net(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 463.794996] ? trace_hardirqs_on_caller+0x381/0x520 [ 463.795006] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 463.795014] ? ___ratelimit+0x4f/0x3f0 [ 463.795029] oom_kill_process.cold.8+0x10/0xc88 12:28:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 463.795040] ? lock_downgrade+0x560/0x560 [ 463.795055] ? check_preemption_disabled+0x34/0x1e0 12:28:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:22 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 463.795072] out_of_memory+0x669/0xa60 12:28:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 463.795086] ? oom_killer_disable+0x1f0/0x1f0 [ 463.795115] __alloc_pages_nodemask+0x182f/0x2180 [ 463.795148] ? gfp_pfmemalloc_allowed+0x150/0x150 ** 178 printk messages dropped ** [ 463.797413] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 ** 195 printk messages dropped ** [ 463.800948] [15328] 0 15328 17651 12626 30 3 0 1000 syz-executor3 [ 463.800959] [15429] 0 15429 17651 12627 31 3 0 1000 syz-executor1 [ 463.800969] [15596] 0 15596 5365 169 15 3 0 -1000 udevd [ 463.800978] [15782] 0 15782 17618 8234 25 3 0 1000 syz-executor1 [ 463.800989] [15853] 0 15853 17618 8234 25 3 0 1000 syz-executor1 [ 463.800999] [15904] 0 15904 17651 12653 31 3 0 1000 syz-executor5 [ 463.801010] [15926] 0 15926 17618 8234 25 3 0 1000 syz-executor1 [ 463.801020] [16005] 0 16005 17618 8233 26 3 0 1000 syz-executor0 [ 463.801031] [16024] 0 16024 17651 12741 31 3 0 1000 syz-executor5 [ 463.801042] [16063] 0 16063 17618 8233 26 3 0 1000 syz-executor0 12:28:23 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:23 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:23 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 463.801053] [16116] 0 16116 17618 8232 25 3 0 1000 syz-executor0 [ 463.801064] [16167] 0 16167 17618 8232 25 3 0 1000 syz-executor0 [ 463.801075] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 463.801085] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 [ 463.801095] [16269] 0 16269 17651 10678 30 4 0 1000 syz-executor0 [ 463.801105] [16272] 0 16272 17684 17420 40 4 0 1000 syz-executor1 [ 463.801116] [16273] 0 16273 17651 10415 29 4 0 1000 syz-executor5 [ 463.801127] [16291] 0 16291 17618 8233 26 3 0 1000 syz-executor0 [ 463.801137] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 ** 397 printk messages dropped ** [ 465.322244] [15144] 0 15144 2667 34 10 3 0 0 init [ 465.322256] [15150] 0 15150 5365 169 15 3 0 -1000 udevd [ 465.322276] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 [ 465.322294] [15328] 0 15328 17651 12626 30 3 0 1000 syz-executor3 ** 60 printk messages dropped ** [ 465.459945] RSP: 002b:00007f2eebe9bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 ** 350 printk messages dropped ** [ 465.484729] [15143] 0 15143 2667 34 10 3 0 0 init [ 465.484778] [15144] 0 15144 2667 34 10 3 0 0 init [ 465.484837] [15150] 0 15150 5365 169 15 3 0 -1000 udevd [ 465.484880] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 ** 411 printk messages dropped ** [ 466.468293] [15142] 0 15142 2667 34 10 3 0 0 init [ 466.468304] [15143] 0 15143 2667 34 10 3 0 0 init [ 466.468315] [15144] 0 15144 2667 34 10 3 0 0 init [ 466.468326] [15150] 0 15150 5365 221 15 3 0 -1000 udevd [ 466.468337] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 [ 466.468349] [15328] 0 15328 17651 12626 30 3 0 1000 syz-executor3 [ 466.468361] [15429] 0 15429 17651 12627 31 3 0 1000 syz-executor1 [ 466.468372] [15596] 0 15596 5365 169 15 3 0 -1000 udevd [ 466.468383] [15782] 0 15782 17618 8234 25 3 0 1000 syz-executor1 [ 466.468394] [15853] 0 15853 17618 8234 25 3 0 1000 syz-executor1 [ 466.468405] [15904] 0 15904 17651 12653 31 3 0 1000 syz-executor5 [ 466.468416] [15926] 0 15926 17618 8234 25 3 0 1000 syz-executor1 [ 466.468427] [16005] 0 16005 17618 8233 26 3 0 1000 syz-executor0 [ 466.468438] [16024] 0 16024 17651 12741 31 3 0 1000 syz-executor5 [ 466.468449] [16063] 0 16063 17618 8233 26 3 0 1000 syz-executor0 [ 466.468459] [16116] 0 16116 17618 8232 25 3 0 1000 syz-executor0 [ 466.468470] [16167] 0 16167 17618 8232 25 3 0 1000 syz-executor0 [ 466.468480] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 466.468492] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 [ 466.468503] [16291] 0 16291 17618 8233 26 3 0 1000 syz-executor0 [ 466.468515] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 466.468526] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 [ 466.468536] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 466.468546] [16359] 0 16359 17684 17645 40 4 0 1000 syz-executor1 [ 466.468556] [16377] 0 16377 17651 12652 31 3 0 1000 syz-executor1 [ 466.468566] [16384] 0 16384 17618 12267 31 4 0 1000 syz-executor5 [ 466.468576] [16388] 0 16388 17651 8428 28 4 0 1000 syz-executor0 [ 466.468587] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 