats for /syz3: cache:100KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2279.507756][ T8965] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8965,uid=0 18:52:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2279.558088][ T8965] Memory cgroup out of memory: Killed process 8965 (syz-executor.3) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB 18:52:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:52:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2280.650063][ T8994] team0: Port device team_slave_0 added [ 2280.899666][ T8994] team0: Port device team_slave_1 added [ 2280.961606][ T8994] device hsr_slave_0 entered promiscuous mode [ 2281.000451][ T8994] device hsr_slave_1 entered promiscuous mode [ 2281.044842][ T9029] IPVS: ftp: loaded support on port[0] = 21 [ 2281.626556][ T984] device bridge_slave_1 left promiscuous mode [ 2281.634111][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2281.700860][ T984] device bridge_slave_0 left promiscuous mode [ 2281.707037][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2281.760846][ T984] device bridge_slave_1 left promiscuous mode [ 2281.767023][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2281.803837][ T984] device bridge_slave_0 left promiscuous mode [ 2281.810829][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2281.881061][ T984] device bridge_slave_1 left promiscuous mode [ 2281.887235][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2281.939732][ T984] device bridge_slave_0 left promiscuous mode [ 2281.945917][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2282.010959][ T984] device bridge_slave_1 left promiscuous mode [ 2282.017137][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2282.059974][ T984] device bridge_slave_0 left promiscuous mode [ 2282.066142][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2288.702343][ T984] device hsr_slave_1 left promiscuous mode [ 2288.772589][ T984] device hsr_slave_0 left promiscuous mode [ 2288.824546][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2288.836077][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2288.848523][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2288.886038][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2288.975575][ T984] bond0 (unregistering): Released all slaves [ 2289.122811][ T984] device hsr_slave_1 left promiscuous mode [ 2289.164369][ T984] device hsr_slave_0 left promiscuous mode [ 2289.223898][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2289.235508][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2289.246742][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2289.305423][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2289.395450][ T984] bond0 (unregistering): Released all slaves [ 2289.562113][ T984] device hsr_slave_1 left promiscuous mode [ 2289.612594][ T984] device hsr_slave_0 left promiscuous mode [ 2289.664287][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2289.676298][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2289.687500][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2289.745477][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2289.835740][ T984] bond0 (unregistering): Released all slaves [ 2289.991341][ T984] device hsr_slave_1 left promiscuous mode [ 2290.064079][ T984] device hsr_slave_0 left promiscuous mode [ 2290.122602][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2290.135690][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2290.146891][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2290.205941][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2290.294241][ T984] bond0 (unregistering): Released all slaves [ 2290.409937][ T9029] chnl_net:caif_netlink_parms(): no params data found [ 2290.447618][ T8994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2290.464714][ T8994] 8021q: adding VLAN 0 to HW filter on device team0 [ 2290.475924][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2290.484278][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2290.502952][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2290.512120][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2290.521153][ T8646] bridge0: port 1(bridge_slave_0) entered blocking state [ 2290.528195][ T8646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2290.536473][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2290.545144][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2290.553556][ T8646] bridge0: port 2(bridge_slave_1) entered blocking state [ 2290.560660][ T8646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2290.568271][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 2290.575854][ T9029] bridge0: port 1(bridge_slave_0) entered disabled state [ 2290.583866][ T9029] device bridge_slave_0 entered promiscuous mode [ 2290.603750][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2290.611980][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2290.620769][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2290.629642][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2290.638064][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2290.646825][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2290.655529][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2290.664103][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2290.671930][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 2290.683957][ T9029] bridge0: port 2(bridge_slave_1) entered disabled state [ 2290.691853][ T9029] device bridge_slave_1 entered promiscuous mode [ 2290.715339][ T9029] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2290.727109][ T9029] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2290.741739][ T8994] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2290.753159][ T8994] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2290.770908][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2290.779751][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2290.787988][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2290.797068][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2290.816588][ T9029] team0: Port device team_slave_0 added [ 2290.823980][ T9029] team0: Port device team_slave_1 added [ 2290.830909][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2290.901833][ T9029] device hsr_slave_0 entered promiscuous mode [ 2290.939502][ T9029] device hsr_slave_1 entered promiscuous mode [ 2290.983007][ T8994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2291.002896][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 2291.010007][ T9029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2291.017306][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 2291.024379][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2291.078734][ T9029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2291.099456][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2291.107815][ T641] bridge0: port 1(bridge_slave_0) entered disabled state [ 2291.125546][ T641] bridge0: port 2(bridge_slave_1) entered disabled state [ 2291.134437][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2291.145453][ T9029] 8021q: adding VLAN 0 to HW filter on device team0 [ 2291.162380][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2291.171961][T31533] bridge0: port 1(bridge_slave_0) entered blocking state [ 2291.179116][T31533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2291.200649][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2291.230752][T31533] bridge0: port 2(bridge_slave_1) entered blocking state [ 2291.237836][T31533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2291.255840][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2291.271254][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2291.280244][T31533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2291.306031][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2291.321618][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2291.332439][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2291.375819][ T9029] 8021q: adding VLAN 0 to HW filter on device batadv0 18:52:55 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:52:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a", 0x51}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2291.818366][ T9050] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2291.837355][ T9050] CPU: 1 PID: 9050 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2291.845291][ T9050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2291.855360][ T9050] Call Trace: [ 2291.858682][ T9050] dump_stack+0x172/0x1f0 [ 2291.863042][ T9050] dump_header+0x10f/0xb6c [ 2291.867603][ T9050] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2291.873518][ T9050] ? ___ratelimit+0x60/0x595 [ 2291.878123][ T9050] ? do_raw_spin_unlock+0x57/0x270 [ 2291.883265][ T9050] oom_kill_process.cold+0x10/0x15 [ 2291.888397][ T9050] out_of_memory+0x79a/0x1280 [ 2291.893090][ T9050] ? __sched_text_start+0x8/0x8 [ 2291.897950][ T9050] ? oom_killer_disable+0x280/0x280 [ 2291.903179][ T9050] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2291.908742][ T9050] ? memcg_event_wake+0x230/0x230 [ 2291.913790][ T9050] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2291.919613][ T9050] ? cgroup_file_notify+0x140/0x1b0 [ 2291.924824][ T9050] memory_max_write+0x169/0x300 [ 2291.929694][ T9050] ? mem_cgroup_write+0x360/0x360 [ 2291.934740][ T9050] cgroup_file_write+0x245/0x7a0 [ 2291.939694][ T9050] ? mem_cgroup_write+0x360/0x360 [ 2291.944728][ T9050] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2291.950379][ T9050] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2291.956038][ T9050] kernfs_fop_write+0x2ba/0x480 [ 2291.960906][ T9050] __vfs_write+0x8d/0x110 [ 2291.965260][ T9050] ? kernfs_fop_open+0xd90/0xd90 [ 2291.970216][ T9050] vfs_write+0x20c/0x580 [ 2291.974487][ T9050] ksys_write+0x14f/0x2d0 [ 2291.978842][ T9050] ? __ia32_sys_read+0xb0/0xb0 [ 2291.983632][ T9050] __x64_sys_write+0x73/0xb0 [ 2291.988236][ T9050] ? do_syscall_64+0x5b/0x610 [ 2291.992928][ T9050] do_syscall_64+0x103/0x610 [ 2291.997538][ T9050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.003441][ T9050] RIP: 0033:0x458da9 [ 2292.007344][ T9050] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2292.026952][ T9050] RSP: 002b:00007f8077c3ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2292.035373][ T9050] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2292.043362][ T9050] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000008 [ 2292.051347][ T9050] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2292.059331][ T9050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8077c3b6d4 [ 2292.067320][ T9050] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2292.103274][ T9050] memory: usage 4696kB, limit 0kB, failcnt 626681 [ 2292.143714][ T9050] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2292.188696][ T9050] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2292.210996][ T9050] Memory cgroup stats for /syz2: cache:0KB rss:4152KB rss_huge:4096KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2292.346555][ T9050] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9049,uid=0 [ 2292.421405][ T9050] Memory cgroup out of memory: Killed process 9049 (syz-executor.2) total-vm:72452kB, anon-rss:4224kB, file-rss:35788kB, shmem-rss:0kB [ 2292.508789][ T1043] oom_reaper: reaped process 9049 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 18:52:57 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:57 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:52:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2293.078595][ T9029] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2293.108206][ T9029] CPU: 1 PID: 9029 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2293.116249][ T9029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.126412][ T9029] Call Trace: [ 2293.129707][ T9029] dump_stack+0x172/0x1f0 [ 2293.134044][ T9029] dump_header+0x10f/0xb6c [ 2293.138467][ T9029] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2293.144445][ T9029] ? ___ratelimit+0x60/0x595 [ 2293.149043][ T9029] ? do_raw_spin_unlock+0x57/0x270 [ 2293.154174][ T9029] oom_kill_process.cold+0x10/0x15 [ 2293.159286][ T9029] out_of_memory+0x79a/0x1280 [ 2293.163969][ T9029] ? lock_downgrade+0x880/0x880 [ 2293.168815][ T9029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2293.175056][ T9029] ? oom_killer_disable+0x280/0x280 [ 2293.180255][ T9029] ? find_held_lock+0x35/0x130 [ 2293.185027][ T9029] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2293.190578][ T9029] ? memcg_event_wake+0x230/0x230 [ 2293.195616][ T9029] ? do_raw_spin_unlock+0x57/0x270 [ 2293.200742][ T9029] ? _raw_spin_unlock+0x2d/0x50 [ 2293.205605][ T9029] try_charge+0x102c/0x15c0 [ 2293.210112][ T9029] ? find_held_lock+0x35/0x130 [ 2293.214898][ T9029] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2293.220461][ T9029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2293.226723][ T9029] ? kasan_check_read+0x11/0x20 [ 2293.231597][ T9029] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2293.237166][ T9029] mem_cgroup_try_charge+0x24d/0x5e0 [ 2293.242479][ T9029] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2293.248137][ T9029] wp_page_copy+0x408/0x1740 [ 2293.252745][ T9029] ? find_held_lock+0x35/0x130 [ 2293.257536][ T9029] ? pmd_pfn+0x1d0/0x1d0 [ 2293.261800][ T9029] ? lock_downgrade+0x880/0x880 [ 2293.266667][ T9029] ? swp_swapcount+0x540/0x540 [ 2293.271451][ T9029] ? kasan_check_read+0x11/0x20 [ 2293.276322][ T9029] ? do_raw_spin_unlock+0x57/0x270 [ 2293.282068][ T9029] do_wp_page+0x48e/0x1500 [ 2293.286501][ T9029] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2293.291901][ T9029] __handle_mm_fault+0x22e8/0x3ec0 [ 2293.297043][ T9029] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2293.302611][ T9029] ? find_held_lock+0x35/0x130 [ 2293.307387][ T9029] ? handle_mm_fault+0x322/0xb30 [ 2293.312344][ T9029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2293.318593][ T9029] ? kasan_check_read+0x11/0x20 [ 2293.323466][ T9029] handle_mm_fault+0x43f/0xb30 [ 2293.328251][ T9029] __do_page_fault+0x5ef/0xda0 [ 2293.333042][ T9029] do_page_fault+0x71/0x581 [ 2293.337581][ T9029] ? page_fault+0x8/0x30 [ 2293.341842][ T9029] page_fault+0x1e/0x30 [ 2293.346005][ T9029] RIP: 0033:0x42ff36 [ 2293.349916][ T9029] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2293.369531][ T9029] RSP: 002b:00007ffde26744a0 EFLAGS: 00010206 [ 2293.375601][ T9029] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2293.383585][ T9029] RDX: 000000000198f930 RSI: 0000000001997970 RDI: 0000000000000003 [ 2293.391575][ T9029] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000198e940 [ 2293.399560][ T9029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2293.407544][ T9029] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 18:52:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0", 0x45}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2293.567583][ T9076] IPVS: ftp: loaded support on port[0] = 21 [ 2293.619001][ T9029] memory: usage 324kB, limit 0kB, failcnt 626689 [ 2293.625379][ T9029] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2293.655856][ T9029] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2293.685746][ T9029] Memory cgroup stats for /syz2: cache:0KB rss:0KB rss_huge:0KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2293.768594][ T9029] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9029,uid=0 [ 2293.837746][ T9029] Memory cgroup out of memory: Killed process 9029 (syz-executor.2) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 2293.897251][ T1043] oom_reaper: reaped process 9029 (syz-executor.2), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2293.915379][ T9079] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2293.944749][ T9079] CPU: 1 PID: 9079 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2293.952685][ T9079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.962752][ T9079] Call Trace: [ 2293.966070][ T9079] dump_stack+0x172/0x1f0 [ 2293.970426][ T9079] dump_header+0x10f/0xb6c [ 2293.974857][ T9079] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2293.980675][ T9079] ? ___ratelimit+0x60/0x595 [ 2293.985274][ T9079] ? do_raw_spin_unlock+0x57/0x270 [ 2293.990398][ T9079] oom_kill_process.cold+0x10/0x15 [ 2293.995516][ T9079] out_of_memory+0x79a/0x1280 [ 2294.000214][ T9079] ? oom_killer_disable+0x280/0x280 [ 2294.005436][ T9079] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2294.010988][ T9079] ? memcg_event_wake+0x230/0x230 [ 2294.016042][ T9079] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2294.021853][ T9079] ? cgroup_file_notify+0x140/0x1b0 [ 2294.027078][ T9079] memory_max_write+0x169/0x300 [ 2294.031941][ T9079] ? mem_cgroup_write+0x360/0x360 [ 2294.036972][ T9079] ? lock_acquire+0x16f/0x3f0 [ 2294.041665][ T9079] ? kernfs_fop_write+0x227/0x480 [ 2294.046702][ T9079] cgroup_file_write+0x245/0x7a0 [ 2294.051649][ T9079] ? mem_cgroup_write+0x360/0x360 [ 2294.056679][ T9079] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2294.062331][ T9079] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2294.067975][ T9079] kernfs_fop_write+0x2ba/0x480 [ 2294.072848][ T9079] __vfs_write+0x8d/0x110 [ 2294.077442][ T9079] ? kernfs_fop_open+0xd90/0xd90 [ 2294.082387][ T9079] vfs_write+0x20c/0x580 [ 2294.086636][ T9079] ksys_write+0x14f/0x2d0 [ 2294.090971][ T9079] ? __ia32_sys_read+0xb0/0xb0 [ 2294.095922][ T9079] ? do_syscall_64+0x26/0x610 [ 2294.100597][ T9079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.106661][ T9079] ? do_syscall_64+0x26/0x610 [ 2294.111355][ T9079] __x64_sys_write+0x73/0xb0 [ 2294.115966][ T9079] do_syscall_64+0x103/0x610 [ 2294.120589][ T9079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.126501][ T9079] RIP: 0033:0x458da9 [ 2294.130396][ T9079] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2294.130404][ T9079] RSP: 002b:00007fe0b719cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2294.130419][ T9079] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2294.130427][ T9079] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2294.130434][ T9079] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2294.130442][ T9079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0b719d6d4 18:52:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2294.130451][ T9079] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2294.201714][ T9079] memory: usage 5484kB, limit 0kB, failcnt 131 [ 2294.230184][ T9079] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2294.251042][ T9084] IPVS: ftp: loaded support on port[0] = 21 [ 2294.254780][ T9079] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2294.275208][ T9079] Memory cgroup stats for /syz0: cache:456KB rss:4304KB rss_huge:4096KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:4228KB inactive_file:0KB active_file:4KB unevictable:0KB 18:52:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2294.307512][ T9079] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9078,uid=0 [ 2294.333349][ T9079] Memory cgroup out of memory: Killed process 9078 (syz-executor.0) total-vm:72448kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 2294.432915][ T1043] oom_reaper: reaped process 9078 (syz-executor.0), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB 18:52:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2295.007568][ T9076] chnl_net:caif_netlink_parms(): no params data found [ 2295.054461][ T8994] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2295.092041][ T9076] bridge0: port 1(bridge_slave_0) entered blocking state [ 2295.102159][ T8994] CPU: 0 PID: 8994 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2295.110076][ T8994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2295.120128][ T8994] Call Trace: [ 2295.123424][ T8994] dump_stack+0x172/0x1f0 [ 2295.127762][ T8994] dump_header+0x10f/0xb6c [ 2295.132190][ T8994] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2295.138012][ T8994] ? ___ratelimit+0x60/0x595 [ 2295.138396][ T9076] bridge0: port 1(bridge_slave_0) entered disabled state [ 2295.142597][ T8994] ? do_raw_spin_unlock+0x57/0x270 [ 2295.142615][ T8994] oom_kill_process.cold+0x10/0x15 [ 2295.142631][ T8994] out_of_memory+0x79a/0x1280 [ 2295.142645][ T8994] ? lock_downgrade+0x880/0x880 [ 2295.142657][ T8994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2295.142672][ T8994] ? oom_killer_disable+0x280/0x280 [ 2295.142683][ T8994] ? find_held_lock+0x35/0x130 [ 2295.142707][ T8994] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2295.142718][ T8994] ? memcg_event_wake+0x230/0x230 [ 2295.142737][ T8994] ? do_raw_spin_unlock+0x57/0x270 [ 2295.142752][ T8994] ? _raw_spin_unlock+0x2d/0x50 [ 2295.142768][ T8994] try_charge+0x102c/0x15c0 [ 2295.142778][ T8994] ? find_held_lock+0x35/0x130 [ 2295.142798][ T8994] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2295.175740][ T8994] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2295.195187][ T9076] device bridge_slave_0 entered promiscuous mode [ 2295.196206][ T8994] ? find_held_lock+0x35/0x130 [ 2295.215457][ T8994] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2295.237699][ T8994] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2295.246735][ T9076] bridge0: port 2(bridge_slave_1) entered blocking state [ 2295.248747][ T8994] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2295.260938][ T8994] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2295.261838][ T9076] bridge0: port 2(bridge_slave_1) entered disabled state [ 2295.266484][ T8994] __memcg_kmem_charge+0x136/0x300 [ 2295.278577][ T8994] __alloc_pages_nodemask+0x437/0x7e0 [ 2295.282858][ T9076] device bridge_slave_1 entered promiscuous mode [ 2295.283958][ T8994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2295.296489][ T8994] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2295.296508][ T8994] ? copy_process.part.0+0x1d08/0x7980 [ 2295.307644][ T8994] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2295.312929][ T8994] ? trace_hardirqs_on+0x67/0x230 [ 2295.312944][ T8994] ? kasan_check_read+0x11/0x20 [ 2295.312963][ T8994] copy_process.part.0+0x3e0/0x7980 [ 2295.312977][ T8994] ? __lock_acquire+0x548/0x3fb0 [ 2295.312990][ T8994] ? wp_page_reuse+0x159/0x1d0 [ 2295.313013][ T8994] ? __might_fault+0x12b/0x1e0 [ 2295.313035][ T8994] ? __cleanup_sighand+0x60/0x60 [ 2295.313053][ T8994] ? lock_downgrade+0x880/0x880 [ 2295.328099][ T8994] _do_fork+0x257/0xfd0 [ 2295.337940][ T8994] ? fork_idle+0x1d0/0x1d0 [ 2295.360979][ T8994] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2295.366446][ T8994] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2295.371900][ T8994] ? do_syscall_64+0x26/0x610 [ 2295.371922][ T8994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2295.371934][ T8994] ? do_syscall_64+0x26/0x610 [ 2295.371952][ T8994] __x64_sys_clone+0xbf/0x150 [ 2295.371968][ T8994] do_syscall_64+0x103/0x610 [ 2295.371984][ T8994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2295.371995][ T8994] RIP: 0033:0x45737a [ 2295.372008][ T8994] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2295.372015][ T8994] RSP: 002b:00007ffdb074da40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2295.372026][ T8994] RAX: ffffffffffffffda RBX: 00007ffdb074da40 RCX: 000000000045737a [ 2295.372033][ T8994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2295.372041][ T8994] RBP: 00007ffdb074da80 R08: 0000000000000001 R09: 0000000000db3940 [ 2295.372049][ T8994] R10: 0000000000db3c10 R11: 0000000000000246 R12: 0000000000000001 [ 2295.372058][ T8994] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffdb074dad0 [ 2295.477022][ T8994] memory: usage 1100kB, limit 0kB, failcnt 139 [ 2295.483707][ T8994] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2295.492412][ T8994] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2295.507375][ T8994] Memory cgroup stats for /syz0: cache:456KB rss:136KB rss_huge:0KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:44KB inactive_file:4KB active_file:0KB unevictable:0KB [ 2295.533998][ T8994] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8994,uid=0 [ 2295.555328][ T8994] Memory cgroup out of memory: Killed process 8994 (syz-executor.0) total-vm:72316kB, anon-rss:92kB, file-rss:35712kB, shmem-rss:0kB [ 2295.575833][ T1043] oom_reaper: reaped process 8994 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2295.628518][ T9076] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2295.639094][ T9076] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2295.927317][ T9076] team0: Port device team_slave_0 added [ 2295.944097][ T9076] team0: Port device team_slave_1 added [ 2295.955429][ T9084] chnl_net:caif_netlink_parms(): no params data found [ 2296.078890][ T9076] device hsr_slave_0 entered promiscuous mode [ 2296.109412][ T9076] device hsr_slave_1 entered promiscuous mode [ 2296.233354][ T9084] bridge0: port 1(bridge_slave_0) entered blocking state [ 2296.242834][ T9084] bridge0: port 1(bridge_slave_0) entered disabled state [ 2296.257560][ T9084] device bridge_slave_0 entered promiscuous mode [ 2296.275889][ T9084] bridge0: port 2(bridge_slave_1) entered blocking state [ 2296.283093][ T9084] bridge0: port 2(bridge_slave_1) entered disabled state [ 2296.291511][ T9084] device bridge_slave_1 entered promiscuous mode [ 2296.318351][ T9084] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2296.329214][ T9084] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2296.357676][ T9084] team0: Port device team_slave_0 added [ 2296.364715][ T9084] team0: Port device team_slave_1 added [ 2296.402071][ T9084] device hsr_slave_0 entered promiscuous mode [ 2296.439405][ T9084] device hsr_slave_1 entered promiscuous mode [ 2296.486159][ T9076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2296.506786][ T9084] bridge0: port 2(bridge_slave_1) entered blocking state [ 2296.513917][ T9084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2296.521323][ T9084] bridge0: port 1(bridge_slave_0) entered blocking state [ 2296.528378][ T9084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2296.554013][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2296.568034][ T8625] bridge0: port 1(bridge_slave_0) entered disabled state [ 2296.576273][ T8625] bridge0: port 2(bridge_slave_1) entered disabled state [ 2296.587687][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2296.595598][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2296.610398][ T9076] 8021q: adding VLAN 0 to HW filter on device team0 [ 2296.625514][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2296.634238][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2296.643999][ T8625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2296.651281][ T8625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2296.660823][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2296.674666][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2296.683399][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2296.694124][ T7182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2296.701244][ T7182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2296.723936][ T9076] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2296.734621][ T9076] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2296.747480][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2296.758376][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2296.766926][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2296.775665][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2296.784443][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2296.792891][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2296.801324][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2296.809646][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2296.817824][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2296.826150][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2296.834753][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2296.842579][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2296.865387][ T9076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2297.359770][ T9084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2297.620291][ T9084] 8021q: adding VLAN 0 to HW filter on device team0 [ 2297.631613][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2297.639579][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2297.670039][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2297.678619][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2297.687342][ T8625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2297.694438][ T8625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2297.702148][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2297.711184][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2297.719627][ T8625] bridge0: port 2(bridge_slave_1) entered blocking state [ 2297.726678][ T8625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2297.734949][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2297.743862][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2297.820150][ T9105] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2297.839118][ T9105] CPU: 0 PID: 9105 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2297.847075][ T9105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.857149][ T9105] Call Trace: [ 2297.860467][ T9105] dump_stack+0x172/0x1f0 [ 2297.864828][ T9105] dump_header+0x10f/0xb6c [ 2297.869267][ T9105] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2297.875187][ T9105] ? ___ratelimit+0x60/0x595 [ 2297.879800][ T9105] oom_kill_process.cold+0x10/0x15 [ 2297.884927][ T9105] out_of_memory+0x79a/0x1280 [ 2297.889622][ T9105] ? __sched_text_start+0x8/0x8 [ 2297.894491][ T9105] ? oom_killer_disable+0x280/0x280 [ 2297.899727][ T9105] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2297.905296][ T9105] ? memcg_event_wake+0x230/0x230 [ 2297.910358][ T9105] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2297.916184][ T9105] ? cgroup_file_notify+0x140/0x1b0 [ 2297.921405][ T9105] memory_max_write+0x169/0x300 [ 2297.926267][ T9105] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2297.931578][ T9105] ? mem_cgroup_write+0x360/0x360 [ 2297.936616][ T9105] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2297.942102][ T9105] cgroup_file_write+0x245/0x7a0 [ 2297.947062][ T9105] ? mem_cgroup_write+0x360/0x360 [ 2297.952101][ T9105] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2297.957779][ T9105] ? kernfs_ops+0x9f/0x120 [ 2297.962218][ T9105] ? kernfs_ops+0xbe/0x120 [ 2297.966648][ T9105] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2297.972290][ T9105] kernfs_fop_write+0x2ba/0x480 [ 2297.977170][ T9105] __vfs_write+0x8d/0x110 [ 2297.981509][ T9105] ? kernfs_fop_open+0xd90/0xd90 [ 2297.986464][ T9105] vfs_write+0x20c/0x580 [ 2297.990728][ T9105] ksys_write+0x14f/0x2d0 [ 2297.995084][ T9105] ? __ia32_sys_read+0xb0/0xb0 [ 2297.999862][ T9105] ? do_syscall_64+0x26/0x610 [ 2298.004556][ T9105] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2298.010632][ T9105] ? do_syscall_64+0x26/0x610 [ 2298.015337][ T9105] __x64_sys_write+0x73/0xb0 [ 2298.019944][ T9105] do_syscall_64+0x103/0x610 [ 2298.024555][ T9105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2298.030458][ T9105] RIP: 0033:0x458da9 [ 2298.034357][ T9105] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2298.053971][ T9105] RSP: 002b:00007ff6ddc77c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2298.062397][ T9105] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2298.070379][ T9105] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2298.078359][ T9105] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2298.086439][ T9105] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6ddc786d4 [ 2298.094422][ T9105] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2298.109342][ T9105] memory: usage 6036kB, limit 0kB, failcnt 552 [ 2298.115726][ T9105] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2298.126458][ T9105] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2298.143700][ T9105] Memory cgroup stats for /syz4: cache:60KB rss:4164KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4164KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2298.174918][ T9105] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9104,uid=0 [ 2298.200452][ T9105] Memory cgroup out of memory: Killed process 9104 (syz-executor.4) total-vm:72584kB, anon-rss:4180kB, file-rss:34816kB, shmem-rss:0kB [ 2298.227421][ T1043] oom_reaper: reaped process 9104 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2298.302662][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2298.358691][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2298.367700][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2298.377000][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2298.386189][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2298.399598][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2298.408371][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 18:53:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:53:03 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:03 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2298.744482][ T9076] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2298.801638][ T9076] CPU: 0 PID: 9076 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2298.809575][ T9076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2298.819635][ T9076] Call Trace: [ 2298.822940][ T9076] dump_stack+0x172/0x1f0 [ 2298.827275][ T9076] dump_header+0x10f/0xb6c [ 2298.831712][ T9076] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2298.837528][ T9076] ? ___ratelimit+0x60/0x595 [ 2298.842122][ T9076] ? do_raw_spin_unlock+0x57/0x270 [ 2298.847241][ T9076] oom_kill_process.cold+0x10/0x15 [ 2298.852363][ T9076] out_of_memory+0x79a/0x1280 [ 2298.857047][ T9076] ? lock_downgrade+0x880/0x880 [ 2298.861907][ T9076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2298.868155][ T9076] ? oom_killer_disable+0x280/0x280 [ 2298.873356][ T9076] ? find_held_lock+0x35/0x130 [ 2298.878142][ T9076] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2298.883704][ T9076] ? memcg_event_wake+0x230/0x230 [ 2298.888740][ T9076] ? do_raw_spin_unlock+0x57/0x270 [ 2298.893864][ T9076] ? _raw_spin_unlock+0x2d/0x50 [ 2298.898723][ T9076] try_charge+0x102c/0x15c0 [ 2298.903225][ T9076] ? find_held_lock+0x35/0x130 [ 2298.908002][ T9076] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2298.913551][ T9076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2298.919808][ T9076] ? kasan_check_read+0x11/0x20 [ 2298.924674][ T9076] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2298.930236][ T9076] mem_cgroup_try_charge+0x24d/0x5e0 [ 2298.935532][ T9076] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2298.941172][ T9076] wp_page_copy+0x408/0x1740 [ 2298.945771][ T9076] ? find_held_lock+0x35/0x130 [ 2298.950546][ T9076] ? pmd_pfn+0x1d0/0x1d0 [ 2298.954787][ T9076] ? lock_downgrade+0x880/0x880 [ 2298.959639][ T9076] ? swp_swapcount+0x540/0x540 [ 2298.964413][ T9076] ? kasan_check_read+0x11/0x20 [ 2298.969268][ T9076] ? do_raw_spin_unlock+0x57/0x270 [ 2298.974389][ T9076] do_wp_page+0x48e/0x1500 [ 2298.978820][ T9076] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2298.984209][ T9076] __handle_mm_fault+0x22e8/0x3ec0 [ 2298.989335][ T9076] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2298.994885][ T9076] ? find_held_lock+0x35/0x130 [ 2298.999654][ T9076] ? handle_mm_fault+0x322/0xb30 [ 2299.004612][ T9076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2299.010856][ T9076] ? kasan_check_read+0x11/0x20 [ 2299.015715][ T9076] handle_mm_fault+0x43f/0xb30 [ 2299.020487][ T9076] __do_page_fault+0x5ef/0xda0 [ 2299.025262][ T9076] do_page_fault+0x71/0x581 [ 2299.029766][ T9076] ? page_fault+0x8/0x30 [ 2299.034014][ T9076] page_fault+0x1e/0x30 [ 2299.038171][ T9076] RIP: 0033:0x42ff36 [ 2299.042080][ T9076] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2299.061694][ T9076] RSP: 002b:00007fffbfc1a760 EFLAGS: 00010206 [ 2299.067766][ T9076] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2299.075919][ T9076] RDX: 0000000002400930 RSI: 0000000002408970 RDI: 0000000000000003 [ 2299.083900][ T9076] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000023ff940 [ 2299.091884][ T9076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2299.099872][ T9076] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 2299.110797][ T9076] memory: usage 1616kB, limit 0kB, failcnt 560 [ 2299.117092][ T9076] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2299.125536][ T9076] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2299.132976][ T9076] Memory cgroup stats for /syz4: cache:60KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2299.154015][ T9076] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9076,uid=0 [ 2299.170633][ T9076] Memory cgroup out of memory: Killed process 9076 (syz-executor.4) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 2299.185656][ T1043] oom_reaper: reaped process 9076 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2299.207476][ T9084] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2299.223379][ T9084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2299.232556][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2299.242199][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2299.531786][ T9084] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2300.148838][ T9118] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2300.179108][ T9118] CPU: 1 PID: 9118 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2300.187052][ T9118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2300.197199][ T9118] Call Trace: [ 2300.200519][ T9118] dump_stack+0x172/0x1f0 [ 2300.204858][ T9118] dump_header+0x10f/0xb6c [ 2300.209294][ T9118] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2300.215102][ T9118] ? ___ratelimit+0x60/0x595 [ 2300.219705][ T9118] oom_kill_process.cold+0x10/0x15 [ 2300.224822][ T9118] out_of_memory+0x79a/0x1280 [ 2300.229602][ T9118] ? retint_kernel+0x2d/0x2d [ 2300.234201][ T9118] ? oom_killer_disable+0x280/0x280 [ 2300.239419][ T9118] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2300.244966][ T9118] ? memcg_event_wake+0x230/0x230 [ 2300.250016][ T9118] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2300.255834][ T9118] ? cgroup_file_notify+0x140/0x1b0 [ 2300.261053][ T9118] memory_max_write+0x169/0x300 [ 2300.265907][ T9118] ? retint_kernel+0x2d/0x2d [ 2300.270516][ T9118] ? mem_cgroup_write+0x360/0x360 [ 2300.275565][ T9118] cgroup_file_write+0x245/0x7a0 [ 2300.280528][ T9118] ? mem_cgroup_write+0x360/0x360 [ 2300.285555][ T9118] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2300.291217][ T9118] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2300.296859][ T9118] kernfs_fop_write+0x2ba/0x480 [ 2300.301730][ T9118] __vfs_write+0x8d/0x110 [ 2300.306067][ T9118] ? kernfs_fop_open+0xd90/0xd90 [ 2300.311016][ T9118] vfs_write+0x20c/0x580 [ 2300.315276][ T9118] ksys_write+0x14f/0x2d0 [ 2300.319627][ T9118] ? __ia32_sys_read+0xb0/0xb0 [ 2300.324399][ T9118] ? do_syscall_64+0x26/0x610 [ 2300.329083][ T9118] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2300.335159][ T9118] ? do_syscall_64+0x26/0x610 [ 2300.339854][ T9118] __x64_sys_write+0x73/0xb0 [ 2300.344457][ T9118] do_syscall_64+0x103/0x610 [ 2300.349063][ T9118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2300.354954][ T9118] RIP: 0033:0x458da9 [ 2300.358847][ T9118] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2300.378455][ T9118] RSP: 002b:00007f76e68b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2300.386882][ T9118] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2300.394862][ T9118] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2300.402835][ T9118] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2300.410807][ T9118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f76e68b86d4 [ 2300.418778][ T9118] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2300.437521][ T9118] memory: usage 4724kB, limit 0kB, failcnt 603847 [ 2300.444204][ T9118] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2300.455503][ T9118] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2300.463509][ T9118] Memory cgroup stats for /syz3: cache:100KB rss:4152KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2300.486151][ T9118] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9117,uid=0 [ 2300.503786][ T9118] Memory cgroup out of memory: Killed process 9117 (syz-executor.3) total-vm:72452kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 2300.523256][ T1043] oom_reaper: reaped process 9117 (syz-executor.3), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB [ 2300.665965][ T9120] IPVS: ftp: loaded support on port[0] = 21 18:53:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a", 0x51}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:53:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) [ 2300.813116][ T9084] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 2300.838810][ T9084] CPU: 0 PID: 9084 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2300.846742][ T9084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2300.856804][ T9084] Call Trace: [ 2300.860106][ T9084] dump_stack+0x172/0x1f0 [ 2300.864453][ T9084] dump_header+0x10f/0xb6c [ 2300.868887][ T9084] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2300.874710][ T9084] ? ___ratelimit+0x60/0x595 [ 2300.879313][ T9084] ? do_raw_spin_unlock+0x57/0x270 [ 2300.884441][ T9084] oom_kill_process.cold+0x10/0x15 [ 2300.889576][ T9084] out_of_memory+0x79a/0x1280 [ 2300.894271][ T9084] ? lock_downgrade+0x880/0x880 [ 2300.899135][ T9084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2300.905390][ T9084] ? oom_killer_disable+0x280/0x280 [ 2300.910594][ T9084] ? find_held_lock+0x35/0x130 [ 2300.915381][ T9084] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2300.920948][ T9084] ? memcg_event_wake+0x230/0x230 [ 2300.926000][ T9084] ? do_raw_spin_unlock+0x57/0x270 [ 2300.931134][ T9084] ? _raw_spin_unlock+0x2d/0x50 [ 2300.936000][ T9084] try_charge+0x102c/0x15c0 [ 2300.940512][ T9084] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2300.946772][ T9084] ? should_fail+0x1de/0x852 [ 2300.951384][ T9084] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2300.956984][ T9084] ? rcu_read_lock_sched_held+0x110/0x130 [ 2300.962731][ T9084] ? __alloc_pages_nodemask+0x599/0x7e0 [ 2300.968299][ T9084] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2300.973861][ T9084] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2300.979071][ T9084] ? cache_grow_begin+0x594/0x860 [ 2300.984116][ T9084] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2300.989417][ T9084] ? trace_hardirqs_on+0x67/0x230 [ 2300.994460][ T9084] cache_grow_begin+0x5c0/0x860 [ 2300.999338][ T9084] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2301.005594][ T9084] ? __cpuset_node_allowed+0x136/0x540 [ 2301.011069][ T9084] fallback_alloc+0x1fd/0x2d0 [ 2301.015768][ T9084] ____cache_alloc_node+0x1be/0x1e0 [ 2301.020996][ T9084] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2301.027261][ T9084] kmem_cache_alloc+0x1e8/0x6f0 [ 2301.032135][ T9084] ? __save_stack_trace+0x99/0x100 [ 2301.037271][ T9084] __alloc_file+0x27/0x300 [ 2301.041705][ T9084] alloc_empty_file+0x72/0x170 [ 2301.046489][ T9084] path_openat+0xef/0x46e0 [ 2301.050926][ T9084] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2301.056751][ T9084] ? kasan_slab_alloc+0xf/0x20 [ 2301.061789][ T9084] ? kmem_cache_alloc+0x11a/0x6f0 [ 2301.066941][ T9084] ? getname_flags+0xd6/0x5b0 [ 2301.071627][ T9084] ? getname+0x1a/0x20 [ 2301.075707][ T9084] ? do_sys_open+0x2c9/0x5d0 [ 2301.080308][ T9084] ? __x64_sys_open+0x7e/0xc0 [ 2301.084998][ T9084] ? do_syscall_64+0x103/0x610 [ 2301.089773][ T9084] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2301.095866][ T9084] ? __lock_acquire+0x548/0x3fb0 [ 2301.100820][ T9084] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2301.106221][ T9084] ? __alloc_fd+0x44d/0x560 [ 2301.110738][ T9084] do_filp_open+0x1a1/0x280 [ 2301.115252][ T9084] ? may_open_dev+0x100/0x100 [ 2301.119950][ T9084] ? lock_downgrade+0x880/0x880 [ 2301.124817][ T9084] ? kasan_check_read+0x11/0x20 [ 2301.129680][ T9084] ? do_raw_spin_unlock+0x57/0x270 [ 2301.134808][ T9084] ? _raw_spin_unlock+0x2d/0x50 [ 2301.139668][ T9084] ? __alloc_fd+0x44d/0x560 [ 2301.144190][ T9084] do_sys_open+0x3fe/0x5d0 [ 2301.148618][ T9084] ? filp_open+0x80/0x80 [ 2301.152877][ T9084] ? __detach_mounts+0x320/0x320 [ 2301.157835][ T9084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2301.163308][ T9084] ? do_syscall_64+0x26/0x610 [ 2301.167994][ T9084] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2301.174074][ T9084] ? do_syscall_64+0x26/0x610 [ 2301.178773][ T9084] __x64_sys_open+0x7e/0xc0 [ 2301.183298][ T9084] do_syscall_64+0x103/0x610 [ 2301.187913][ T9084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2301.193820][ T9084] RIP: 0033:0x456dd0 [ 2301.197721][ T9084] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 2301.217331][ T9084] RSP: 002b:00007ffc69f63a50 EFLAGS: 00000206 ORIG_RAX: 0000000000000002 [ 2301.225755][ T9084] RAX: ffffffffffffffda RBX: 00000000002318c2 RCX: 0000000000456dd0 [ 2301.233742][ T9084] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffc69f64c30 [ 2301.241717][ T9084] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000002292940 [ 2301.249695][ T9084] R10: 0000000000000000 R11: 0000000000000206 R12: 00007ffc69f64c30 [ 2301.257682][ T9084] R13: 00007ffc69f64c20 R14: 0000000000000000 R15: 00007ffc69f64c30 [ 2301.285368][ T9084] memory: usage 348kB, limit 0kB, failcnt 603859 [ 2301.298660][ T9084] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2301.306447][ T9084] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2301.334160][ T9084] Memory cgroup stats for /syz3: cache:100KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2301.399031][ T9084] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9084,uid=0 [ 2301.433516][ T9084] Memory cgroup out of memory: Killed process 9084 (syz-executor.3) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 2301.459901][ T1043] oom_reaper: reaped process 9084 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 18:53:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2302.901610][ T9150] IPVS: ftp: loaded support on port[0] = 21 [ 2302.934064][ T984] device bridge_slave_1 left promiscuous mode [ 2302.951050][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2303.001542][ T984] device bridge_slave_0 left promiscuous mode [ 2303.007809][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2303.056466][ T984] device bridge_slave_1 left promiscuous mode [ 2303.063849][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2303.111717][ T984] device bridge_slave_0 left promiscuous mode [ 2303.117906][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2303.170848][ T984] device bridge_slave_1 left promiscuous mode [ 2303.177037][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2303.219805][ T984] device bridge_slave_0 left promiscuous mode [ 2303.225969][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2303.290944][ T984] device bridge_slave_1 left promiscuous mode [ 2303.297126][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2303.330592][ T984] device bridge_slave_0 left promiscuous mode [ 2303.336819][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2309.831969][ T984] device hsr_slave_1 left promiscuous mode [ 2309.873917][ T984] device hsr_slave_0 left promiscuous mode [ 2309.923669][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2309.936367][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2309.947610][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2309.994666][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2310.082883][ T984] bond0 (unregistering): Released all slaves [ 2310.261421][ T984] device hsr_slave_1 left promiscuous mode [ 2310.314264][ T984] device hsr_slave_0 left promiscuous mode [ 2310.382583][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2310.395580][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2310.406789][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2310.443840][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2310.534004][ T984] bond0 (unregistering): Released all slaves [ 2310.702772][ T984] device hsr_slave_1 left promiscuous mode [ 2310.744401][ T984] device hsr_slave_0 left promiscuous mode [ 2310.794510][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2310.805850][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2310.817909][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2310.856014][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2310.954070][ T984] bond0 (unregistering): Released all slaves [ 2311.131379][ T984] device hsr_slave_1 left promiscuous mode [ 2311.184271][ T984] device hsr_slave_0 left promiscuous mode [ 2311.252616][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2311.266076][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2311.277309][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2311.343720][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2311.435404][ T984] bond0 (unregistering): Released all slaves [ 2311.603542][ T9120] chnl_net:caif_netlink_parms(): no params data found [ 2311.605002][ T9163] IPVS: ftp: loaded support on port[0] = 21 [ 2311.685023][ T9120] bridge0: port 1(bridge_slave_0) entered blocking state [ 2311.693667][ T9120] bridge0: port 1(bridge_slave_0) entered disabled state [ 2311.701350][ T9120] device bridge_slave_0 entered promiscuous mode [ 2311.730446][ T9120] bridge0: port 2(bridge_slave_1) entered blocking state [ 2311.737670][ T9120] bridge0: port 2(bridge_slave_1) entered disabled state [ 2311.745841][ T9120] device bridge_slave_1 entered promiscuous mode [ 2311.801336][ T9120] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2311.812717][ T9120] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2311.834128][ T9150] chnl_net:caif_netlink_parms(): no params data found [ 2311.856740][ T9163] chnl_net:caif_netlink_parms(): no params data found [ 2311.873623][ T9120] team0: Port device team_slave_0 added [ 2311.883451][ T9120] team0: Port device team_slave_1 added [ 2311.916508][ T9150] bridge0: port 1(bridge_slave_0) entered blocking state [ 2311.923826][ T9150] bridge0: port 1(bridge_slave_0) entered disabled state [ 2311.931891][ T9150] device bridge_slave_0 entered promiscuous mode [ 2311.939603][ T9150] bridge0: port 2(bridge_slave_1) entered blocking state [ 2311.946650][ T9150] bridge0: port 2(bridge_slave_1) entered disabled state [ 2311.955431][ T9150] device bridge_slave_1 entered promiscuous mode [ 2311.987951][ T9150] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2312.041909][ T9120] device hsr_slave_0 entered promiscuous mode [ 2312.093542][ T9120] device hsr_slave_1 entered promiscuous mode [ 2312.164367][ T9150] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2312.184121][ T9150] team0: Port device team_slave_0 added [ 2312.194162][ T9163] bridge0: port 1(bridge_slave_0) entered blocking state [ 2312.201647][ T9163] bridge0: port 1(bridge_slave_0) entered disabled state [ 2312.209492][ T9163] device bridge_slave_0 entered promiscuous mode [ 2312.217052][ T9163] bridge0: port 2(bridge_slave_1) entered blocking state [ 2312.224868][ T9163] bridge0: port 2(bridge_slave_1) entered disabled state [ 2312.232873][ T9163] device bridge_slave_1 entered promiscuous mode [ 2312.241511][ T9150] team0: Port device team_slave_1 added [ 2312.258591][ T9163] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2312.278289][ T9163] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2312.331957][ T9150] device hsr_slave_0 entered promiscuous mode [ 2312.369539][ T9150] device hsr_slave_1 entered promiscuous mode [ 2312.415968][ T9163] team0: Port device team_slave_0 added [ 2312.425127][ T9120] bridge0: port 2(bridge_slave_1) entered blocking state [ 2312.432231][ T9120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2312.439596][ T9120] bridge0: port 1(bridge_slave_0) entered blocking state [ 2312.446641][ T9120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2312.461398][ T9163] team0: Port device team_slave_1 added [ 2312.541594][ T9163] device hsr_slave_0 entered promiscuous mode [ 2312.579383][ T9163] device hsr_slave_1 entered promiscuous mode [ 2312.627761][ T9150] bridge0: port 2(bridge_slave_1) entered blocking state [ 2312.634956][ T9150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2312.642435][ T9150] bridge0: port 1(bridge_slave_0) entered blocking state [ 2312.649530][ T9150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2312.658209][ T8624] bridge0: port 1(bridge_slave_0) entered disabled state [ 2312.666404][ T8624] bridge0: port 2(bridge_slave_1) entered disabled state [ 2312.675948][ T8624] bridge0: port 1(bridge_slave_0) entered disabled state [ 2312.684700][ T8624] bridge0: port 2(bridge_slave_1) entered disabled state [ 2312.747736][ T9120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2312.783573][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2312.791452][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2312.807990][ T9150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2312.817865][ T9120] 8021q: adding VLAN 0 to HW filter on device team0 [ 2312.832597][ T9163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2312.848464][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2312.856956][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2312.865173][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2312.874412][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2312.883046][ T8625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2312.890134][ T8625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2312.902011][ T9163] 8021q: adding VLAN 0 to HW filter on device team0 [ 2312.913129][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2312.920939][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2312.942321][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2312.951464][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2312.960663][ T8646] bridge0: port 2(bridge_slave_1) entered blocking state [ 2312.967716][ T8646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2312.976014][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2312.984720][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2312.993326][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2313.001995][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2313.010451][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2313.018803][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2313.027198][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2313.035488][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2313.045101][ T9150] 8021q: adding VLAN 0 to HW filter on device team0 [ 2313.062846][ T9120] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2313.078098][ T9120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2313.086107][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2313.094179][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2313.103235][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2313.111708][ T8646] bridge0: port 1(bridge_slave_0) entered blocking state [ 2313.118750][ T8646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2313.126499][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2313.135641][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2313.144057][ T8646] bridge0: port 2(bridge_slave_1) entered blocking state [ 2313.151131][ T8646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2313.159535][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2313.168090][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2313.176530][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2313.185015][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2313.206834][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2313.215686][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2313.224904][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2313.233879][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2313.242841][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2313.266362][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2313.276885][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2313.285986][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2313.294594][ T8625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2313.301704][ T8625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2313.310001][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2313.318502][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2313.326945][ T8625] bridge0: port 2(bridge_slave_1) entered blocking state [ 2313.334018][ T8625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2313.342244][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2313.350864][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2313.359174][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2313.371131][ T9120] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2313.392082][ T9163] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2313.425050][ T9163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2313.433679][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2313.443782][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2313.452519][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2313.461499][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2313.470211][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2313.478513][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2313.487320][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2313.496053][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2313.517442][ T9150] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2313.540522][ T9150] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2313.558757][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2313.574785][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2313.584500][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2313.593046][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2313.645931][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 18:53:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a", 0x51}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:53:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:18 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2313.754918][ T9163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2313.806323][ T9150] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2314.286679][ T9187] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2314.329195][ T9187] CPU: 1 PID: 9187 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2314.337141][ T9187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.347216][ T9187] Call Trace: [ 2314.350625][ T9187] dump_stack+0x172/0x1f0 [ 2314.354987][ T9187] dump_header+0x10f/0xb6c [ 2314.359431][ T9187] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2314.365261][ T9187] ? ___ratelimit+0x60/0x595 [ 2314.369875][ T9187] ? do_raw_spin_unlock+0x57/0x270 [ 2314.375018][ T9187] oom_kill_process.cold+0x10/0x15 [ 2314.380156][ T9187] out_of_memory+0x79a/0x1280 [ 2314.384859][ T9187] ? retint_kernel+0x2d/0x2d [ 2314.389475][ T9187] ? oom_killer_disable+0x280/0x280 [ 2314.394714][ T9187] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2314.400285][ T9187] ? memcg_event_wake+0x230/0x230 [ 2314.405342][ T9187] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2314.411174][ T9187] ? cgroup_file_notify+0x140/0x1b0 [ 2314.416404][ T9187] memory_max_write+0x169/0x300 [ 2314.421282][ T9187] ? kernfs_fop_write+0x204/0x480 [ 2314.426337][ T9187] ? mem_cgroup_write+0x360/0x360 [ 2314.431387][ T9187] ? lock_acquire+0x16f/0x3f0 [ 2314.436087][ T9187] ? kernfs_fop_write+0x227/0x480 [ 2314.441145][ T9187] cgroup_file_write+0x245/0x7a0 [ 2314.446110][ T9187] ? mem_cgroup_write+0x360/0x360 [ 2314.451165][ T9187] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2314.456834][ T9187] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2314.462498][ T9187] kernfs_fop_write+0x2ba/0x480 [ 2314.467388][ T9187] __vfs_write+0x8d/0x110 [ 2314.471748][ T9187] ? kernfs_fop_open+0xd90/0xd90 [ 2314.476712][ T9187] vfs_write+0x20c/0x580 [ 2314.480989][ T9187] ksys_write+0x14f/0x2d0 [ 2314.485342][ T9187] ? __ia32_sys_read+0xb0/0xb0 [ 2314.490133][ T9187] ? do_syscall_64+0x26/0x610 [ 2314.494835][ T9187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2314.500929][ T9187] ? do_syscall_64+0x26/0x610 [ 2314.505637][ T9187] __x64_sys_write+0x73/0xb0 [ 2314.510257][ T9187] do_syscall_64+0x103/0x610 [ 2314.514879][ T9187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2314.520791][ T9187] RIP: 0033:0x458da9 [ 2314.524700][ T9187] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2314.544320][ T9187] RSP: 002b:00007fdbebf9dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2314.552751][ T9187] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2314.560737][ T9187] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2314.568810][ T9187] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2314.576800][ T9187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbebf9e6d4 [ 2314.584789][ T9187] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2314.669395][ T9187] memory: usage 6024kB, limit 0kB, failcnt 561 [ 2314.787917][ T9187] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2314.798309][ T9187] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 18:53:19 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2314.808871][ T9187] Memory cgroup stats for /syz4: cache:60KB rss:4196KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2314.925778][ T9187] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9186,uid=0 [ 2314.953092][ T9187] Memory cgroup out of memory: Killed process 9187 (syz-executor.4) total-vm:72452kB, anon-rss:4228kB, file-rss:35756kB, shmem-rss:0kB [ 2314.969911][ T1043] oom_reaper: reaped process 9187 (syz-executor.4), now anon-rss:0kB, file-rss:34796kB, shmem-rss:0kB 18:53:19 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:19 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) 18:53:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2315.066976][ T9163] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2315.119559][ T9163] CPU: 1 PID: 9163 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2315.127679][ T9163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.137747][ T9163] Call Trace: [ 2315.141065][ T9163] dump_stack+0x172/0x1f0 [ 2315.145418][ T9163] dump_header+0x10f/0xb6c [ 2315.149847][ T9163] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2315.155667][ T9163] ? ___ratelimit+0x60/0x595 [ 2315.160268][ T9163] ? do_raw_spin_unlock+0x57/0x270 [ 2315.165401][ T9163] oom_kill_process.cold+0x10/0x15 [ 2315.170550][ T9163] out_of_memory+0x79a/0x1280 [ 2315.175251][ T9163] ? lock_downgrade+0x880/0x880 [ 2315.180126][ T9163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.186394][ T9163] ? oom_killer_disable+0x280/0x280 [ 2315.191624][ T9163] ? find_held_lock+0x35/0x130 [ 2315.196422][ T9163] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2315.201986][ T9163] ? memcg_event_wake+0x230/0x230 [ 2315.207040][ T9163] ? do_raw_spin_unlock+0x57/0x270 [ 2315.212172][ T9163] ? _raw_spin_unlock+0x2d/0x50 [ 2315.217051][ T9163] try_charge+0x102c/0x15c0 [ 2315.221570][ T9163] ? find_held_lock+0x35/0x130 [ 2315.226368][ T9163] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2315.231936][ T9163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.238201][ T9163] ? kasan_check_read+0x11/0x20 [ 2315.243083][ T9163] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2315.248656][ T9163] mem_cgroup_try_charge+0x24d/0x5e0 [ 2315.253972][ T9163] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2315.259639][ T9163] wp_page_copy+0x408/0x1740 [ 2315.264251][ T9163] ? find_held_lock+0x35/0x130 [ 2315.269055][ T9163] ? pmd_pfn+0x1d0/0x1d0 [ 2315.273319][ T9163] ? lock_downgrade+0x880/0x880 [ 2315.278186][ T9163] ? swp_swapcount+0x540/0x540 [ 2315.282980][ T9163] ? kasan_check_read+0x11/0x20 [ 2315.287848][ T9163] ? do_raw_spin_unlock+0x57/0x270 [ 2315.292977][ T9163] do_wp_page+0x48e/0x1500 [ 2315.297417][ T9163] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2315.302813][ T9163] __handle_mm_fault+0x22e8/0x3ec0 [ 2315.307946][ T9163] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2315.313522][ T9163] ? find_held_lock+0x35/0x130 [ 2315.318304][ T9163] ? handle_mm_fault+0x322/0xb30 [ 2315.323269][ T9163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.329534][ T9163] ? kasan_check_read+0x11/0x20 [ 2315.334405][ T9163] handle_mm_fault+0x43f/0xb30 [ 2315.339187][ T9163] __do_page_fault+0x5ef/0xda0 [ 2315.343977][ T9163] do_page_fault+0x71/0x581 [ 2315.348501][ T9163] ? page_fault+0x8/0x30 [ 2315.352761][ T9163] page_fault+0x1e/0x30 [ 2315.356930][ T9163] RIP: 0033:0x42ff36 [ 2315.360833][ T9163] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2315.380446][ T9163] RSP: 002b:00007ffe6e3d77a0 EFLAGS: 00010206 [ 2315.386527][ T9163] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2315.394511][ T9163] RDX: 00000000028a8930 RSI: 00000000028b0970 RDI: 0000000000000003 [ 2315.402501][ T9163] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000028a7940 [ 2315.410492][ T9163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2315.418473][ T9163] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 2315.559766][ T9163] memory: usage 1652kB, limit 0kB, failcnt 569 [ 2315.565983][ T9163] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2315.610980][ T9163] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2315.648722][ T9163] Memory cgroup stats for /syz4: cache:60KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2315.773947][ T9163] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9163,uid=0 [ 2315.839218][ T9163] Memory cgroup out of memory: Killed process 9163 (syz-executor.4) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB 18:53:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2315.889733][ T1043] oom_reaper: reaped process 9163 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 18:53:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) 18:53:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2316.271616][ T9229] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2316.294667][ T9229] CPU: 0 PID: 9229 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2316.302619][ T9229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.312701][ T9229] Call Trace: [ 2316.316026][ T9229] dump_stack+0x172/0x1f0 [ 2316.320386][ T9229] dump_header+0x10f/0xb6c [ 2316.324842][ T9229] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2316.330694][ T9229] ? ___ratelimit+0x60/0x595 [ 2316.335320][ T9229] ? do_raw_spin_unlock+0x57/0x270 [ 2316.340476][ T9229] oom_kill_process.cold+0x10/0x15 [ 2316.345613][ T9229] out_of_memory+0x79a/0x1280 [ 2316.350329][ T9229] ? __sched_text_start+0x8/0x8 [ 2316.355220][ T9229] ? oom_killer_disable+0x280/0x280 [ 2316.360449][ T9229] ? cgroup_file_notify+0x140/0x1b0 [ 2316.365712][ T9229] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2316.371289][ T9229] ? memcg_event_wake+0x230/0x230 [ 2316.376327][ T9229] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2316.382134][ T9229] ? cgroup_file_notify+0x140/0x1b0 [ 2316.387333][ T9229] memory_max_write+0x169/0x300 [ 2316.392177][ T9229] ? kernfs_fop_write+0x204/0x480 [ 2316.397197][ T9229] ? mem_cgroup_write+0x360/0x360 [ 2316.402216][ T9229] ? lock_acquire+0x16f/0x3f0 [ 2316.406884][ T9229] ? kernfs_fop_write+0x227/0x480 [ 2316.411915][ T9229] cgroup_file_write+0x245/0x7a0 [ 2316.416848][ T9229] ? mem_cgroup_write+0x360/0x360 [ 2316.421865][ T9229] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2316.427498][ T9229] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2316.433126][ T9229] kernfs_fop_write+0x2ba/0x480 [ 2316.437978][ T9229] __vfs_write+0x8d/0x110 [ 2316.442296][ T9229] ? kernfs_fop_open+0xd90/0xd90 [ 2316.447338][ T9229] vfs_write+0x20c/0x580 [ 2316.451589][ T9229] ksys_write+0x14f/0x2d0 [ 2316.455922][ T9229] ? __ia32_sys_read+0xb0/0xb0 [ 2316.460689][ T9229] ? do_syscall_64+0x26/0x610 [ 2316.465364][ T9229] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2316.471421][ T9229] ? do_syscall_64+0x26/0x610 [ 2316.476098][ T9229] __x64_sys_write+0x73/0xb0 [ 2316.480692][ T9229] do_syscall_64+0x103/0x610 [ 2316.485378][ T9229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2316.491260][ T9229] RIP: 0033:0x458da9 [ 2316.495144][ T9229] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2316.514740][ T9229] RSP: 002b:00007ff30151ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2316.523142][ T9229] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2316.531108][ T9229] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000008 [ 2316.539068][ T9229] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2316.547029][ T9229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff30151f6d4 [ 2316.554990][ T9229] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2316.898121][ T9229] memory: usage 5380kB, limit 0kB, failcnt 142 [ 2316.919188][ T9229] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2316.947301][ T9229] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2317.000324][ T9229] Memory cgroup stats for /syz0: cache:456KB rss:4208KB rss_huge:4096KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:4228KB inactive_file:4KB active_file:0KB unevictable:0KB [ 2317.109162][ T9229] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9228,uid=0 [ 2317.149131][ T9229] Memory cgroup out of memory: Killed process 9228 (syz-executor.0) total-vm:72448kB, anon-rss:4232kB, file-rss:35792kB, shmem-rss:0kB [ 2317.181237][ T1043] oom_reaper: reaped process 9228 (syz-executor.0), now anon-rss:0kB, file-rss:34896kB, shmem-rss:0kB [ 2317.234376][ T9233] IPVS: ftp: loaded support on port[0] = 21 [ 2317.439212][ T9233] chnl_net:caif_netlink_parms(): no params data found [ 2317.498716][ T9233] bridge0: port 1(bridge_slave_0) entered blocking state [ 2317.505948][ T9233] bridge0: port 1(bridge_slave_0) entered disabled state [ 2317.521368][ T9233] device bridge_slave_0 entered promiscuous mode [ 2317.534970][ T9233] bridge0: port 2(bridge_slave_1) entered blocking state [ 2317.543972][ T9233] bridge0: port 2(bridge_slave_1) entered disabled state [ 2317.557397][ T9233] device bridge_slave_1 entered promiscuous mode [ 2317.594825][ T9233] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2317.607181][ T9233] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2317.638454][ T9233] team0: Port device team_slave_0 added [ 2317.667799][ T9233] team0: Port device team_slave_1 added [ 2317.769867][ T9233] device hsr_slave_0 entered promiscuous mode [ 2317.806532][ T9233] device hsr_slave_1 entered promiscuous mode [ 2317.888313][ T9233] bridge0: port 2(bridge_slave_1) entered blocking state [ 2317.895457][ T9233] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2317.902835][ T9233] bridge0: port 1(bridge_slave_0) entered blocking state [ 2317.909930][ T9233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2317.983893][ T9233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2318.007981][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2318.046829][ T8624] bridge0: port 1(bridge_slave_0) entered disabled state [ 2318.068205][ T8624] bridge0: port 2(bridge_slave_1) entered disabled state [ 2318.102510][ T9233] 8021q: adding VLAN 0 to HW filter on device team0 [ 2318.122574][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2318.149609][ T8624] bridge0: port 1(bridge_slave_0) entered blocking state [ 2318.156701][ T8624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2318.190931][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2318.199777][ T641] bridge0: port 2(bridge_slave_1) entered blocking state [ 2318.206840][ T641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2318.250586][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2318.259776][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2318.268292][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2318.293370][ T9233] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2318.305135][ T9233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2318.313085][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2318.321441][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2318.330038][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2318.351375][ T9233] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2318.581805][ T9247] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2318.598432][ T9247] CPU: 0 PID: 9247 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2318.606362][ T9247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2318.616443][ T9247] Call Trace: [ 2318.619759][ T9247] dump_stack+0x172/0x1f0 [ 2318.624119][ T9247] dump_header+0x10f/0xb6c [ 2318.628549][ T9247] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2318.634375][ T9247] ? ___ratelimit+0x60/0x595 [ 2318.638975][ T9247] ? do_raw_spin_unlock+0x57/0x270 [ 2318.644106][ T9247] oom_kill_process.cold+0x10/0x15 [ 2318.649230][ T9247] out_of_memory+0x79a/0x1280 [ 2318.653925][ T9247] ? __sched_text_start+0x8/0x8 [ 2318.658796][ T9247] ? oom_killer_disable+0x280/0x280 [ 2318.664037][ T9247] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2318.669592][ T9247] ? memcg_event_wake+0x230/0x230 [ 2318.674640][ T9247] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2318.680460][ T9247] ? cgroup_file_notify+0x140/0x1b0 [ 2318.685681][ T9247] memory_max_write+0x169/0x300 [ 2318.690549][ T9247] ? kernfs_fop_write+0x204/0x480 [ 2318.695598][ T9247] ? mem_cgroup_write+0x360/0x360 [ 2318.700737][ T9247] ? lock_acquire+0x16f/0x3f0 [ 2318.705424][ T9247] ? kernfs_fop_write+0x227/0x480 [ 2318.710480][ T9247] cgroup_file_write+0x245/0x7a0 [ 2318.715427][ T9247] ? mem_cgroup_write+0x360/0x360 [ 2318.720466][ T9247] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2318.726205][ T9247] ? ata_eh_link_autopsy+0x140/0x30f0 [ 2318.731609][ T9247] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2318.737251][ T9247] kernfs_fop_write+0x2ba/0x480 [ 2318.742126][ T9247] __vfs_write+0x8d/0x110 [ 2318.746462][ T9247] ? kernfs_fop_open+0xd90/0xd90 [ 2318.752244][ T9247] vfs_write+0x20c/0x580 [ 2318.756516][ T9247] ksys_write+0x14f/0x2d0 [ 2318.760865][ T9247] ? __ia32_sys_read+0xb0/0xb0 [ 2318.765642][ T9247] ? do_syscall_64+0x26/0x610 [ 2318.770337][ T9247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2318.776423][ T9247] ? do_syscall_64+0x26/0x610 [ 2318.781131][ T9247] __x64_sys_write+0x73/0xb0 [ 2318.785736][ T9247] do_syscall_64+0x103/0x610 [ 2318.790351][ T9247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2318.796253][ T9247] RIP: 0033:0x458da9 [ 2318.800153][ T9247] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2318.819770][ T9247] RSP: 002b:00007fe5560ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2318.828189][ T9247] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2318.836170][ T9247] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2318.844142][ T9247] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2318.852119][ T9247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5560cd6d4 [ 2318.860095][ T9247] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2318.910366][ T9247] memory: usage 4700kB, limit 0kB, failcnt 603860 [ 2318.917157][ T9247] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2318.925177][ T9247] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2318.936921][ T9247] Memory cgroup stats for /syz3: cache:100KB rss:4228KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4204KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2318.959148][ T9247] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9246,uid=0 [ 2318.975432][ T9247] Memory cgroup out of memory: Killed process 9246 (syz-executor.3) total-vm:72452kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 2318.994209][ T1043] oom_reaper: reaped process 9246 (syz-executor.3), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB 18:53:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b", 0x57}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:53:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) 18:53:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2319.445205][ T9233] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2319.459067][ T9233] CPU: 0 PID: 9233 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2319.467004][ T9233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2319.477066][ T9233] Call Trace: [ 2319.480387][ T9233] dump_stack+0x172/0x1f0 [ 2319.484756][ T9233] dump_header+0x10f/0xb6c [ 2319.489189][ T9233] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2319.495016][ T9233] ? ___ratelimit+0x60/0x595 [ 2319.499620][ T9233] ? do_raw_spin_unlock+0x57/0x270 [ 2319.504774][ T9233] oom_kill_process.cold+0x10/0x15 [ 2319.509905][ T9233] out_of_memory+0x79a/0x1280 [ 2319.514607][ T9233] ? lock_downgrade+0x880/0x880 [ 2319.519475][ T9233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.525847][ T9233] ? oom_killer_disable+0x280/0x280 [ 2319.531060][ T9233] ? find_held_lock+0x35/0x130 [ 2319.535865][ T9233] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2319.541423][ T9233] ? memcg_event_wake+0x230/0x230 [ 2319.546464][ T9233] ? do_raw_spin_unlock+0x57/0x270 [ 2319.551600][ T9233] ? _raw_spin_unlock+0x2d/0x50 [ 2319.556470][ T9233] try_charge+0x102c/0x15c0 [ 2319.560992][ T9233] ? find_held_lock+0x35/0x130 [ 2319.565774][ T9233] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2319.571341][ T9233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.577601][ T9233] ? kasan_check_read+0x11/0x20 [ 2319.583938][ T9233] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2319.589505][ T9233] mem_cgroup_try_charge+0x24d/0x5e0 [ 2319.594816][ T9233] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2319.600474][ T9233] wp_page_copy+0x408/0x1740 [ 2319.605088][ T9233] ? find_held_lock+0x35/0x130 [ 2319.609888][ T9233] ? pmd_pfn+0x1d0/0x1d0 [ 2319.614144][ T9233] ? lock_downgrade+0x880/0x880 [ 2319.619013][ T9233] ? swp_swapcount+0x540/0x540 [ 2319.623792][ T9233] ? kasan_check_read+0x11/0x20 [ 2319.628657][ T9233] ? do_raw_spin_unlock+0x57/0x270 [ 2319.633789][ T9233] do_wp_page+0x48e/0x1500 [ 2319.638231][ T9233] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2319.645877][ T9233] __handle_mm_fault+0x22e8/0x3ec0 [ 2319.651010][ T9233] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2319.656576][ T9233] ? find_held_lock+0x35/0x130 [ 2319.661365][ T9233] ? handle_mm_fault+0x322/0xb30 [ 2319.666341][ T9233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2319.672605][ T9233] ? kasan_check_read+0x11/0x20 [ 2319.677487][ T9233] handle_mm_fault+0x43f/0xb30 [ 2319.682280][ T9233] __do_page_fault+0x5ef/0xda0 [ 2319.687074][ T9233] do_page_fault+0x71/0x581 [ 2319.691603][ T9233] ? page_fault+0x8/0x30 [ 2319.695864][ T9233] page_fault+0x1e/0x30 [ 2319.700031][ T9233] RIP: 0033:0x4032a2 [ 2319.703937][ T9233] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 2319.723547][ T9233] RSP: 002b:00007fffbc959bc0 EFLAGS: 00010246 [ 2319.729628][ T9233] RAX: 0000000000000000 RBX: 00000000002360a2 RCX: 0000000000412a80 [ 2319.737613][ T9233] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fffbc95acf0 [ 2319.745596][ T9233] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001bb5940 [ 2319.753580][ T9233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffbc95acf0 [ 2319.761579][ T9233] R13: 00007fffbc95ace0 R14: 0000000000000000 R15: 00007fffbc95acf0 [ 2319.999120][ T9233] memory: usage 332kB, limit 0kB, failcnt 603868 [ 2320.006761][ T9233] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2320.021299][ T9233] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2320.033136][ T9233] Memory cgroup stats for /syz3: cache:100KB rss:68KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2320.062094][ T9233] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9233,uid=0 [ 2320.123029][ T9233] Memory cgroup out of memory: Killed process 9233 (syz-executor.3) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 2320.182392][ T1043] oom_reaper: reaped process 9233 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 18:53:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:25 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2322.290678][ T9289] IPVS: ftp: loaded support on port[0] = 21 18:53:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b", 0x57}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:53:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:53:27 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2323.744607][ T9289] chnl_net:caif_netlink_parms(): no params data found [ 2324.103742][ T9289] bridge0: port 1(bridge_slave_0) entered blocking state [ 2324.116706][ T9289] bridge0: port 1(bridge_slave_0) entered disabled state [ 2324.127851][ T9289] device bridge_slave_0 entered promiscuous mode [ 2324.147736][ T9289] bridge0: port 2(bridge_slave_1) entered blocking state [ 2324.156457][ T9289] bridge0: port 2(bridge_slave_1) entered disabled state [ 2324.172961][ T9289] device bridge_slave_1 entered promiscuous mode [ 2324.567749][ T9289] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2325.044351][ T9289] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2325.564895][ T9289] team0: Port device team_slave_0 added [ 2325.584279][ T9289] team0: Port device team_slave_1 added [ 2326.102252][ T9289] device hsr_slave_0 entered promiscuous mode [ 2326.139347][ T9289] device hsr_slave_1 entered promiscuous mode [ 2326.198990][ T984] device bridge_slave_1 left promiscuous mode [ 2326.205213][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2326.260054][ T984] device bridge_slave_0 left promiscuous mode [ 2326.266271][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2326.320813][ T984] device bridge_slave_1 left promiscuous mode [ 2326.327052][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2326.380082][ T984] device bridge_slave_0 left promiscuous mode [ 2326.386302][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2326.440839][ T984] device bridge_slave_1 left promiscuous mode [ 2326.447059][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2326.505375][ T984] device bridge_slave_0 left promiscuous mode [ 2326.514556][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2336.791953][ T984] device hsr_slave_1 left promiscuous mode [ 2336.844429][ T984] device hsr_slave_0 left promiscuous mode [ 2336.903854][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2336.927105][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2336.959039][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2337.030627][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2337.184774][ T984] bond0 (unregistering): Released all slaves [ 2337.312344][ T984] device hsr_slave_1 left promiscuous mode [ 2337.354458][ T984] device hsr_slave_0 left promiscuous mode [ 2337.404482][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2337.428030][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2337.455852][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2337.505412][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2337.665409][ T984] bond0 (unregistering): Released all slaves [ 2337.832390][ T984] device hsr_slave_1 left promiscuous mode [ 2337.874603][ T984] device hsr_slave_0 left promiscuous mode [ 2337.934211][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2337.958227][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2337.984937][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2338.055135][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2338.168681][ T984] bond0 (unregistering): Released all slaves [ 2338.341776][ T9289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2338.378477][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2338.394600][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2338.407507][ T9289] 8021q: adding VLAN 0 to HW filter on device team0 [ 2338.437886][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2338.454795][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2338.466455][ T9178] bridge0: port 1(bridge_slave_0) entered blocking state [ 2338.473583][ T9178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2338.490526][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2338.535128][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2338.544837][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2338.553675][ T641] bridge0: port 2(bridge_slave_1) entered blocking state [ 2338.560787][ T641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2338.569356][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2338.578753][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2338.587901][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2338.597008][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2338.605891][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2338.614995][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2338.623896][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2338.632703][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2338.641539][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2338.658014][ T9289] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2338.675589][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2338.685775][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2338.709587][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2338.742444][ T9289] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2339.035644][ T9316] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2339.046291][ T9316] CPU: 0 PID: 9316 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2339.054199][ T9316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2339.064261][ T9316] Call Trace: [ 2339.067580][ T9316] dump_stack+0x172/0x1f0 [ 2339.071941][ T9316] dump_header+0x10f/0xb6c [ 2339.076371][ T9316] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2339.082173][ T9316] ? ___ratelimit+0x60/0x595 [ 2339.086760][ T9316] ? do_raw_spin_unlock+0x57/0x270 [ 2339.091892][ T9316] oom_kill_process.cold+0x10/0x15 [ 2339.097006][ T9316] out_of_memory+0x79a/0x1280 [ 2339.101683][ T9316] ? __sched_text_start+0x8/0x8 [ 2339.106541][ T9316] ? oom_killer_disable+0x280/0x280 [ 2339.111762][ T9316] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2339.117322][ T9316] ? memcg_event_wake+0x230/0x230 [ 2339.122359][ T9316] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2339.128217][ T9316] ? cgroup_file_notify+0x140/0x1b0 [ 2339.133421][ T9316] memory_max_write+0x169/0x300 [ 2339.138268][ T9316] ? mem_cgroup_write+0x360/0x360 [ 2339.143295][ T9316] cgroup_file_write+0x245/0x7a0 [ 2339.148222][ T9316] ? mem_cgroup_write+0x360/0x360 [ 2339.153235][ T9316] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2339.158913][ T9316] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2339.164630][ T9316] kernfs_fop_write+0x2ba/0x480 [ 2339.169500][ T9316] __vfs_write+0x8d/0x110 [ 2339.173836][ T9316] ? kernfs_fop_open+0xd90/0xd90 [ 2339.178764][ T9316] vfs_write+0x20c/0x580 [ 2339.183000][ T9316] ksys_write+0x14f/0x2d0 [ 2339.187331][ T9316] ? __ia32_sys_read+0xb0/0xb0 [ 2339.192101][ T9316] ? do_syscall_64+0x26/0x610 [ 2339.196904][ T9316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2339.202983][ T9316] ? do_syscall_64+0x26/0x610 [ 2339.207666][ T9316] __x64_sys_write+0x73/0xb0 [ 2339.212271][ T9316] do_syscall_64+0x103/0x610 [ 2339.216867][ T9316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2339.222749][ T9316] RIP: 0033:0x458da9 [ 2339.226630][ T9316] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2339.246227][ T9316] RSP: 002b:00007f47793c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2339.254637][ T9316] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2339.262600][ T9316] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2339.270590][ T9316] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2339.278566][ T9316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f47793c86d4 [ 2339.286527][ T9316] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2339.305089][ T9316] memory: usage 6048kB, limit 0kB, failcnt 570 [ 2339.311655][ T9316] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2339.319523][ T9316] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2339.326597][ T9316] Memory cgroup stats for /syz4: cache:60KB rss:4164KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4220KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2339.349414][ T9316] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9315,uid=0 [ 2339.366749][ T9316] Memory cgroup out of memory: Killed process 9315 (syz-executor.4) total-vm:72584kB, anon-rss:4236kB, file-rss:35744kB, shmem-rss:0kB [ 2339.387935][ T1043] oom_reaper: reaped process 9315 (syz-executor.4), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB 18:53:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) [ 2339.773287][ T9289] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2339.783561][ T9289] CPU: 1 PID: 9289 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2339.791449][ T9289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2339.801493][ T9289] Call Trace: [ 2339.804796][ T9289] dump_stack+0x172/0x1f0 [ 2339.809128][ T9289] dump_header+0x10f/0xb6c [ 2339.813543][ T9289] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2339.819345][ T9289] ? ___ratelimit+0x60/0x595 [ 2339.823932][ T9289] ? do_raw_spin_unlock+0x57/0x270 [ 2339.829047][ T9289] oom_kill_process.cold+0x10/0x15 [ 2339.834163][ T9289] out_of_memory+0x79a/0x1280 [ 2339.838837][ T9289] ? lock_downgrade+0x880/0x880 [ 2339.843684][ T9289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2339.849920][ T9289] ? oom_killer_disable+0x280/0x280 [ 2339.855108][ T9289] ? find_held_lock+0x35/0x130 [ 2339.859886][ T9289] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2339.865424][ T9289] ? memcg_event_wake+0x230/0x230 [ 2339.870452][ T9289] ? do_raw_spin_unlock+0x57/0x270 [ 2339.875556][ T9289] ? _raw_spin_unlock+0x2d/0x50 [ 2339.880405][ T9289] try_charge+0x102c/0x15c0 [ 2339.884899][ T9289] ? find_held_lock+0x35/0x130 [ 2339.889752][ T9289] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2339.895296][ T9289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2339.901531][ T9289] ? kasan_check_read+0x11/0x20 [ 2339.906388][ T9289] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2339.911929][ T9289] mem_cgroup_try_charge+0x24d/0x5e0 [ 2339.917231][ T9289] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2339.922880][ T9289] wp_page_copy+0x408/0x1740 [ 2339.927463][ T9289] ? find_held_lock+0x35/0x130 [ 2339.932229][ T9289] ? pmd_pfn+0x1d0/0x1d0 [ 2339.936464][ T9289] ? lock_downgrade+0x880/0x880 [ 2339.941311][ T9289] ? swp_swapcount+0x540/0x540 [ 2339.946071][ T9289] ? kasan_check_read+0x11/0x20 [ 2339.950914][ T9289] ? do_raw_spin_unlock+0x57/0x270 [ 2339.956023][ T9289] do_wp_page+0x48e/0x1500 [ 2339.960443][ T9289] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2339.965820][ T9289] __handle_mm_fault+0x22e8/0x3ec0 [ 2339.970934][ T9289] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2339.976477][ T9289] ? find_held_lock+0x35/0x130 [ 2339.981236][ T9289] ? handle_mm_fault+0x322/0xb30 [ 2339.986179][ T9289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2339.992420][ T9289] ? kasan_check_read+0x11/0x20 [ 2339.997272][ T9289] handle_mm_fault+0x43f/0xb30 [ 2340.002123][ T9289] __do_page_fault+0x5ef/0xda0 [ 2340.006900][ T9289] do_page_fault+0x71/0x581 [ 2340.011396][ T9289] ? page_fault+0x8/0x30 [ 2340.015634][ T9289] page_fault+0x1e/0x30 [ 2340.019781][ T9289] RIP: 0033:0x42ff36 [ 2340.023670][ T9289] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2340.043265][ T9289] RSP: 002b:00007ffc879a41c0 EFLAGS: 00010206 [ 2340.049328][ T9289] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2340.057290][ T9289] RDX: 0000000001336930 RSI: 000000000133e970 RDI: 0000000000000003 [ 2340.065256][ T9289] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001335940 [ 2340.073219][ T9289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2340.081183][ T9289] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 2340.093977][ T9289] memory: usage 1632kB, limit 0kB, failcnt 578 [ 2340.100230][ T9289] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2340.107685][ T9289] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2340.114798][ T9289] Memory cgroup stats for /syz4: cache:60KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2340.136253][ T9289] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9289,uid=0 [ 2340.153820][ T9289] Memory cgroup out of memory: Killed process 9289 (syz-executor.4) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2340.168366][ T1043] oom_reaper: reaped process 9289 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2344.730462][ T984] device bridge_slave_1 left promiscuous mode [ 2344.736712][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2344.800013][ T984] device bridge_slave_0 left promiscuous mode [ 2344.806225][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2344.860821][ T984] device bridge_slave_1 left promiscuous mode [ 2344.867023][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2344.921701][ T984] device bridge_slave_0 left promiscuous mode [ 2344.927901][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2351.511992][ T984] device hsr_slave_1 left promiscuous mode [ 2351.555493][ T984] device hsr_slave_0 left promiscuous mode [ 2351.613717][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2351.634674][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2351.655337][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2351.715995][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2351.856368][ T984] bond0 (unregistering): Released all slaves [ 2352.012124][ T984] device hsr_slave_1 left promiscuous mode [ 2352.054425][ T984] device hsr_slave_0 left promiscuous mode [ 2352.113691][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2352.136315][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2352.156961][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2352.220978][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2352.358652][ T984] bond0 (unregistering): Released all slaves 18:54:24 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b", 0x57}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:54:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:54:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:25 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2381.491887][ T9358] IPVS: ftp: loaded support on port[0] = 21 [ 2381.994260][ T9371] IPVS: ftp: loaded support on port[0] = 21 [ 2382.003270][ T9369] IPVS: ftp: loaded support on port[0] = 21 [ 2382.080641][ T9358] chnl_net:caif_netlink_parms(): no params data found [ 2382.135404][ T9358] bridge0: port 1(bridge_slave_0) entered blocking state [ 2382.143132][ T9358] bridge0: port 1(bridge_slave_0) entered disabled state [ 2382.151063][ T9358] device bridge_slave_0 entered promiscuous mode [ 2382.217811][ T9358] bridge0: port 2(bridge_slave_1) entered blocking state [ 2382.225078][ T9358] bridge0: port 2(bridge_slave_1) entered disabled state [ 2382.232813][ T9358] device bridge_slave_1 entered promiscuous mode [ 2382.258882][ T9358] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2382.275693][ T9358] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2382.288784][ T2602] device bridge_slave_1 left promiscuous mode [ 2382.295931][ T2602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2382.320321][ T2602] device bridge_slave_0 left promiscuous mode [ 2382.326498][ T2602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2383.911910][ T2602] device hsr_slave_1 left promiscuous mode [ 2383.954282][ T2602] device hsr_slave_0 left promiscuous mode [ 2384.013738][ T2602] team0 (unregistering): Port device team_slave_1 removed [ 2384.024450][ T2602] team0 (unregistering): Port device team_slave_0 removed [ 2384.036718][ T2602] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2384.063782][ T2602] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2384.150736][ T2602] bond0 (unregistering): Released all slaves [ 2384.274011][ T9358] team0: Port device team_slave_0 added [ 2384.289231][ T9358] team0: Port device team_slave_1 added [ 2384.344332][ T9369] chnl_net:caif_netlink_parms(): no params data found [ 2384.400680][ T9358] device hsr_slave_0 entered promiscuous mode [ 2384.439376][ T9358] device hsr_slave_1 entered promiscuous mode [ 2384.505066][ T9371] chnl_net:caif_netlink_parms(): no params data found [ 2384.542754][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 2384.550155][ T9369] bridge0: port 1(bridge_slave_0) entered disabled state [ 2384.557680][ T9369] device bridge_slave_0 entered promiscuous mode [ 2384.571136][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 2384.571161][ T9369] bridge0: port 2(bridge_slave_1) entered disabled state [ 2384.586072][ T9369] device bridge_slave_1 entered promiscuous mode [ 2384.627075][ T9369] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2384.637160][ T9369] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2384.650057][ T9371] bridge0: port 1(bridge_slave_0) entered blocking state [ 2384.657169][ T9371] bridge0: port 1(bridge_slave_0) entered disabled state [ 2384.665343][ T9371] device bridge_slave_0 entered promiscuous mode [ 2384.683235][ T9369] team0: Port device team_slave_0 added [ 2384.690223][ T9369] team0: Port device team_slave_1 added [ 2384.695957][ T9371] bridge0: port 2(bridge_slave_1) entered blocking state [ 2384.703506][ T9371] bridge0: port 2(bridge_slave_1) entered disabled state [ 2384.711314][ T9371] device bridge_slave_1 entered promiscuous mode [ 2384.729025][ T9371] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2384.739336][ T9371] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2384.760413][ T9371] team0: Port device team_slave_0 added [ 2384.831856][ T9369] device hsr_slave_0 entered promiscuous mode [ 2384.869487][ T9369] device hsr_slave_1 entered promiscuous mode [ 2384.910164][ T9371] team0: Port device team_slave_1 added [ 2384.992660][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 2384.999887][ T9369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2385.007209][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.014299][ T9369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2385.061811][ T9371] device hsr_slave_0 entered promiscuous mode [ 2385.099452][ T9371] device hsr_slave_1 entered promiscuous mode [ 2385.147435][ T9371] bridge0: port 2(bridge_slave_1) entered blocking state [ 2385.154572][ T9371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2385.161951][ T9371] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.169049][ T9371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2385.187198][ T9358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2385.238769][ T9178] bridge0: port 1(bridge_slave_0) entered disabled state [ 2385.254463][ T9178] bridge0: port 2(bridge_slave_1) entered disabled state [ 2385.265360][ T9178] bridge0: port 1(bridge_slave_0) entered disabled state [ 2385.278236][ T9178] bridge0: port 2(bridge_slave_1) entered disabled state [ 2385.296519][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2385.306990][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2385.323717][ T9358] 8021q: adding VLAN 0 to HW filter on device team0 [ 2385.374501][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2385.386115][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2385.401254][T31532] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.408319][T31532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2385.445496][ T9371] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2385.464543][ T9369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2385.484619][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2385.495188][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2385.513543][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2385.524737][ T9178] bridge0: port 2(bridge_slave_1) entered blocking state [ 2385.531866][ T9178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2385.546164][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2385.555006][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2385.571945][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2385.586311][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2385.617487][ T9369] 8021q: adding VLAN 0 to HW filter on device team0 [ 2385.633407][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2385.645883][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2385.657277][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2385.671886][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2385.684743][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2385.694674][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2385.703301][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2385.711851][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2385.720091][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2385.732042][ T9371] 8021q: adding VLAN 0 to HW filter on device team0 [ 2385.741933][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2385.749747][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2385.757298][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2385.766051][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2385.774517][ T8625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.781600][ T8625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2385.790042][ T9358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2385.810150][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2385.823484][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2385.832889][ T8625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.840007][ T8625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2385.854338][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2385.862950][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2385.874249][ T8625] bridge0: port 2(bridge_slave_1) entered blocking state [ 2385.881349][ T8625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2385.888865][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2385.897698][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2385.906215][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2385.914703][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2385.923263][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2385.938825][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2385.947583][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2385.958286][ T641] bridge0: port 2(bridge_slave_1) entered blocking state [ 2385.965408][ T641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2385.982000][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2386.006624][ T9358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2386.029601][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2386.038572][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2386.067036][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2386.090178][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2386.098470][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2386.107980][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2386.117169][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2386.125739][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2386.134363][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2386.142647][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2386.151021][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2386.162775][ T9371] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2386.174146][ T9371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2386.187696][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2386.195767][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2386.204556][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2386.223496][ T9369] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2386.251031][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2386.280202][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2386.288657][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2386.302475][ T9371] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2386.321080][ T9369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2386.569664][ T9389] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2386.586548][ T9389] CPU: 0 PID: 9389 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2386.594497][ T9389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2386.604575][ T9389] Call Trace: [ 2386.607920][ T9389] dump_stack+0x172/0x1f0 [ 2386.612299][ T9389] dump_header+0x10f/0xb6c [ 2386.616746][ T9389] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2386.622591][ T9389] ? ___ratelimit+0x60/0x595 [ 2386.627216][ T9389] ? do_raw_spin_unlock+0x57/0x270 [ 2386.632374][ T9389] oom_kill_process.cold+0x10/0x15 [ 2386.637527][ T9389] out_of_memory+0x79a/0x1280 [ 2386.645563][ T9389] ? __sched_text_start+0x8/0x8 [ 2386.650792][ T9389] ? oom_killer_disable+0x280/0x280 [ 2386.656039][ T9389] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2386.661606][ T9389] ? memcg_event_wake+0x230/0x230 [ 2386.666673][ T9389] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2386.672511][ T9389] ? cgroup_file_notify+0x140/0x1b0 [ 2386.677753][ T9389] memory_max_write+0x169/0x300 [ 2386.682636][ T9389] ? kernfs_fop_write+0x204/0x480 [ 2386.687694][ T9389] ? mem_cgroup_write+0x360/0x360 [ 2386.692834][ T9389] ? lock_acquire+0x16f/0x3f0 [ 2386.697546][ T9389] ? kernfs_fop_write+0x227/0x480 [ 2386.702612][ T9389] cgroup_file_write+0x245/0x7a0 [ 2386.707587][ T9389] ? mem_cgroup_write+0x360/0x360 [ 2386.712650][ T9389] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2386.718333][ T9389] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2386.723994][ T9389] kernfs_fop_write+0x2ba/0x480 [ 2386.728898][ T9389] __vfs_write+0x8d/0x110 [ 2386.733422][ T9389] ? kernfs_fop_open+0xd90/0xd90 [ 2386.738401][ T9389] vfs_write+0x20c/0x580 [ 2386.742686][ T9389] ksys_write+0x14f/0x2d0 [ 2386.747724][ T9389] ? __ia32_sys_read+0xb0/0xb0 [ 2386.752506][ T9389] ? do_syscall_64+0x26/0x610 [ 2386.757175][ T9389] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2386.763256][ T9389] ? do_syscall_64+0x26/0x610 18:54:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='rdma.max\x00', 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9b, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x200) bpf$MAP_CREATE(0xa, 0x0, 0x0) write$cgroup_int(r1, 0x0, 