466.468594] Out of memory: Kill process 16359 (syz-executor1) score 1010 or sacrifice child [ 466.468637] Killed process 16377 (syz-executor1) total-vm:70604kB, anon-rss:17840kB, file-rss:32768kB, shmem-rss:0kB [ 467.030538] syz-executor5 invoked oom-killer: gfp_mask=0x14200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=1000 [ 467.030556] CPU: 0 PID: 16384 Comm: syz-executor5 Not tainted 4.14.88+ #23 [ 467.030559] Call Trace: [ 467.030573] dump_stack+0xb9/0x11b [ 467.030589] dump_header+0x17d/0x7a8 [ 467.030597] ? trace_hardirqs_on_caller+0x381/0x520 [ 467.030607] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 467.030615] ? ___ratelimit+0x4f/0x3f0 [ 467.030630] oom_kill_process.cold.8+0x10/0xc88 [ 467.030640] ? lock_downgrade+0x560/0x560 [ 467.030654] ? check_preemption_disabled+0x34/0x1e0 [ 467.030670] out_of_memory+0x669/0xa60 [ 467.030684] ? oom_killer_disable+0x1f0/0x1f0 [ 467.030710] __alloc_pages_nodemask+0x182f/0x2180 [ 467.030743] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 467.030765] ? enqueue_hrtimer+0x3a0/0x3a0 [ 467.030812] wp_page_copy+0x16d/0x13e0 [ 467.030826] ? do_wp_page+0x244/0x1880 [ 467.030838] ? add_mm_counter_fast+0xb0/0xb0 [ 467.030845] ? HARDIRQ_verbose+0x10/0x10 [ 467.030856] ? __lock_acquire+0x619/0x4320 [ 467.030873] do_wp_page+0x24c/0x1880 [ 467.030888] ? finish_mkwrite_fault+0x4e0/0x4e0 [ 467.030895] ? __handle_mm_fault+0x7f0/0x25f0 [ 467.030918] __handle_mm_fault+0xdc7/0x25f0 [ 467.030934] ? vm_insert_page+0x6d0/0x6d0 [ 467.030940] ? HARDIRQ_verbose+0x10/0x10 [ 467.030947] ? __might_fault+0xd4/0x1b0 [ 467.030981] ? check_preemption_disabled+0x34/0x1e0 [ 467.030998] handle_mm_fault+0x2f2/0x6eb [ 467.031011] __do_page_fault+0x45d/0xb60 [ 467.031026] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 467.031034] ? bad_area_access_error+0x330/0x330 [ 467.031043] ? page_fault+0x2c/0x50 [ 467.031051] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.031065] ? page_fault+0x2c/0x50 [ 467.031075] page_fault+0x42/0x50 [ 467.031081] RIP: fffffffe:0x7201f [ 467.031085] RSP: 72c900:000000000072c900 EFLAGS: 000003e8 [ 467.031114] Mem-Info: [ 467.031130] active_anon:96941 inactive_anon:1283076 isolated_anon:0 [ 467.031130] active_file:37 inactive_file:19 isolated_file:0 [ 467.031130] unevictable:16513 dirty:0 writeback:0 unstable:0 [ 467.031130] slab_reclaimable:8063 slab_unreclaimable:83712 [ 467.031130] mapped:55625 shmem:338 pagetables:10680 bounce:0 [ 467.031130] free:5992 free_pcp:38 free_cma:0 [ 467.031159] Node 0 active_anon:387764kB inactive_anon:5132304kB active_file:148kB inactive_file:76kB unevictable:66052kB isolated(anon):0kB isolated(file):0kB mapped:222500kB dirty:0kB writeback:0kB shmem:1352kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 12:28:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:24 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:24 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:24 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:24 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 467.031176] DMA32 free:18480kB min:4684kB low:7692kB high:10700kB active_anon:2828kB inactive_anon:2575412kB active_file:140kB inactive_file:444kB unevictable:30276kB writepending:0kB present:3145324kB managed:3012120kB mlocked:30600kB kernel_stack:5600kB pagetables:18520kB bounce:0kB free_pcp:28kB local_pcp:0kB free_cma:0kB [ 467.031178] lowmem_reserve[]: 0 3505 3505 12:28:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 467.031205] Normal free:5488kB min:5588kB low:9176kB high:12764kB active_anon:384836kB inactive_anon:2556672kB active_file:532kB inactive_file:328kB unevictable:34740kB writepending:0kB present:4718592kB managed:3589232kB mlocked:34740kB kernel_stack:8000kB pagetables:24200kB bounce:0kB free_pcp:124kB local_pcp:0kB free_cma:0kB [ 467.031207] lowmem_reserve[]: 0 0 0 [ 467.031220] DMA32: 6*4kB (UMH) 10*8kB (UMH) 41*16kB (UMH) 400*32kB (UEH) 73*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18232kB 12:28:24 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 467.031271] Normal: 102*4kB (UMH) 53*8kB (UMH) 260*16kB (UMEH) 23*32kB (UEH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5728kB 12:28:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:24 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 467.031317] 6866 total pagecache pages [ 467.031327] 0 pages in swap cache [ 467.031332] Swap cache stats: add 0, delete 0, find 0/0 [ 467.031335] Free swap = 0kB [ 467.031337] Total swap = 0kB [ 467.031341] 1965979 pages RAM [ 467.031344] 0 pages HighMem/MovableOnly [ 467.031347] 315641 pages reserved [ 467.031350] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 467.031369] [ 190] 0 190 5366 168 15 3 0 -1000 udevd [ 467.031380] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 467.031392] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 467.031403] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 467.031414] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd ** 325 printk messages dropped ** [ 467.035082] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 [ 467.035093] [15328] 0 15328 17651 12626 30 3 0 1000 syz-executor3 [ 467.035103] [15429] 0 15429 17651 12627 31 3 0 1000 syz-executor1 [ 467.035114] [15596] 0 15596 5365 169 15 3 0 -1000 udevd [ 467.035125] [15782] 0 15782 17618 8234 25 3 0 1000 syz-executor1 [ 467.035135] [15853] 0 15853 17618 8234 25 3 0 1000 syz-executor1 [ 467.035162] [15904] 0 15904 17651 12653 31 3 0 1000 syz-executor5 [ 467.035172] [15926] 0 15926 17618 8234 25 3 0 1000 syz-executor1 [ 467.035183] [16005] 0 16005 17618 8233 26 3 0 1000 syz-executor0 [ 467.035194] [16024] 0 16024 17651 12741 31 3 0 1000 syz-executor5 [ 467.035204] [16063] 0 16063 17618 8233 26 3 0 1000 syz-executor0 [ 467.035215] [16116] 0 16116 17618 8232 25 3 0 1000 syz-executor0 [ 467.035225] [16167] 0 16167 17618 8232 25 3 0 1000 syz-executor0 [ 467.035236] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 467.035247] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 [ 467.035258] [16291] 0 16291 17618 8233 26 3 0 1000 syz-executor0 [ 467.035269] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 467.035279] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 [ 467.035290] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 467.035301] [16384] 0 16384 17684 17647 40 4 0 1000 syz-executor5 [ 467.035312] [16388] 0 16388 17651 10008 29 4 0 1000 syz-executor0 [ 467.035323] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 467.035333] [16415] 0 16415 17651 13389 33 4 0 1000 syz-executor1 [ 467.035344] [16426] 0 16426 17651 12771 31 3 0 1000 syz-executor5 [ 467.035350] Out of memory: Kill process 16384 (syz-executor5) score 1010 or sacrifice child [ 467.035386] Killed process 16426 (syz-executor5) total-vm:70604kB, anon-rss:18316kB, file-rss:32768kB, shmem-rss:0kB [ 467.077004] syz-executor1 invoked oom-killer: gfp_mask=0x14201ca(GFP_HIGHUSER_MOVABLE|__GFP_COLD), nodemask=(null), order=0, oom_score_adj=1000 [ 467.077023] CPU: 1 PID: 16422 Comm: syz-executor1 Not tainted 4.14.88+ #23 [ 467.077026] Call Trace: [ 467.077042] dump_stack+0xb9/0x11b [ 467.077058] dump_header+0x17d/0x7a8 [ 467.077068] ? trace_hardirqs_on_caller+0x381/0x520 [ 467.077080] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 467.077089] ? ___ratelimit+0x4f/0x3f0 [ 467.077105] oom_kill_process.cold.8+0x10/0xc88 [ 467.077116] ? lock_downgrade+0x560/0x560 [ 467.077144] ? check_preemption_disabled+0x34/0x1e0 [ 467.077162] out_of_memory+0x669/0xa60 [ 467.077177] ? oom_killer_disable+0x1f0/0x1f0 [ 467.077202] __alloc_pages_nodemask+0x182f/0x2180 [ 467.077228] ? check_preemption_disabled+0x34/0x1e0 [ 467.077242] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 467.077255] ? find_get_entry+0x118/0x550 [ 467.077270] ? __radix_tree_lookup+0x220/0x220 [ 467.077281] ? check_preemption_disabled+0x34/0x1e0 [ 467.077297] ? find_get_entry+0x13f/0x550 [ 467.077317] ? pagecache_get_page+0x129/0x770 [ 467.077334] filemap_fault+0xcdd/0x14a0 [ 467.077365] ext4_filemap_fault+0x7d/0xb0 [ 467.077376] __do_fault+0x80/0x210 [ 467.077389] __handle_mm_fault+0x991/0x25f0 [ 467.077406] ? vm_insert_page+0x6d0/0x6d0 [ 467.077422] ? follow_p4d_mask.isra.5+0x76f/0x1000 [ 467.077450] ? check_preemption_disabled+0x34/0x1e0 [ 467.077468] handle_mm_fault+0x3d5/0x6eb [ 467.077481] __get_user_pages+0x35d/0xe20 [ 467.077505] populate_vma_page_range+0x17a/0x210 [ 467.077523] __mm_populate+0x1bf/0x300 [ 467.077539] ? populate_vma_page_range+0x210/0x210 [ 467.077546] ? do_mlock+0x5c0/0x5c0 [ 467.077558] ? security_capable+0x8e/0xc0 [ 467.077576] SyS_mlockall+0x3e2/0x510 [ 467.077585] ? SyS_munlock+0xf0/0xf0 [ 467.077594] do_syscall_64+0x19b/0x4b0 [ 467.077612] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 467.077619] RIP: 0033:0x457659 [ 467.077623] RSP: 002b:00007f989f19bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 467.077632] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457659 [ 467.077637] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 467.077642] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 12:28:25 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:25 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) 12:28:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 467.077647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f989f19c6d4 [ 467.077657] R13: 00000000004c2d35 R14: 00000000004d5060 R15: 00000000ffffffff [ 467.077804] Mem-Info: [ 467.077822] active_anon:96940 inactive_anon:1282877 isolated_anon:0 [ 467.077822] active_file:19 inactive_file:17 isolated_file:0 12:28:25 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 467.077822] unevictable:16520 dirty:0 