0x0) [ 2386.767985][ T9389] __x64_sys_write+0x73/0xb0 [ 2386.772615][ T9389] do_syscall_64+0x103/0x610 [ 2386.777239][ T9389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2386.783159][ T9389] RIP: 0033:0x458da9 [ 2386.787071][ T9389] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2386.806797][ T9389] RSP: 002b:00007f64097f1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2386.815231][ T9389] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2386.823220][ T9389] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2386.831202][ T9389] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2386.839183][ T9389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64097f26d4 [ 2386.847159][ T9389] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2386.875613][ T9389] memory: usage 4700kB, limit 0kB, failcnt 603869 [ 2386.887349][ T9389] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2386.895367][ T9389] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2386.906070][ T9389] Memory cgroup stats for /syz3: cache:100KB rss:4152KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2386.927728][ T9389] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9388,uid=0 [ 2386.944624][ T9389] Memory cgroup out of memory: Killed process 9388 (syz-executor.3) total-vm:72452kB, anon-rss:4180kB, file-rss:34816kB, shmem-rss:0kB [ 2386.966171][ T1043] oom_reaper: reaped process 9388 (syz-executor.3), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB [ 2386.970283][ T9387] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2386.988296][ T9387] CPU: 1 PID: 9387 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2386.996198][ T9387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2387.006254][ T9387] Call Trace: [ 2387.009561][ T9387] dump_stack+0x172/0x1f0 [ 2387.013896][ T9387] dump_header+0x10f/0xb6c [ 2387.018317][ T9387] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2387.024124][ T9387] ? ___ratelimit+0x60/0x595 [ 2387.028716][ T9387] ? do_raw_spin_unlock+0x57/0x270 [ 2387.033845][ T9387] oom_kill_process.cold+0x10/0x15 [ 2387.038962][ T9387] out_of_memory+0x79a/0x1280 [ 2387.043735][ T9387] ? retint_kernel+0x2d/0x2d [ 2387.048348][ T9387] ? oom_killer_disable+0x280/0x280 [ 2387.053560][ T9387] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2387.059105][ T9387] ? memcg_event_wake+0x230/0x230 [ 2387.064134][ T9387] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2387.069940][ T9387] ? cgroup_file_notify+0x140/0x1b0 [ 2387.075149][ T9387] memory_max_write+0x169/0x300 [ 2387.079999][ T9387] ? retint_kernel+0x2d/0x2d [ 2387.084594][ T9387] ? mem_cgroup_write+0x360/0x360 [ 2387.089619][ T9387] ? lock_acquire+0x16f/0x3f0 [ 2387.094294][ T9387] ? kernfs_fop_write+0x227/0x480 [ 2387.099317][ T9387] ? check_memory_region+0x30/0x190 [ 2387.104522][ T9387] cgroup_file_write+0x245/0x7a0 [ 2387.109461][ T9387] ? mem_cgroup_write+0x360/0x360 [ 2387.114483][ T9387] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2387.120127][ T9387] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2387.125758][ T9387] kernfs_fop_write+0x2ba/0x480 [ 2387.130621][ T9387] __vfs_write+0x8d/0x110 [ 2387.134948][ T9387] ? kernfs_fop_open+0xd90/0xd90 [ 2387.139902][ T9387] vfs_write+0x20c/0x580 [ 2387.144152][ T9387] ksys_write+0x14f/0x2d0 [ 2387.148489][ T9387] ? __ia32_sys_read+0xb0/0xb0 [ 2387.153258][ T9387] ? do_syscall_64+0x26/0x610 [ 2387.157935][ T9387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2387.164090][ T9387] ? do_syscall_64+0x26/0x610 [ 2387.168787][ T9387] __x64_sys_write+0x73/0xb0 [ 2387.173395][ T9387] do_syscall_64+0x103/0x610 [ 2387.177989][ T9387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2387.183865][ T9387] RIP: 0033:0x458da9 [ 2387.187857][ T9387] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2387.207438][ T9387] RSP: 002b:00007f7262a1cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2387.215833][ T9387] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2387.223786][ T9387] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2387.231734][ T9387] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2387.239700][ T9387] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7262a1d6d4 [ 2387.247653][ T9387] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2387.280618][ T9387] memory: usage 6004kB, limit 0kB, failcnt 579 [ 2387.286835][ T9387] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2387.294970][ T9387] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2387.303242][ T9387] Memory cgroup stats for /syz4: cache:60KB rss:4200KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4212KB inactive_file:0KB active_file:0KB unevictable:0KB 18:54:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe240", 0x5a}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:54:31 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:31 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:31 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)) [ 2387.324699][ T9387] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9386,uid=0 [ 2387.364240][ T9387] Memory cgroup out of memory: Killed process 9386 (syz-executor.4) total-vm:72452kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 2387.392257][ T1043] oom_reaper: reaped process 9386 (syz-executor.4), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 2387.395929][ T9371] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2387.428203][ T9371] CPU: 1 PID: 9371 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2387.436144][ T9371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2387.446208][ T9371] Call Trace: [ 2387.449519][ T9371] dump_stack+0x172/0x1f0 [ 2387.453867][ T9371] dump_header+0x10f/0xb6c [ 2387.458295][ T9371] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2387.464118][ T9371] ? ___ratelimit+0x60/0x595 [ 2387.468728][ T9371] ? do_raw_spin_unlock+0x57/0x270 [ 2387.473868][ T9371] oom_kill_process.cold+0x10/0x15 [ 2387.478995][ T9371] out_of_memory+0x79a/0x1280 [ 2387.483691][ T9371] ? oom_killer_disable+0x280/0x280 [ 2387.488905][ T9371] ? find_held_lock+0x35/0x130 [ 2387.493694][ T9371] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2387.499263][ T9371] ? memcg_event_wake+0x230/0x230 [ 2387.504313][ T9371] ? do_raw_spin_unlock+0x57/0x270 [ 2387.509443][ T9371] ? _raw_spin_unlock+0x2d/0x50 [ 2387.514332][ T9371] try_charge+0x102c/0x15c0 [ 2387.518851][ T9371] ? find_held_lock+0x35/0x130 [ 2387.523638][ T9371] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2387.529202][ T9371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2387.535468][ T9371] ? kasan_check_read+0x11/0x20 [ 2387.540347][ T9371] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2387.545915][ T9371] mem_cgroup_try_charge+0x24d/0x5e0 [ 2387.551229][ T9371] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2387.556886][ T9371] wp_page_copy+0x408/0x1740 [ 2387.561495][ T9371] ? find_held_lock+0x35/0x130 [ 2387.566283][ T9371] ? pmd_pfn+0x1d0/0x1d0 [ 2387.570549][ T9371] ? lock_downgrade+0x880/0x880 [ 2387.575414][ T9371] ? swp_swapcount+0x540/0x540 [ 2387.581098][ T9371] ? kasan_check_read+0x11/0x20 [ 2387.586315][ T9371] ? do_raw_spin_unlock+0x57/0x270 [ 2387.591455][ T9371] do_wp_page+0x48e/0x1500 [ 2387.595896][ T9371] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2387.601296][ T9371] __handle_mm_fault+0x22e8/0x3ec0 [ 2387.606437][ T9371] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2387.611999][ T9371] ? find_held_lock+0x35/0x130 [ 2387.616782][ T9371] ? handle_mm_fault+0x322/0xb30 [ 2387.621751][ T9371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2387.628011][ T9371] ? kasan_check_read+0x11/0x20 [ 2387.632884][ T9371] handle_mm_fault+0x43f/0xb30 [ 2387.640536][ T9371] __do_page_fault+0x5ef/0xda0 [ 2387.645322][ T9371] do_page_fault+0x71/0x581 [ 2387.649849][ T9371] ? page_fault+0x8/0x30 [ 2387.654106][ T9371] page_fault+0x1e/0x30 [ 2387.658270][ T9371] RIP: 0033:0x42ff36 [ 2387.662171][ T9371] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2387.681789][ T9371] RSP: 002b:00007ffdc06ed260 EFLAGS: 00010206 [ 2387.687877][ T9371] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2387.695975][ T9371] RDX: 000000000151f930 RSI: 0000000001527970 RDI: 0000000000000003 [ 2387.703957][ T9371] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000151e940 [ 2387.711942][ T9371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2387.719935][ T9371] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 18:54:32 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) 18:54:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x200327da) [ 2387.752441][ T9371] memory: usage 324kB, limit 0kB, failcnt 603877 [ 2387.758829][ T9371] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2387.767026][ T9371] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2387.774220][ T9371] Memory cgroup stats for /syz3: cache:100KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB 18:54:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2387.812957][ T9371] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9371,uid=0 18:54:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$MAP_CREATE(0xa, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) [ 2387.862227][ T9371] Memory cgroup out of memory: Killed process 9371 (syz-executor.3) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 2387.928722][ T9369] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2387.947661][ T9369] CPU: 1 PID: 9369 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2387.955606][ T9369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2387.965686][ T9369] Call Trace: [ 2387.969000][ T9369] dump_stack+0x172/0x1f0 [ 2387.973350][ T9369] dump_header+0x10f/0xb6c [ 2387.977787][ T9369] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2387.983604][ T9369] ? ___ratelimit+0x60/0x595 [ 2387.988206][ T9369] ? do_raw_spin_unlock+0x57/0x270 [ 2387.993333][ T9369] oom_kill_process.cold+0x10/0x15 [ 2387.998494][ T9369] out_of_memory+0x79a/0x1280 [ 2388.003201][ T9369] ? oom_killer_disable+0x280/0x280 [ 2388.008405][ T9369] ? find_held_lock+0x35/0x130 [ 2388.013185][ T9369] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2388.018736][ T9369] ? memcg_event_wake+0x230/0x230 [ 2388.023792][ T9369] ? do_raw_spin_unlock+0x57/0x270 [ 2388.028917][ T9369] ? _raw_spin_unlock+0x2d/0x50 [ 2388.033795][ T9369] try_charge+0x102c/0x15c0 [ 2388.038316][ T9369] ? find_held_lock+0x35/0x130 [ 2388.043104][ T9369] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2388.048676][ T9369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2388.054944][ T9369] ? kasan_check_read+0x11/0x20 [ 2388.059828][ T9369] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2388.065389][ T9369] mem_cgroup_try_charge+0x24d/0x5e0 [ 2388.070697][ T9369] mem_cgroup_try_charge_delay+0x1f/0xa0 18:54:32 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2388.076346][ T9369] wp_page_copy+0x408/0x1740 [ 2388.080949][ T9369] ? find_held_lock+0x35/0x130 [ 2388.085734][ T9369] ? pmd_pfn+0x1d0/0x1d0 [ 2388.090009][ T9369] ? lock_downgrade+0x880/0x880 [ 2388.094869][ T9369] ? swp_swapcount+0x540/0x540 [ 2388.099650][ T9369] ? kasan_check_read+0x11/0x20 [ 2388.104512][ T9369] ? do_raw_spin_unlock+0x57/0x270 [ 2388.109634][ T9369] do_wp_page+0x48e/0x1500 [ 2388.114076][ T9369] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2388.119464][ T9369] __handle_mm_fault+0x22e8/0x3ec0 [ 2388.124599][ T9369] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2388.130146][ T9369] ? find_held_lock+0x35/0x130 [ 2388.134901][ T9369] ? handle_mm_fault+0x322/0xb30 [ 2388.134929][ T9369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2388.146088][ T9369] ? kasan_check_read+0x11/0x20 [ 2388.150956][ T9369] handle_mm_fault+0x43f/0xb30 [ 2388.155738][ T9369] __do_page_fault+0x5ef/0xda0 [ 2388.160519][ T9369] do_page_fault+0x71/0x581 [ 2388.165008][ T9369] ? page_fault+0x8/0x30 [ 2388.169242][ T9369] page_fault+0x1e/0x30 [ 2388.173385][ T9369] RIP: 0033:0x4032a2 [ 2388.177274][ T9369] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 2388.196888][ T9369] RSP: 002b:00007ffe4375bd30 EFLAGS: 00010246 [ 2388.202966][ T9369] RAX: 0000000000000000 RBX: 0000000000246d2b RCX: 0000000000412a80 [ 2388.210951][ T9369] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe4375ce60 [ 2388.218940][ T9369] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001afa940 18:54:32 executing program 0: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 2388.226925][ T9369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe4375ce60 [ 2388.234909][ T9369] R13: 00007ffe4375ce50 R14: 0000000000000000 R15: 00007ffe4375ce60 18:54:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x2402}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000400)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) 18:54:32 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r1) [ 2388.769828][ T9369] memory: usage 1608kB, limit 0kB, failcnt 591 [ 2388.776098][ T9369] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2388.786847][ T9369] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2388.799445][ T9369] Memory cgroup stats for /syz4: cache:60KB rss:36KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2388.825169][ T9369] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9369,uid=0 [ 2388.846051][ T9369] Memory cgroup out of memory: Killed process 9369 (syz-executor.4) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 2388.861576][ T1043] oom_reaper: reaped process 9369 (syz-executor.4), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB 18:54:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe240", 0x5a}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:54:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000f008081e9f2dd1f84bf26e464132b8a17dbfeaf4ac41c41278795a222620708f622225d30b95e3e27322d42affd4123fbc40d2cfa829aa36e1d9"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)=0x4, 0x4) 18:54:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:33 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) 18:54:33 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000440), 0x12) 18:54:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe240", 0x5a}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:54:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:33 executing program 2: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 18:54:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) 18:54:34 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) 18:54:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x200) bpf$MAP_CREATE(0xa, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 18:54:34 executing program 2: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 18:54:34 executing program 2: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 18:54:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:34 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:34 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2391.292533][ T9508] IPVS: ftp: loaded support on port[0] = 21 [ 2391.398370][ T9508] chnl_net:caif_netlink_parms(): no params data found [ 2391.478266][ T9508] bridge0: port 1(bridge_slave_0) entered blocking state [ 2391.485515][ T9508] bridge0: port 1(bridge_slave_0) entered disabled state [ 2391.493777][ T9508] device bridge_slave_0 entered promiscuous mode [ 2391.558339][ T9508] bridge0: port 2(bridge_slave_1) entered blocking state [ 2391.565586][ T9508] bridge0: port 2(bridge_slave_1) entered disabled state [ 2391.574396][ T9508] device bridge_slave_1 entered promiscuous mode [ 2391.590721][ T9508] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2391.600936][ T9508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2391.617359][ T984] device bridge_slave_1 left promiscuous mode [ 2391.625984][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2391.670238][ T984] device bridge_slave_0 left promiscuous mode [ 2391.676390][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2393.361967][ T984] device hsr_slave_1 left promiscuous mode [ 2393.404432][ T984] device hsr_slave_0 left promiscuous mode [ 2393.463892][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2393.475389][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2393.486550][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2393.533172][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2393.612135][ T984] bond0 (unregistering): Released all slaves [ 2393.704089][ T9508] team0: Port device team_slave_0 added [ 2393.711639][ T9508] team0: Port device team_slave_1 added [ 2393.726379][ T9511] IPVS: ftp: loaded support on port[0] = 21 [ 2393.791659][ T9508] device hsr_slave_0 entered promiscuous mode [ 2393.859284][ T9508] device hsr_slave_1 entered promiscuous mode [ 2394.036744][ T9511] chnl_net:caif_netlink_parms(): no params data found [ 2394.067608][ T9511] bridge0: port 1(bridge_slave_0) entered blocking state [ 2394.075975][ T9511] bridge0: port 1(bridge_slave_0) entered disabled state [ 2394.084662][ T9511] device bridge_slave_0 entered promiscuous mode [ 2394.095581][ T9508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2394.105944][ T9511] bridge0: port 2(bridge_slave_1) entered blocking state [ 2394.113123][ T9511] bridge0: port 2(bridge_slave_1) entered disabled state [ 2394.121154][ T9511] device bridge_slave_1 entered promiscuous mode [ 2394.175338][ T9508] 8021q: adding VLAN 0 to HW filter on device team0 [ 2394.187814][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2394.196174][T31532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2394.230379][ T9511] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2394.239673][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2394.248261][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2394.257961][ T7182] bridge0: port 1(bridge_slave_0) entered blocking state [ 2394.265083][ T7182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2394.273112][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2394.281947][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2394.290374][ T7182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2394.297431][ T7182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2394.305129][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2394.315805][ T9511] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2394.332482][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2394.345532][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2394.362567][ T9511] team0: Port device team_slave_0 added [ 2394.377429][ T9511] team0: Port device team_slave_1 added [ 2394.388549][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2394.397287][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2394.471582][ T9511] device hsr_slave_0 entered promiscuous mode [ 2394.515687][ T9511] device hsr_slave_1 entered promiscuous mode [ 2394.590359][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2394.598308][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2394.606993][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2394.621212][ T9508] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2394.632463][ T9508] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2394.650553][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2394.658793][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2394.667845][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2394.676560][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2394.685527][ T641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2394.708514][ T9508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2394.761565][ T9511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2394.788173][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2394.796480][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2394.814822][ T9511] 8021q: adding VLAN 0 to HW filter on device team0 [ 2394.843171][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2394.865494][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2394.878181][ T8625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2394.885345][ T8625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2394.904373][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2394.912650][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2394.921652][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2394.930591][ T8624] bridge0: port 2(bridge_slave_1) entered blocking state [ 2394.937680][ T8624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2394.950935][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2394.983864][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2395.009260][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2395.018714][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2395.037922][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2395.047707][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2395.059956][ T9519] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2395.064775][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2395.087084][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2395.089076][ T9519] CPU: 1 PID: 9519 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2395.101222][ T9511] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2395.102741][ T9519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2395.122357][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2395.123081][ T9519] Call