writeback:0 unstable:0 [ 467.077822] slab_reclaimable:8061 slab_unreclaimable:83695 [ 467.077822] mapped:55639 shmem:338 pagetables:10731 bounce:0 [ 467.077822] free:5899 free_pcp:258 free_cma:0 [ 467.077837] Node 0 active_anon:387760kB inactive_anon:5131508kB active_file:76kB inactive_file:68kB unevictable:66080kB isolated(anon):0kB isolated(file):0kB mapped:222556kB dirty:0kB writeback:0kB shmem:1352kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 467.077856] DMA32 free:18108kB min:4684kB low:7692kB high:10700kB active_anon:2812kB inactive_anon:2574908kB active_file:408kB inactive_file:104kB unevictable:30476kB writepending:0kB present:3145324kB managed:3012120kB mlocked:30800kB kernel_stack:5536kB pagetables:18660kB bounce:0kB free_pcp:780kB local_pcp:660kB free_cma:0kB [ 467.077859] lowmem_reserve[]: 0 3505 3505 [ 467.077887] Normal free:5488kB min:5588kB low:9176kB high:12764kB active_anon:384848kB inactive_anon:2556676kB active_file:372kB inactive_file:308kB unevictable:34996kB writepending:0kB present:4718592kB managed:3589232kB mlocked:34996kB kernel_stack:8000kB pagetables:24264kB bounce:0kB free_pcp:252kB local_pcp:252kB free_cma:0kB [ 467.077889] lowmem_reserve[]: 0 0 0 [ 467.077902] DMA32: 27*4kB (UMH) 25*8kB (UEH) 36*16kB (UH) 400*32kB (UEH) 73*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18356kB [ 467.077958] Normal: 71*4kB (UMH) 53*8kB (UMH) 260*16kB (UMEH) 24*32kB (UEH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5636kB [ 467.078011] 6866 total pagecache pages [ 467.078021] 0 pages in swap cache [ 467.078027] Swap cache stats: add 0, delete 0, find 0/0 [ 467.078030] Free swap = 0kB [ 467.078033] Total swap = 0kB [ 467.078037] 1965979 pages RAM [ 467.078040] 0 pages HighMem/MovableOnly [ 467.078043] 315641 pages reserved [ 467.078048] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 467.078068] [ 190] 0 190 5366 168 15 3 0 -1000 udevd [ 467.078081] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 467.078095] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 467.078107] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 467.078119] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 467.078132] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 467.078153] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 467.078166] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 467.078178] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 467.078190] [ 1776] 0 1776 124934 91904 206 5 0 0 syz-fuzzer [ 467.078203] [ 1832] 0 1832 17553 25 22 3 0 0 syz-executor0 [ 467.078215] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 467.078227] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 467.078239] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 467.078251] [ 1837] 0 1837 17552 8280 23 4 0 0 syz-executor0 [ 467.078263] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 467.078276] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 467.078288] [ 1843] 0 1843 17552 8246 23 4 0 0 syz-executor1 [ 467.078300] [ 1846] 0 1846 17552 8268 23 4 0 0 syz-executor5 [ 467.078313] [ 1847] 0 1847 17552 8249 22 4 0 0 syz-executor3 [ 467.078325] [ 1848] 0 1848 17552 8268 23 4 0 0 syz-executor4 [ 467.078338] [ 1849] 0 1849 17552 8232 23 4 0 0 syz-executor2 [ 467.078352] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 467.078364] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 467.078377] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 12:28:25 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) 12:28:25 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:25 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 467.078389] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 467.078402] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd 12:28:26 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 467.078414] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 467.078427] [ 4829] 0 4829 17620 8257 25 4 0 1000 syz-executor3 [ 467.078441] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 467.078453] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 467.078466] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 467.078479] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 467.078491] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 467.078503] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 467.078516] [ 5634] 0 5634 17651 12714 32 3 0 1000 syz-executor0 [ 467.078528] [ 5707] 0 5707 17651 12714 32 3 0 1000 syz-executor0 ** 70 printk messages dropped ** [ 467.079546] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 ** 225 printk messages dropped ** [ 467.086164] [15596] 0 15596 5365 169 15 3 0 -1000 udevd [ 467.086177] [15782] 0 15782 17618 8234 25 3 0 1000 syz-executor1 [ 467.086190] [15853] 0 15853 17618 8234 25 3 0 1000 syz-executor1 [ 467.086202] [15904] 0 15904 17651 12653 31 3 0 1000 syz-executor5 [ 467.086214] [15926] 0 15926 17618 8234 25 3 0 1000 syz-executor1 12:28:26 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 12:28:26 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 467.086226] [16005] 0 16005 17618 8233 26 3 0 1000 syz-executor0 [ 467.086239] [16024] 0 16024 17651 12741 31 3 0 1000 syz-executor5 [ 467.086253] [16063] 0 16063 17618 8233 26 3 0 1000 syz-executor0 [ 467.086266] [16116] 0 16116 17618 8232 25 3 0 1000 syz-executor0 [ 467.086278] [16167] 0 16167 17618 8232 25 3 0 1000 syz-executor0 [ 467.086291] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 467.086302] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 [ 467.086314] [16291] 0 16291 17618 8233 26 3 0 1000 syz-executor0 [ 467.086327] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 467.086339] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 [ 467.086352] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 467.086364] [16384] 0 16384 17684 17647 40 4 0 1000 syz-executor5 [ 467.086375] [16388] 0 16388 17651 10008 29 4 0 1000 syz-executor0 [ 467.086388] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 467.086400] [16415] 0 16415 17651 13389 33 4 0 1000 syz-executor1 [ 467.086410] Out of memory: Kill process 16384 (syz-executor5) score 1010 or sacrifice child [ 467.086467] Killed process 16384 (syz-executor5) total-vm:70736kB, anon-rss:18324kB, file-rss:52264kB, shmem-rss:0kB ** 122 printk messages dropped ** [ 467.131048] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 ** 271 printk messages dropped ** [ 467.135793] [15853] 0 15853 17618 8234 25 3 0 1000 syz-executor1 [ 467.135803] [15904] 0 15904 17651 12653 31 3 0 1000 syz-executor5 [ 467.135813] [15926] 0 15926 17618 8234 25 3 0 1000 syz-executor1 ** 335 printk messages dropped ** [ 468.372608] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 ** 82 printk messages dropped ** [ 468.374360] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 468.374371] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 [ 468.374383] [16291] 0 16291 17618 8233 26 3 0 1000 syz-executor0 [ 468.374394] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 468.374405] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 12:28:26 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:26 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 468.374417] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 468.374428] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 468.374440] [16433] 0 16433 17651 9622 28 4 0 1000 syz-executor0 [ 468.374451] [16437] 0 16437 17618 15679 37 4 0 1000 syz-executor1 12:28:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:26 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:26 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 468.374462] [16441] 0 16441 17651 14592 35 4 0 1000 syz-executor5 12:28:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:26 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 12:28:26 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 468.374473] [16447] 0 16447 17618 8233 26 3 0 1000 syz-executor0 [ 468.374480] Out of memory: Kill process 16437 (syz-executor1) score 1008 or sacrifice child [ 468.374519] Killed process 16437 (syz-executor1) total-vm:70472kB, anon-rss:17764kB, file-rss:44952kB, shmem-rss:0kB [ 468.404760] oom_reaper: reaped process 16437 (syz-executor1), now anon-rss:17832kB, file-rss:13792kB, shmem-rss:0kB [ 469.922474] udevd invoked oom-killer: gfp_mask=0x14040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null), order=1, oom_score_adj=-1000 [ 469.922492] CPU: 1 PID: 4768 Comm: udevd Not tainted 4.14.88+ #23 [ 469.922495] Call Trace: [ 469.922509] dump_stack+0xb9/0x11b [ 469.922524] dump_header+0x17d/0x7a8 [ 469.922533] ? trace_hardirqs_on_caller+0x381/0x520 [ 469.922543] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 469.922553] ? ___ratelimit+0x4f/0x3f0 [ 469.922568] oom_kill_process.cold.8+0x10/0xc88 [ 469.922578] ? lock_downgrade+0x560/0x560 [ 469.922593] ? check_preemption_disabled+0x34/0x1e0 [ 469.922610] out_of_memory+0x669/0xa60 [ 469.922623] ? oom_killer_disable+0x1f0/0x1f0 [ 469.922646] __alloc_pages_nodemask+0x182f/0x2180 ** 1 printk messages dropped ** [ 469.922678] ? kvfree+0x58/0x80 ** 247 printk messages dropped ** [ 469.925668] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 ** 146 printk messages dropped ** [ 469.927230] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 469.927241] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 ** 95 printk messages dropped ** [ 470.217601] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 ** 175 printk messages dropped ** [ 470.222294] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 ** 144 printk messages dropped ** [ 470.227285] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 