Trace: [ 2395.123108][ T9519] dump_stack+0x172/0x1f0 [ 2395.123129][ T9519] dump_header+0x10f/0xb6c [ 2395.142235][ T9519] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2395.148061][ T9519] ? ___ratelimit+0x60/0x595 [ 2395.152668][ T9519] ? do_raw_spin_unlock+0x57/0x270 [ 2395.156899][ T9511] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2395.157789][ T9519] oom_kill_process.cold+0x10/0x15 [ 2395.157808][ T9519] out_of_memory+0x79a/0x1280 [ 2395.169654][ T9519] ? __sched_text_start+0x8/0x8 [ 2395.169672][ T9519] ? oom_killer_disable+0x280/0x280 [ 2395.169700][ T9519] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2395.169713][ T9519] ? memcg_event_wake+0x230/0x230 [ 2395.169737][ T9519] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2395.169754][ T9519] ? cgroup_file_notify+0x140/0x1b0 [ 2395.169774][ T9519] memory_max_write+0x169/0x300 [ 2395.169786][ T9519] ? kernfs_fop_write+0x204/0x480 [ 2395.169805][ T9519] ? mem_cgroup_write+0x360/0x360 [ 2395.222859][ T9519] ? lock_acquire+0x16f/0x3f0 [ 2395.227543][ T9519] ? kernfs_fop_write+0x227/0x480 [ 2395.232583][ T9519] cgroup_file_write+0x245/0x7a0 [ 2395.237532][ T9519] ? mem_cgroup_write+0x360/0x360 [ 2395.242568][ T9519] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2395.248225][ T9519] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2395.253866][ T9519] kernfs_fop_write+0x2ba/0x480 [ 2395.258731][ T9519] __vfs_write+0x8d/0x110 [ 2395.263057][ T9519] ? kernfs_fop_open+0xd90/0xd90 [ 2395.267995][ T9519] vfs_write+0x20c/0x580 [ 2395.272252][ T9519] ksys_write+0x14f/0x2d0 [ 2395.276599][ T9519] ? __ia32_sys_read+0xb0/0xb0 [ 2395.281370][ T9519] ? do_syscall_64+0x26/0x610 [ 2395.286136][ T9519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2395.292212][ T9519] ? do_syscall_64+0x26/0x610 [ 2395.296897][ T9519] __x64_sys_write+0x73/0xb0 [ 2395.301498][ T9519] do_syscall_64+0x103/0x610 [ 2395.306102][ T9519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2395.311997][ T9519] RIP: 0033:0x458da9 [ 2395.315896][ T9519] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2395.335506][ T9519] RSP: 002b:00007f0fc4b0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2395.343929][ T9519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2395.351912][ T9519] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2395.359889][ T9519] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2395.367867][ T9519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fc4b0e6d4 [ 2395.375843][ T9519] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2395.386756][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2395.403249][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2395.405931][ T9519] memory: usage 4744kB, limit 0kB, failcnt 603878 [ 2395.418015][ T9519] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2395.427972][ T9519] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2395.436473][ T9519] Memory cgroup stats for /syz3: cache:100KB rss:4196KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4220KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2395.459605][ T9519] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9518,uid=0 [ 2395.463833][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2395.476175][ T9519] Memory cgroup out of memory: Killed process 9518 (syz-executor.3) total-vm:72584kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 2395.502630][ T1043] oom_reaper: reaped process 9518 (syz-executor.3), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2395.608929][ T9527] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2395.629687][ T9527] CPU: 0 PID: 9527 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2395.637610][ T9527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2395.647697][ T9527] Call Trace: [ 2395.651188][ T9527] dump_stack+0x172/0x1f0 [ 2395.655539][ T9527] dump_header+0x10f/0xb6c [ 2395.659968][ T9527] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2395.665795][ T9527] ? ___ratelimit+0x60/0x595 [ 2395.670395][ T9527] ? do_raw_spin_unlock+0x57/0x270 [ 2395.675532][ T9527] oom_kill_process.cold+0x10/0x15 [ 2395.680664][ T9527] out_of_memory+0x79a/0x1280 [ 2395.685358][ T9527] ? __sched_text_start+0x8/0x8 [ 2395.690312][ T9527] ? oom_killer_disable+0x280/0x280 [ 2395.695544][ T9527] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2395.701101][ T9527] ? memcg_event_wake+0x230/0x230 [ 2395.706154][ T9527] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2395.711970][ T9527] ? cgroup_file_notify+0x140/0x1b0 [ 2395.717189][ T9527] memory_max_write+0x169/0x300 [ 2395.722066][ T9527] ? mem_cgroup_write+0x360/0x360 [ 2395.727104][ T9527] ? mem_cgroup_write+0x360/0x360 [ 2395.732155][ T9527] cgroup_file_write+0x245/0x7a0 [ 2395.737108][ T9527] ? mem_cgroup_write+0x360/0x360 [ 2395.742141][ T9527] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2395.747800][ T9527] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2395.753451][ T9527] kernfs_fop_write+0x2ba/0x480 [ 2395.758334][ T9527] __vfs_write+0x8d/0x110 [ 2395.762678][ T9527] ? kernfs_fop_open+0xd90/0xd90 [ 2395.767633][ T9527] vfs_write+0x20c/0x580 [ 2395.771906][ T9527] ksys_write+0x14f/0x2d0 [ 2395.776263][ T9527] ? __ia32_sys_read+0xb0/0xb0 [ 2395.781040][ T9527] ? do_syscall_64+0x26/0x610 [ 2395.785820][ T9527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2395.791900][ T9527] ? do_syscall_64+0x26/0x610 [ 2395.796604][ T9527] __x64_sys_write+0x73/0xb0 [ 2395.801217][ T9527] do_syscall_64+0x103/0x610 [ 2395.805834][ T9527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2395.811729][ T9527] RIP: 0033:0x458da9 [ 2395.815628][ T9527] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2395.835241][ T9527] RSP: 002b:00007f0eab916c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2395.843676][ T9527] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 2395.851635][ T9527] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 2395.859596][ T9527] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2395.867550][ T9527] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0eab9176d4 [ 2395.875515][ T9527] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff 18:54:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409a", 0x5b}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:54:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:54:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:40 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2395.918436][ T9527] memory: usage 5976kB, limit 0kB, failcnt 592 [ 2395.927777][ T9527] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2395.936082][ T9527] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2395.947889][ T9527] Memory cgroup stats for /syz4: cache:60KB rss:4196KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2396.016586][ T9527] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9525,uid=0 [ 2396.088292][ T9527] Memory cgroup out of memory: Killed process 9525 (syz-executor.4) total-vm:72452kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 2396.121736][ T1043] oom_reaper: reaped process 9525 (syz-executor.4), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 2396.140249][ T9508] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2396.164583][ T9508] CPU: 0 PID: 9508 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #37 [ 2396.172512][ T9508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2396.182570][ T9508] Call Trace: [ 2396.185879][ T9508] dump_stack+0x172/0x1f0 [ 2396.190225][ T9508] dump_header+0x10f/0xb6c [ 2396.194666][ T9508] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2396.200480][ T9508] ? ___ratelimit+0x60/0x595 [ 2396.205080][ T9508] ? do_raw_spin_unlock+0x57/0x270 [ 2396.210209][ T9508] oom_kill_process.cold+0x10/0x15 [ 2396.215426][ T9508] out_of_memory+0x79a/0x1280 [ 2396.220111][ T9508] ? oom_killer_disable+0x280/0x280 [ 2396.225321][ T9508] ? find_held_lock+0x35/0x130 [ 2396.230101][ T9508] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2396.235667][ T9508] ? memcg_event_wake+0x230/0x230 [ 2396.240708][ T9508] ? do_raw_spin_unlock+0x57/0x270 [ 2396.245840][ T9508] ? _raw_spin_unlock+0x2d/0x50 [ 2396.250715][ T9508] try_charge+0x102c/0x15c0 [ 2396.255244][ T9508] ? find_held_lock+0x35/0x130 [ 2396.260033][ T9508] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2396.265597][ T9508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2396.272037][ T9508] ? kasan_check_read+0x11/0x20 [ 2396.276913][ T9508] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2396.282568][ T9508] mem_cgroup_try_charge+0x24d/0x5e0 [ 2396.287876][ T9508] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2396.293529][ T9508] wp_page_copy+0x408/0x1740 [ 2396.298130][ T9508] ? find_held_lock+0x35/0x130 [ 2396.302911][ T9508] ? pmd_pfn+0x1d0/0x1d0 [ 2396.307162][ T9508] ? lock_downgrade+0x880/0x880 [ 2396.312016][ T9508] ? swp_swapcount+0x540/0x540 [ 2396.316788][ T9508] ? kasan_check_read+0x11/0x20 [ 2396.321652][ T9508] ? do_raw_spin_unlock+0x57/0x270 [ 2396.326794][ T9508] do_wp_page+0x48e/0x1500 [ 2396.331241][ T9508] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2396.336644][ T9508] __handle_mm_fault+0x22e8/0x3ec0 [ 2396.341779][ T9508] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2396.347335][ T9508] ? find_held_lock+0x35/0x130 [ 2396.352116][ T9508] ? handle_mm_fault+0x322/0xb30 [ 2396.357073][ T9508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2396.363330][ T9508] ? kasan_check_read+0x11/0x20 [ 2396.368193][ T9508] handle_mm_fault+0x43f/0xb30 [ 2396.372981][ T9508] __do_page_fault+0x5ef/0xda0 [ 2396.377763][ T9508] do_page_fault+0x71/0x581 [ 2396.382276][ T9508] ? page_fault+0x8/0x30 [ 2396.386535][ T9508] page_fault+0x1e/0x30 [ 2396.390693][ T9508] RIP: 0033:0x42ff36 [ 2396.394592][ T9508] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2396.414222][ T9508] RSP: 002b:00007ffdbcae70e0 EFLAGS: 00010206 [ 2396.420301][ T9508] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2396.428288][ T9508] RDX: 0000000001fcd930 RSI: 0000000001fd5970 RDI: 0000000000000003 [ 2396.436273][ T9508] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001fcc940 [ 2396.444261][ T9508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2396.452251][ T9508] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 18:54:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) [ 2396.539137][ T9508] memory: usage 324kB, limit 0kB, failcnt 603886 [ 2396.548406][ T9508] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2396.582182][ T9508] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2396.602703][ T9508] Memory cgroup stats for /syz3: cache:100KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2396.643977][ T9508] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9508,uid=0 [ 2396.672862][ T9508] Memory cgroup out of memory: Killed process 9508 (syz-executor.3) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 2396.699773][ T1043] oom_reaper: reaped process 9508 (syz-executor.3), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2396.724171][ T9533] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2396.741902][ T9533] CPU: 1 PID: 9533 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2396.751336][ T9533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2396.761404][ T9533] Call Trace: [ 2396.764709][ T9533] dump_stack+0x172/0x1f0 [ 2396.769043][ T9533] dump_header+0x10f/0xb6c [ 2396.773485][ T9533] oom_kill_process.cold+0x10/0x15 [ 2396.778622][ T9533] out_of_memory+0x79a/0x1280 [ 2396.783338][ T9533] ? oom_killer_disable+0x280/0x280 [ 2396.788550][ T9533] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2396.794635][ T9533] ? memcg_event_wake+0x230/0x230 [ 2396.799681][ T9533] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2396.805493][ T9533] ? cgroup_file_notify+0x140/0x1b0 [ 2396.810705][ T9533] memory_max_write+0x169/0x300 [ 2396.815556][ T9533] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2396.820852][ T9533] ? mem_cgroup_write+0x360/0x360 [ 2396.825896][ T9533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2396.831375][ T9533] cgroup_file_write+0x245/0x7a0 [ 2396.836328][ T9533] ? mem_cgroup_write+0x360/0x360 [ 2396.841373][ T9533] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2396.847030][ T9533] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2396.852670][ T9533] kernfs_fop_write+0x2ba/0x480 [ 2396.857551][ T9533] __vfs_write+0x8d/0x110 [ 2396.861890][ T9533] ? kernfs_fop_open+0xd90/0xd90 [ 2396.866835][ T9533] vfs_write+0x20c/0x580 [ 2396.871090][ T9533] ksys_write+0x14f/0x2d0 [ 2396.875435][ T9533] ? __ia32_sys_read+0xb0/0xb0 [ 2396.880215][ T9533] ? do_syscall_64+0x26/0x610 [ 2396.884898][ T9533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2396.890967][ T9533] ? do_syscall_64+0x26/0x610 [ 2396.895658][ T9533] __x64_sys_write+0x73/0xb0 [ 2396.900259][ T9533] do_syscall_64+0x103/0x610 [ 2396.904857][ T9533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2396.910749][ T9533] RIP: 0033:0x458da9 [ 2396.914634][ T9533] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2396.934242][ T9533] RSP: 002b:00007ff9cc31cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2396.942642][ T9533] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 18:54:41 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "e998d7b9cebfc97345bea14d3d422ff13233923cb31b58fa12eb7e94c8e31642506e56f8834f5e30411a9feb782d51c39ab0e99de1c0797d3e56f003ed837f6ea8a78077ea0325556ea5805b31c1252094fe3519559a29e9d8b54d4f03c1f206a8e49ea73cf28e5436104bbbb2acc4f579c66a987950a0fe55dbcec0f7b14d3dcd479b35162453a46a36d51fb78c69afc81f4c92e4f05f6cd52bb9cfb9256b8cf371302bc16c19406adbf5ee5b76a692605aa973e3ffa3cea1116830aa5396c8ac3b1e721eba7aff6b7df5baf197e78a3f20120fba5078d609e9681421f11b4ea8d932d0befa1d615f266e02c2e7618387767cf1f2453c8a7788ad"}], 0x178}, 0x4001) r3 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r5 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r4, &(0x7f00000003c0)=0x100, 0x12) [ 2396.950614][ T9533] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000008 [ 2396.958590][ T9533] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2396.966539][ T9533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9cc31d6d4 [ 2396.974488][ T9533] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2397.035944][ T9533] memory: usage 5708kB, limit 0kB, failcnt 189848 [ 2397.072833][ T9533] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 18:54:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2397.118541][ T9533] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 18:54:41 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2397.160705][ T9533] Memory cgroup stats for /syz0: cache:456KB rss:4232KB rss_huge:4096KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:4232KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2397.215290][ T9533] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9529,uid=0 [ 2397.234743][ T9533] Memory cgroup out of memory: Killed process 9533 (syz-executor.0) total-vm:72448kB, anon-rss:4232kB, file-rss:35816kB, shmem-rss:0kB [ 2397.249852][ T9511] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2397.259340][ T1043] oom_reaper: reaped process 9533 (syz-executor.0), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 2397.260670][ T9511] CPU: 1 PID: 9511 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #37 [ 2397.278557][ T9511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2397.288613][ T9511] Call Trace: [ 2397.291909][ T9511] dump_stack+0x172/0x1f0 [ 2397.296239][ T9511] dump_header+0x10f/0xb6c [ 2397.300659][ T9511] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2397.306474][ T9511] ? ___ratelimit+0x60/0x595 [ 2397.311069][ T9511] ? do_raw_spin_unlock+0x57/0x270 [ 2397.316187][ T9511] oom_kill_process.cold+0x10/0x15 [ 2397.321305][ T9511] out_of_memory+0x79a/0x1280 [ 2397.325998][ T9511] ? oom_killer_disable+0x280/0x280 [ 2397.331199][ T9511] ? find_held_lock+0x35/0x130 [ 2397.335977][ T9511] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2397.341624][ T9511] ? memcg_event_wake+0x230/0x230 [ 2397.346668][ T9511] ? do_raw_spin_unlock+0x57/0x270 [ 2397.351810][ T9511] ? _raw_spin_unlock+0x2d/0x50 [ 2397.356683][ T9511] try_charge+0x102c/0x15c0 [ 2397.361194][ T9511] ? find_held_lock+0x35/0x130 [ 2397.365965][ T9511] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2397.371521][ T9511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2397.377777][ T9511] ? kasan_check_read+0x11/0x20 [ 2397.382646][ T9511] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2397.388212][ T9511] mem_cgroup_try_charge+0x24d/0x5e0 [ 2397.393521][ T9511] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2397.399177][ T9511] wp_page_copy+0x408/0x1740 [ 2397.403781][ T9511] ? find_held_lock+0x35/0x130 [ 2397.408560][ T9511] ? pmd_pfn+0x1d0/0x1d0 [ 2397.412819][ T9511] ? lock_downgrade+0x880/0x880 [ 2397.417683][ T9511] ? swp_swapcount+0x540/0x540 [ 2397.422469][ T9511] ? kasan_check_read+0x11/0x20 [ 2397.427336][ T9511] ? do_raw_spin_unlock+0x57/0x270 [ 2397.432464][ T9511] do_wp_page+0x48e/0x1500 [ 2397.436900][ T9511] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 2397.442296][ T9511] __handle_mm_fault+0x22e8/0x3ec0 [ 2397.447413][ T9511] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2397.452964][ T9511] ? find_held_lock+0x35/0x130 [ 2397.457736][ T9511] ? handle_mm_fault+0x322/0xb30 [ 2397.462697][ T9511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2397.468951][ T9511] ? kasan_check_read+0x11/0x20 [ 2397.473825][ T9511] handle_mm_fault+0x43f/0xb30 [ 2397.478602][ T9511] __do_page_fault+0x5ef/0xda0 [ 2397.483388][ T9511] do_page_fault+0x71/0x581 [ 2397.487888][ T9511] ? page_fault+0x8/0x30 [ 2397.492148][ T9511] page_fault+0x1e/0x30 [ 2397.496309][ T9511] RIP: 0033:0x42ff36 [ 2397.500210][ T9511] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 2397.519818][ T9511] RSP: 002b:00007ffea50b8850 EFLAGS: 00010206 [ 2397.525895][ T9511] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 2397.533906][ T9511] RDX: 0000000001e74930 RSI: 0000000001e7c970 RDI: 0000000000000003 [ 2397.541886][ T9511] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001e73940 [ 2397.549866][ T9511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 2397.557858][ T9511] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 18:54:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) [ 2397.567415][ T9511] memory: usage 1588kB, limit 0kB, failcnt 604 [ 2397.580439][ T9511] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2397.587932][ T9511] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2397.748953][ T9511] Memory cgroup stats for /syz4: cache:60KB rss:36KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2397.781371][ T9511] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9511,uid=0 [ 2397.804373][ T9511] Memory cgroup out of memory: Killed process 9511 (syz-executor.4) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 2397.845909][ T9545] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2397.846339][ T1043] oom_reaper: reaped process 9511 (syz-executor.4), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 2397.863244][ T9545] CPU: 1 PID: 9545 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2397.875038][ T9545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2397.885103][ T9545] Call Trace: [ 2397.888421][ T9545] dump_stack+0x172/0x1f0 [ 2397.892778][ T9545] dump_header+0x10f/0xb6c [ 2397.897214][ T9545] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2397.903046][ T9545] ? ___ratelimit+0x60/0x595 [ 2397.907664][ T9545] ? do_raw_spin_unlock+0x57/0x270 [ 2397.912799][ T9545] oom_kill_process.cold+0x10/0x15 [ 2397.917934][ T9545] out_of_memory+0x79a/0x1280 [ 2397.922638][ T9545] ? oom_killer_disable+0x280/0x280 [ 2397.927862][ T9545] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2397.933422][ T9545] ? memcg_event_wake+0x230/0x230 [ 2397.938458][ T9545] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2397.944365][ T9545] ? cgroup_file_notify+0x140/0x1b0 [ 2397.949583][ T9545] memory_max_write+0x169/0x300 [ 2397.954437][ T9545] ? kernfs_fop_write+0x204/0x480 [ 2397.959476][ T9545] ? mem_cgroup_write+0x360/0x360 [ 2397.964504][ T9545] ? lock_acquire+0x16f/0x3f0 [ 2397.969190][ T9545] ? kernfs_fop_write+0x227/0x480 [ 2397.974229][ T9545] cgroup_file_write+0x245/0x7a0 [ 2397.979156][ T9545] ? mem_cgroup_write+0x360/0x360 [ 2397.984159][ T9545] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2397.989804][ T9545] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 2397.995451][ T9545] kernfs_fop_write+0x2ba/0x480 [ 2398.000326][ T9545] __vfs_write+0x8d/0x110 [ 2398.004676][ T9545] ? kernfs_fop_open+0xd90/0xd90 [ 2398.009728][ T9545] vfs_write+0x20c/0x580 [ 2398.013994][ T9545] ksys_write+0x14f/0x2d0 [ 2398.018351][ T9545] ? __ia32_sys_read+0xb0/0xb0 [ 2398.023140][ T9545] ? do_syscall_64+0x26/0x610 [ 2398.027827][ T9545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2398.033899][ T9545] ? do_syscall_64+0x26/0x610 [ 2398.038595][ T9545] __x64_sys_write+0x73/0xb0 [ 2398.043197][ T9545] do_syscall_64+0x103/0x610 [ 2398.047795][ T9545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2398.053692][ T9545] RIP: 0033:0x458da9 [ 2398.057580][ T9545] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2398.077198][ T9545] RSP: 002b:00007f26a8761c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2398.085601][ T9545] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 18:54:42 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2398.093552][ T9545] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000008 [ 2398.101502][ T9545] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2398.109452][ T9545] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26a87626d4 [ 2398.117398][ T9545] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 2398.155352][ T9545] memory: usage 5088kB, limit 0kB, failcnt 626690 [ 2398.180669][ T9545] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2398.189199][ T9545] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2398.198998][ T9545] Memory cgroup stats for /syz2: cache:0KB rss:4336KB rss_huge:4096KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4228KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2398.220803][ T9545] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9544,uid=0 [ 2398.259582][ T9545] Memory cgroup out of memory: Killed process 9545 (syz-executor.2) total-vm:72448kB, anon-rss:4236kB, file-rss:35800kB, shmem-rss:0kB [ 2398.307758][ T9358] syz-executor.0 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 2398.309737][ T1043] oom_reaper: reaped process 9545 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 2398.331476][ T9358] CPU: 1 PID: 9358 Comm: syz-executor.0 Not tainted 5.1.0-rc6+ #37 [ 2398.339405][ T9358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2398.349470][ T9358] Call Trace: [ 2398.352781][ T9358] dump_stack+0x172/0x1f0 [ 2398.357120][ T9358] dump_header+0x10f/0xb6c [ 2398.361539][ T9358] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2398.367346][ T9358] ? ___ratelimit+0x60/0x595 [ 2398.371952][ T9358] ? do_raw_spin_unlock+0x57/0x270 [ 2398.377093][ T9358] oom_kill_process.cold+0x10/0x15 [ 2398.382205][ T9358] out_of_memory+0x79a/0x1280 [ 2398.386899][ T9358] ? oom_killer_disable+0x280/0x280 [ 2398.392109][ T9358] ? find_held_lock+0x35/0x130 [ 2398.396882][ T9358] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2398.402439][ T9358] ? memcg_event_wake+0x230/0x230 [ 2398.408343][ T9358] ? do_raw_spin_unlock+0x57/0x270 [ 2398.413479][ T9358] ? _raw_spin_unlock+0x2d/0x50 [ 2398.418353][ T9358] try_charge+0x102c/0x15c0 [ 2398.422873][ T9358] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2398.428435][ T9358] ? rcu_read_lock_sched_held+0x110/0x130 [ 2398.434164][ T9358] ? __alloc_pages_nodemask+0x599/0x7e0 [ 2398.439746][ T9358] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2398.445378][ T9358] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2398.450584][ T9358] ? cache_grow_begin+0x594/0x860 [ 2398.455610][ T9358] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2398.460902][ T9358] ? trace_hardirqs_on+0x67/0x230 [ 2398.465933][ T9358] cache_grow_begin+0x5c0/0x860 [ 2398.470793][ T9358] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2398.477038][ T9358] ? __cpuset_node_allowed+0x136/0x540 [ 2398.482513][ T9358] fallback_alloc+0x1fd/0x2d0 [ 2398.487199][ T9358] ____cache_alloc_node+0x1be/0x1e0 [ 2398.492413][ T9358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2398.498774][ T9358] kmem_cache_alloc+0x1e8/0x6f0 [ 2398.503653][ T9358] ? inet_create+0x2f4/0xe10 [ 2398.508255][ T9358] sk_prot_alloc+0x67/0x2e0 [ 2398.512755][ T9358] ? lock_downgrade+0x880/0x880 [ 2398.517606][ T9358] sk_alloc+0x39/0xf70 [ 2398.521679][ T9358] inet_create+0x36a/0xe10 [ 2398.526110][ T9358] __sock_create+0x3e6/0x750 [ 2398.530709][ T9358] __sys_socket+0x103/0x220 [ 2398.535212][ T9358] ? move_addr_to_kernel+0x80/0x80 [ 2398.540323][ T9358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2398.545788][ T9358] ? do_syscall_64+0x26/0x610 [ 2398.550468][ T9358] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2398.556535][ T9358] ? do_syscall_64+0x26/0x610 [ 2398.561222][ T9358] __x64_sys_socket+0x73/0xb0 [ 2398.566086][ T9358] do_syscall_64+0x103/0x610 [ 2398.570773][ T9358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2398.576658][ T9358] RIP: 0033:0x45b917 [ 2398.580550][ T9358] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2398.600154][ T9358] RSP: 002b:00007fff52610ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2398.608574][ T9358] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045b917 [ 2398.616550][ T9358] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 2398.624538][ T9358] RBP: 0000000000000023 R08: 0000000000000000 R09: 000000000000000a [ 2398.632520][ T9358] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 2398.640500][ T9358] R13: 00007fff526112c0 R14: 0000000000248f1d R15: 00007fff526112d0 [ 2398.649882][ T9358] memory: usage 1324kB, limit 0kB, failcnt 189860 [ 2398.656321][ T9358] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2398.663857][ T9358] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2398.670880][ T9358] Memory cgroup stats for /syz0: cache:456KB rss:64KB rss_huge:0KB shmem:480KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:440KB active_anon:48KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2398.693222][ T9358] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9358,uid=0 [ 2398.708620][ T9358] Memory cgroup out of memory: Killed process 9358 (syz-executor.0) total-vm:72316kB, anon-rss:92kB, file-rss:35712kB, shmem-rss:0kB [ 2398.723982][ T1043] oom_reaper: reaped process 9358 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 18:54:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409a", 0x5b}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 18:54:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2398.905811][ T9120] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2398.919278][ T9120] CPU: 0 PID: 9120 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #37 [ 2398.927192][ T9120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2398.937250][ T9120] Call Trace: [ 2398.940549][ T9120] dump_stack+0x172/0x1f0 [ 2398.944894][ T9120] dump_header+0x10f/0xb6c [ 2398.949333][ T9120] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2398.955234][ T9120] ? ___ratelimit+0x60/0x595 [ 2398.959834][ T9120] ? do_raw_spin_unlock+0x57/0x270 [ 2398.964967][ T9120] oom_kill_process.cold+0x10/0x15 [ 2398.970102][ T9120] out_of_memory+0x79a/0x1280 [ 2398.974788][ T9120] ? lock_downgrade+0x880/0x880 [ 2398.979646][ T9120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2398.985885][ T9120] ? oom_killer_disable+0x280/0x280 [ 2398.991070][ T9120] ? find_held_lock+0x35/0x130 [ 2398.995823][ T9120] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2399.001347][ T9120] ? memcg_event_wake+0x230/0x230 [ 2399.006356][ T9120] ? do_raw_spin_unlock+0x57/0x270 [ 2399.011456][ T9120] ? _raw_spin_unlock+0x2d/0x50 [ 2399.016290][ T9120] try_charge+0x102c/0x15c0 [ 2399.020774][ T9120] ? find_held_lock+0x35/0x130 [ 2399.025525][ T9120] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2399.031060][ T9120] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2399.036586][ T9120] ? find_held_lock+0x35/0x130 [ 2399.041341][ T9120] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2399.046874][ T9120] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2399.052403][ T9120] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2399.057585][ T9120] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2399.063114][ T9120] __memcg_kmem_charge+0x136/0x300 [ 2399.068206][ T9120] __alloc_pages_nodemask+0x437/0x7e0 [ 2399.073568][ T9120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2399.079903][ T9120] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2399.085604][ T9120] ? copy_process.part.0+0x1d08/0x7980 [ 2399.091052][ T9120] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2399.096318][ T9120] ? trace_hardirqs_on+0x67/0x230 [ 2399.101324][ T9120] ? kasan_check_read+0x11/0x20 [ 2399.106159][ T9120] copy_process.part.0+0x3e0/0x7980 [ 2399.111342][ T9120] ? __lock_acquire+0x548/0x3fb0 [ 2399.116358][ T9120] ? wp_page_reuse+0x159/0x1d0 [ 2399.121109][ T9120] ? __might_fault+0x12b/0x1e0 [ 2399.125861][ T9120] ? __cleanup_sighand+0x60/0x60 [ 2399.130779][ T9120] ? lock_downgrade+0x880/0x880 [ 2399.135624][ T9120] _do_fork+0x257/0xfd0 [ 2399.139768][ T9120] ? fork_idle+0x1d0/0x1d0 [ 2399.144174][ T9120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2399.149610][ T9120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2399.155053][ T9120] ? do_syscall_64+0x26/0x610 [ 2399.159710][ T9120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2399.165754][ T9120] ? do_syscall_64+0x26/0x610 [ 2399.170414][ T9120] __x64_sys_clone+0xbf/0x150 [ 2399.175076][ T9120] do_syscall_64+0x103/0x610 [ 2399.179652][ T9120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2399.185521][ T9120] RIP: 0033:0x45737a [ 2399.189396][ T9120] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2399.208990][ T9120] RSP: 002b:00007ffc777abac0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2399.217392][ T9120] RAX: ffffffffffffffda RBX: 00007ffc777abac0 RCX: 000000000045737a [ 2399.225436][ T9120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2399.233388][ T9120] RBP: 00007ffc777abb00 R08: 0000000000000001 R09: 0000000001693940 [ 2399.241341][ T9120] R10: 0000000001693c10 R11: 0000000000000246 R12: 0000000000000001 [ 2399.249290][ T9120] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc777abb50 [ 2399.276813][ T9120] memory: usage 704kB, limit 0kB, failcnt 626698 [ 2399.289646][ T9120] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2399.297129][ T9120] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 18:54:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2399.310375][ T9120] Memory cgroup stats for /syz2: cache:0KB rss:60KB rss_huge:0KB shmem:20KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:44KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2399.344252][ T9120] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9120,uid=0 18:54:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x88, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66bfe1f5006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bba080068bd72c116aaf33198cc7613d1266b9f53b325c077", 0x0, 0x9}, 0x28) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000600)='\x00\x02\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409a", 0x5b}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xb2) gettid() r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 2399.389726][ T9120] Memory cgroup out of memory: Killed process 9120 (syz-executor.2) total-vm:72316kB, anon-rss:96kB, file-rss:35712kB, shmem-rss:0kB [ 2399.411648][ T1043] oom_reaper: reaped process 9120 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 18:54:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:54:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:54:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:54:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5}, 0x80, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f0000000640)=@ethernet={0x306, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000140)="4bd1cc6bb212d4aa34621b2a33d9cf6f929526883f66a819b4c9173b51418e", 0x1f}, {&(0x7f00000006c0)="a1ceb2b764b96d6af91654daf1aa513282b8046f83d444a78003917041b399f1e71775628e6fa7cee9fb5fc25e08e50d87e14deb27", 0x35}, {&(0x7f0000000700)="294cd6bd9cce0a0298055170f5d7a8b4bc768a4f2917d9168a6880e2ac522aab57aaf305d4cc87302136b482ad0c5a4d7c7749f13132301a525f251c14c2c0ea7ddbc846e94a4c7ac7805c6d816ab990ab20c62a31c5efef5256748e620a19f273718c706dc15562dbd1b3ed406e2404d62bba33a7b93b916fed365553ee5b968ec491de7d0d09b7216ed0defffe95e1620d0b06f5445ba40c6411e25a794fc9ebd169a16b6b7821d82ac84de249b57e1f4d1acee9d17647527e57124ea2049550", 0xc1}, {&(0x7f0000000800)="ec5d76085c8e", 0x6}, {&(0x7f0000000840)="32ee0d531fe20a7b", 0x8}, {&(0x7f0000000880)="4e0cc688da868fd942e558bae0d36605c551cd3c51", 0x15}, {&(0x7f00000008c0)="8be7fca1d94ec793830681f0f486bc8b1a7633526070825c5e4193d9da8a1fd4fa7a24c4aec0d8f8b8e1159632935bc479e60607fc0a4b8e97c593500ffce93344af76d9d0bee007d62f5680b79deb305a0c5b1c857f6b8fe2409ad4", 0x5c}], 0x7, &(0x7f00000009c0)=[{0x68, 0x115, 0x1, "5803ed28fb1ae59adde0803bbdb122d39d907268505413d201b41cca5f5a1de95e8d0d441d898d721e22efbfeb34557a0cb3aa385c76e14ba5bcd99c1508bff6208470da82facc67e786de0cb2c5cd936b0dd54b"}, {0x110, 0x13b, 0x8, "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"}], 0x178}, 0x4001) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=0x100, 0x12) 18:54:45 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) 18:54:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) gettid() close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r1) [ 2401.557214][ T9602] IPVS: ftp: loaded support on port[0] = 21 [ 2401.557368][ T9605] IPVS: ftp: loaded support on port[0] = 21 [ 2402.383898][ T9605] chnl_net:caif_netlink_parms(): no params data found [ 2402.421485][ T9602] chnl_net:caif_netlink_parms(): no params data found [ 2402.673979][ T9605] bridge0: port 1(bridge_slave_0) entered blocking state [ 2402.682041][ T9605] bridge0: port 1(bridge_slave_0) entered disabled state [ 2402.689935][ T9605] device bridge_slave_0 entered promiscuous mode [ 2402.697907][ T9605] bridge0: port 2(bridge_slave_1) entered blocking state [ 2402.705896][ T9605] bridge0: port 2(bridge_slave_1) entered disabled state [ 2402.714050][ T9605] device bridge_slave_1 entered promiscuous mode [ 2402.917873][ T9605] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2402.931198][ T9621] IPVS: ftp: loaded support on port[0] = 21 [ 2402.946526][ T9605] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2403.145389][ T9602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2403.152856][ T9602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2403.160972][ T9602] device bridge_slave_0 entered promiscuous mode [ 2403.170907][ T9602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2403.177946][ T9602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2403.185616][ T9602] device bridge_slave_1 entered promiscuous mode [ 2403.194154][ T9605] team0: Port device team_slave_0 added [ 2403.201242][ T9605] team0: Port device team_slave_1 added [ 2403.452464][ T9605] device hsr_slave_0 entered promiscuous mode [ 2403.519580][ T9605] device hsr_slave_1 entered promiscuous mode [ 2403.756077][ T9602] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2403.774906][ T9602] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2403.797547][ T9602] team0: Port device team_slave_0 added [ 2403.805635][ T9602] team0: Port device team_slave_1 added [ 2403.831355][ T984] device bridge_slave_1 left promiscuous mode [ 2403.838237][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2403.890054][ T984] device bridge_slave_0 left promiscuous mode [ 2403.896207][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2403.941155][ T984] device bridge_slave_1 left promiscuous mode [ 2403.947356][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2404.009857][ T984] device bridge_slave_0 left promiscuous mode [ 2404.016014][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2404.080929][ T984] device bridge_slave_1 left promiscuous mode [ 2404.087134][ T984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2404.149798][ T984] device bridge_slave_0 left promiscuous mode [ 2404.155966][ T984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2409.101994][ T984] device hsr_slave_1 left promiscuous mode [ 2409.152931][ T984] device hsr_slave_0 left promiscuous mode [ 2409.193412][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2409.206264][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2409.218140][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2409.243312][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2409.323587][ T984] bond0 (unregistering): Released all slaves [ 2409.502295][ T984] device hsr_slave_1 left promiscuous mode [ 2409.564147][ T984] device hsr_slave_0 left promiscuous mode [ 2409.602528][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2409.620558][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2409.632096][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2409.685754][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2409.769919][ T984] bond0 (unregistering): Released all slaves [ 2409.893003][ T984] device hsr_slave_1 left promiscuous mode [ 2409.934254][ T984] device hsr_slave_0 left promiscuous mode [ 2409.992365][ T984] team0 (unregistering): Port device team_slave_1 removed [ 2410.005459][ T984] team0 (unregistering): Port device team_slave_0 removed [ 2410.016761][ T984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2410.063368][ T984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2410.143739][ T984] bond0 (unregistering): Released all slaves [ 2410.271983][ T9602] device hsr_slave_0 entered promiscuous mode [ 2410.319551][ T9602] device hsr_slave_1 entered promiscuous mode [ 2410.428336][ T9621] chnl_net:caif_netlink_parms(): no params data found [ 2410.492952][ T9605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2410.503946][ T9621] bridge0: port 1(bridge_slave_0) entered blocking state [ 2410.511479][ T9621] bridge0: port 1(bridge_slave_0) entered disabled state [ 2410.519270][ T9621] device bridge_slave_0 entered promiscuous mode [ 2410.537782][ T9605] 8021q: adding VLAN 0 to HW filter on device team0 [ 2410.548626][ T45] WARNING: CPU: 1 PID: 45 at net/batman-adv/multicast.c:337 batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2410.550247][ T9621] bridge0: port 2(bridge_slave_1) entered blocking state [ 2410.559740][ T45] Kernel panic - not syncing: panic_on_warn set ... [ 2410.559764][ T45] CPU: 1 PID: 45 Comm: kworker/u4:2 Not tainted 5.1.0-rc6+ #37 [ 2410.559771][ T45] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.559792][ T45] Workqueue: bat_events batadv_mcast_mla_update [ 2410.567431][ T9621] bridge0: port 2(bridge_slave_1) entered disabled state [ 2410.573367][ T45] Call Trace: [ 2410.573388][ T45] dump_stack+0x172/0x1f0 [ 2410.573407][ T45] ? batadv_mcast_mla_tt_retract+0x240/0x3d0 [ 2410.573422][ T45] panic+0x2cb/0x65c [ 2410.573439][ T45] ? __warn_printk+0xf3/0xf3 [ 2410.581459][ T9621] kobject: 'brport' (0000000022c24754): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 2410.591110][ T45] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2410.591125][ T45] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2410.591140][ T45] ? __warn.cold+0x5/0x45 [ 2410.591155][ T45] ? __warn+0xe8/0x1d0 [ 2410.598169][ T9621] device bridge_slave_1 entered promiscuous mode [ 2410.604381][ T45] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2410.604398][ T45] __warn.cold+0x20/0x45 [ 2410.604413][ T45] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2410.604431][ T45] report_bug+0x263/0x2b0 [ 2410.608300][ T9621] kobject: 'brport' (0000000022c24754): kobject_uevent_env [ 2410.612106][ T45] do_error_trap+0x11b/0x200 [ 2410.612124][ T45] do_invalid_op+0x37/0x50 [ 2410.618176][ T9621] kobject: 'brport' (0000000022c24754): kobject_uevent_env: filter function caused the event to drop! [ 2410.621954][ T45] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2410.621968][ T45] invalid_op+0x14/0x20 [ 2410.621983][ T45] RIP: 0010:batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2410.621999][ T45] Code: 4d f9 7c fa 4c 8b 7d c0 4d 85 ff 0f 85 c3 fd ff ff e8 3b f9 7c fa 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 27 f9 7c fa <0f> 0b e9 54 fd ff ff e8 3b 0f b5 fa e9 37 fe ff ff 48 89 df e8 4e [ 2410.626743][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2410.637458][ T45] RSP: 0018:ffff8880a991fb50 EFLAGS: 00010293 [ 2410.637469][ T45] RAX: ffff8880a990c440 RBX: 0000000000000001 RCX: ffffffff86f3911b [ 2410.637477][ T45] RDX: 0000000000000000 RSI: ffffffff86f393c9 RDI: 0000000000000007 [ 2410.637485][ T45] RBP: ffff8880a991fbb0 R08: ffff8880a990c440 R09: 0000000000000003 [ 2410.637492][ T45] R10: ffffed1015d25bc7 R11: ffff8880ae92de3b R12: ffff8880a991fc98 [ 2410.637499][ T45] R13: ffff88809f824f88 R14: 0000000000000000 R15: ffff8880a991fd08 [ 2410.637523][ T45] ? batadv_mcast_mla_tt_retract+0x5b/0x3d0 [ 2410.644325][ T8625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2410.649705][ T45] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 2410.649808][ T45] ? br_multicast_list_adjacent+0x144/0x690 [ 2410.649827][ T45] ? __local_bh_enable_ip+0x15a/0x270 [ 2410.658030][ T9602] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2410.658200][ T45] batadv_mcast_mla_update+0x553/0x1ec0 [ 2410.669727][ T9621] kobject: 'veth0_to_bond' (00000000b2fcef59): kobject_add_internal: parent: 'net', set: 'devices' [ 2410.670471][ T45] ? batadv_mcast_tvlv_ogm_handler+0x210/0x210 [ 2410.675332][ T9621] kobject: 'veth0_to_bond' (00000000b2fcef59): kobject_uevent_env [ 2410.680751][ T45] process_one_work+0x98e/0x1790 [ 2410.680775][ T45] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2410.685777][ T9621] kobject: 'veth0_to_bond' (00000000b2fcef59): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond' [ 2410.692249][ T45] ? lock_acquire+0x16f/0x3f0 [ 2410.692283][ T45] worker_thread+0x98/0xe40 [ 2410.692311][ T45] kthread+0x357/0x430 [ 2410.697071][ T9621] kobject: 'queues' (000000005868b6b2): kobject_add_internal: parent: 'veth0_to_bond', set: '' [ 2410.701278][ T45] ? process_one_work+0x1790/0x1790 [ 2410.701291][ T45] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2410.701308][ T45] ret_from_fork+0x3a/0x50 [ 2410.713525][ T45] Kernel Offset: disabled [ 2410.935298][ T45] Rebooting in 86400 seconds..