470.227295] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 470.227305] [16447] 0 16447 17618 8233 26 3 0 1000 syz-executor0 [ 470.227316] [16475] 0 16475 17651 12771 31 3 0 1000 syz-executor5 [ 470.227326] [16482] 0 16482 17651 17646 40 4 0 1000 syz-executor1 ** 414 printk messages dropped ** [ 470.296303] [16167] 0 16167 17618 8232 25 3 0 1000 syz-executor0 [ 470.296314] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 470.296325] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 [ 470.296336] [16291] 0 16291 17618 8233 26 3 0 1000 syz-executor0 [ 470.296346] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 470.296358] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 12:28:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 470.296369] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 470.296380] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 470.296392] [16447] 0 16447 17618 8233 26 3 0 1000 syz-executor0 [ 470.296403] [16475] 0 16475 17651 12771 31 3 0 1000 syz-executor5 [ 470.296418] [16493] 0 16493 17618 11976 30 4 0 1000 syz-executor5 [ 470.296428] [16502] 0 16502 5365 168 14 3 0 -1000 udevd [ 470.296439] [16503] 0 16503 5365 168 14 3 0 -1000 udevd [ 470.296450] [16504] 0 16504 17552 8215 21 3 0 0 syz-executor3 [ 470.296460] [16505] 0 16505 17552 8216 22 3 0 0 syz-executor0 [ 470.296471] [16506] 0 16506 17552 8215 22 3 0 0 syz-executor2 [ 470.296527] Out of memory: Kill process 16475 (syz-executor5) score 1007 or sacrifice child [ 470.296578] Killed process 16475 (syz-executor5) total-vm:70604kB, anon-rss:18316kB, file-rss:32768kB, shmem-rss:0kB [ 470.461422] oom_reaper: reaped process 16475 (syz-executor5), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 470.896973] syz-executor1 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 470.900435] CPU: 1 PID: 16523 Comm: syz-executor1 Not tainted 4.14.88+ #23 [ 470.900439] Call Trace: [ 470.900454] dump_stack+0xb9/0x11b [ 470.900469] dump_header+0x17d/0x7a8 [ 470.900478] ? trace_hardirqs_on_caller+0x381/0x520 [ 470.900488] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 470.900497] ? ___ratelimit+0x4f/0x3f0 [ 470.900512] oom_kill_process.cold.8+0x10/0xc88 [ 470.900528] ? lock_downgrade+0x560/0x560 [ 470.900543] ? check_preemption_disabled+0x34/0x1e0 [ 470.900559] out_of_memory+0x669/0xa60 [ 470.900573] ? oom_killer_disable+0x1f0/0x1f0 [ 470.900598] __alloc_pages_nodemask+0x182f/0x2180 [ 470.900630] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 470.900641] ? trace_hardirqs_on+0x10/0x10 [ 470.900648] ? check_preemption_disabled+0x34/0x1e0 [ 470.900661] ? copy_process.part.6+0x1435/0x6530 [ 470.900700] ? rcu_read_lock_sched_held+0x102/0x120 [ 470.900715] copy_process.part.6+0x267/0x6530 [ 470.900730] ? __handle_mm_fault+0xdab/0x25f0 [ 470.900739] ? lock_downgrade+0x560/0x560 [ 470.900751] ? __lru_cache_add+0x174/0x250 [ 470.900781] ? __cleanup_sighand+0x40/0x40 [ 470.900787] ? vm_insert_page+0x6d0/0x6d0 [ 470.900794] ? HARDIRQ_verbose+0x10/0x10 [ 470.900826] _do_fork+0x1c2/0xd50 [ 470.900853] ? fork_idle+0x250/0x250 [ 470.900864] ? up_read+0x17/0x30 [ 470.900873] ? __do_page_fault+0x64c/0xb60 [ 470.900889] ? do_syscall_64+0x43/0x4b0 [ 470.900902] ? sys_vfork+0x20/0x20 [ 470.900908] do_syscall_64+0x19b/0x4b0 [ 470.900926] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 470.900932] RIP: 0033:0x45a029 [ 470.900936] RSP: 002b:00007ffe3f2bf238 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 470.900945] RAX: ffffffffffffffda RBX: 00007f989f17b700 RCX: 000000000045a029 [ 470.900950] RDX: 00007f989f17b9d0 RSI: 00007f989f17adb0 RDI: 00000000003d0f00 [ 470.900955] RBP: 00007ffe3f2bf440 R08: 00007f989f17b700 R09: 00007f989f17b700 [ 470.900960] R10: 00007f989f17b9d0 R11: 0000000000000202 R12: 0000000000000000 [ 470.900965] R13: 00007ffe3f2bf2ef R14: 00007f989f17b9c0 R15: 000000000072c04c [ 470.902172] Mem-Info: [ 470.902187] active_anon:97016 inactive_anon:1282872 isolated_anon:0 [ 470.902187] active_file:26 inactive_file:10 isolated_file:0 [ 470.902187] unevictable:16878 dirty:8 writeback:0 unstable:0 [ 470.902187] slab_reclaimable:7938 slab_unreclaimable:83661 [ 470.902187] mapped:56848 shmem:339 pagetables:10748 bounce:0 [ 470.902187] free:6847 free_pcp:124 free_cma:0 [ 470.902200] Node 0 active_anon:388064kB inactive_anon:5131488kB active_file:104kB inactive_file:40kB unevictable:67512kB isolated(anon):0kB isolated(file):0kB mapped:227392kB dirty:32kB writeback:0kB shmem:1356kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 470.902216] DMA32 free:21484kB min:4684kB low:7692kB high:10700kB active_anon:3100kB inactive_anon:2574944kB active_file:392kB inactive_file:844kB unevictable:33312kB writepending:8kB present:3145324kB managed:3012120kB mlocked:33312kB kernel_stack:5696kB pagetables:18980kB bounce:0kB free_pcp:192kB local_pcp:40kB free_cma:0kB [ 470.902218] lowmem_reserve[]: 0 3505 3505 [ 470.902241] Normal free:5904kB min:5588kB low:9176kB high:12764kB active_anon:385184kB inactive_anon:2556544kB active_file:848kB inactive_file:648kB unevictable:33652kB writepending:176kB present:4718592kB managed:3589232kB mlocked:33652kB kernel_stack:7968kB pagetables:24012kB bounce:0kB free_pcp:304kB local_pcp:68kB free_cma:0kB [ 470.902243] lowmem_reserve[]: 0 0 0 [ 470.902253] DMA32: 177*4kB (UH) 250*8kB (UEH) 82*16kB (UEH) 322*32kB (UEH) 110*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 21364kB [ 470.902300] Normal: 7*4kB (UH) 60*8kB (MH) 301*16kB (UMH) 10*32kB (UMEH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5644kB [ 470.902343] 8072 total pagecache pages [ 470.902351] 0 pages in swap cache [ 470.902355] Swap cache stats: add 0, delete 0, find 0/0 [ 470.902358] Free swap = 0kB [ 470.902366] Total swap = 0kB [ 470.902368] 1965979 pages RAM [ 470.902371] 0 pages HighMem/MovableOnly [ 470.902373] 315641 pages reserved [ 470.902376] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 470.902394] [ 190] 0 190 5366 168 15 3 0 -1000 udevd [ 470.902406] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 470.902420] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 470.902430] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 470.902441] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 470.902451] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 470.902461] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 470.902471] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 470.902481] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 470.902491] [ 1776] 0 1776 124934 91904 206 5 0 0 syz-fuzzer [ 470.902502] [ 1832] 0 1832 17553 25 22 3 0 0 syz-executor0 [ 470.902513] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 470.902523] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 470.902534] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 470.902544] [ 1837] 0 1837 17552 8249 23 4 0 0 syz-executor0 [ 470.902583] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 470.903409] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 470.903420] [ 1843] 0 1843 17552 8221 23 4 0 0 syz-executor1 [ 470.903429] [ 1846] 0 1846 17552 8234 23 4 0 0 syz-executor5 [ 470.903439] [ 1847] 0 1847 17552 8231 22 4 0 0 syz-executor3 [ 470.903449] [ 1848] 0 1848 17552 8236 23 4 0 0 syz-executor4 [ 470.903460] [ 1849] 0 1849 17552 8259 23 4 0 0 syz-executor2 [ 470.903471] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 470.903481] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 470.903491] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 470.903501] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 470.903512] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd [ 470.903522] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 470.903533] [ 4829] 0 4829 17620 8257 25 4 0 1000 syz-executor3 [ 470.903545] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 470.903555] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 12:28:28 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) 12:28:28 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="00000080"]) 12:28:28 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:28 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:28 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 470.903565] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 470.903576] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 470.903586] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 12:28:28 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) 12:28:28 executing program 2: [ 470.903596] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 470.903606] [ 5634] 0 5634 17651 12714 32 3 0 1000 syz-executor0 12:28:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 470.903616] [ 5707] 0 5707 17651 12714 32 3 0 1000 syz-executor0 [ 470.903626] [ 5781] 0 5781 17651 12714 32 3 0 1000 syz-executor0 [ 470.903636] [ 5845] 0 5845 17651 12714 32 3 0 1000 syz-executor0 [ 470.903646] [ 5901] 0 5901 17651 12714 32 3 0 1000 syz-executor0 [ 470.903661] [ 5970] 0 5970 17651 12714 32 3 0 1000 syz-executor0 [ 470.904391] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 470.904402] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 470.904412] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 12:28:28 executing program 2: [ 470.904422] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 470.904434] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 ** 296 printk messages dropped ** [ 470.917375] [16167] 0 16167 17618 8232 25 3 0 1000 syz-executor0 [ 470.917386] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 470.917396] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 [ 470.917406] [16291] 0 16291 17618 8233 26 3 0 1000 syz-executor0 [ 470.917416] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 470.917426] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 [ 470.917437] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 470.917447] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 470.917457] [16447] 0 16447 17618 8233 26 3 0 1000 syz-executor0 [ 470.917467] [16493] 0 16493 17651 17395 40 4 0 1000 syz-executor5 [ 470.917477] [16505] 0 16505 17651 9294 28 4 0 1000 syz-executor0 [ 470.917488] [16511] 0 16511 17618 8233 26 3 0 1000 syz-executor0 [ 470.917498] [16523] 0 16523 17651 14557 36 4 0 1000 syz-executor1 [ 470.917508] [16540] 0 16540 17651 12771 30 3 0 1000 syz-executor5 [ 470.917526] Out of memory: Kill process 16493 (syz-executor5) score 1010 or sacrifice child [ 470.917551] Killed process 16540 (syz-executor5) total-vm:70604kB, anon-rss:18316kB, file-rss:32768kB, shmem-rss:0kB 12:28:29 executing program 2: 12:28:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:29 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 470.945108] oom_reaper: reaped process 16540 (syz-executor5), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 470.972460] syz-executor0 invoked oom-killer: gfp_mask=0x14280ca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=1000 [ 470.972567] CPU: 1 PID: 16517 Comm: syz-executor0 Not tainted 4.14.88+ #23 [ 470.972571] Call Trace: [ 470.972588] dump_stack+0xb9/0x11b [ 470.972604] dump_header+0x17d/0x7a8 [ 470.972613] ? trace_hardirqs_on_caller+0x381/0x520 [ 470.972624] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 470.972634] ? ___ratelimit+0x4f/0x3f0 [ 470.972650] oom_kill_process.cold.8+0x10/0xc88 [ 470.972661] ? lock_downgrade+0x560/0x560 [ 470.972672] ? oom_evaluate_task.part.6+0xa0/0x420 [ 470.972683] ? check_preemption_disabled+0x34/0x1e0 [ 470.972701] out_of_memory+0x669/0xa60 [ 470.972715] ? oom_killer_disable+0x1f0/0x1f0 [ 470.972741] __alloc_pages_nodemask+0x182f/0x2180 [ 470.972765] ? mark_held_locks+0xc2/0x130 [ 470.972779] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 470.972791] ? __lock_acquire+0x619/0x4320 [ 470.972800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.972816] ? __lock_acquire+0x619/0x4320 [ 470.972845] ? trace_hardirqs_on+0x10/0x10 [ 470.972863] ? trace_hardirqs_on+0x10/0x10 [ 470.972871] ? check_preemption_disabled+0x34/0x1e0 [ 470.972889] __handle_mm_fault+0x1113/0x25f0 [ 470.972906] ? vm_insert_page+0x6d0/0x6d0 [ 470.972921] ? follow_p4d_mask.isra.5+0x76f/0x1000 [ 470.972949] ? check_preemption_disabled+0x34/0x1e0 [ 470.972967] handle_mm_fault+0x3d5/0x6eb [ 470.972980] __get_user_pages+0x35d/0xe20 [ 470.973005] populate_vma_page_range+0x17a/0x210 [ 470.973021] __mm_populate+0x1bf/0x300 [ 470.973037] ? populate_vma_page_range+0x210/0x210 [ 470.973044] ? do_mlock+0x5c0/0x5c0 [ 470.973057] ? security_capable+0x8e/0xc0 [ 470.973076] SyS_mlockall+0x3e2/0x510 [ 470.973085] ? SyS_munlock+0xf0/0xf0 [ 470.973093] do_syscall_64+0x19b/0x4b0 [ 470.973112] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 470.973118] RIP: 0033:0x457659 [ 470.973123] RSP: 002b:00007fafdb3dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 470.973132] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457659 [ 470.973137] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 470.973142] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 470.973147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fafdb3df6d4 [ 470.973153] R13: 00000000004c2d35 R14: 00000000004d5060 R15: 00000000ffffffff [ 470.973339] Mem-Info: [ 470.973381] active_anon:97016 inactive_anon:1282872 isolated_anon:0 [ 470.973381] active_file:26 inactive_file:0 isolated_file:0 [ 470.973381] unevictable:17653 dirty:8 writeback:0 unstable:0 [ 470.973381] slab_reclaimable:7938 slab_unreclaimable:83661 [ 470.973381] mapped:57348 shmem:339 pagetables:10748 bounce:0 [ 470.973381] free:5969 free_pcp:0 free_cma:0 [ 470.973416] Node 0 active_anon:388064kB inactive_anon:5131488kB active_file:104kB inactive_file:0kB unevictable:70612kB isolated(anon):0kB isolated(file):0kB mapped:229392kB dirty:32kB writeback:0kB shmem:1356kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no ** 91 printk messages dropped ** [ 470.980215] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 ** 263 printk messages dropped ** [ 471.002722] [16063] 0 16063 17618 8233 26 3 0 1000 syz-executor0 [ 471.002763] [16116] 0 16116 17618 8232 25 3 0 1000 syz-executor0 [ 471.002880] [16167] 0 16167 17618 8232 25 3 0 1000 syz-executor0 [ 471.003061] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 471.003102] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 ** 413 printk messages dropped ** [ 471.071148] [16116] 0 16116 17618 8232 25 3 0 1000 syz-executor0 [ 471.071159] [16167] 0 16167 17618 8232 25 3 0 1000 syz-executor0 [ 471.071170] [16248] 0 16248 17618 8232 25 3 0 1000 syz-executor0 [ 471.071181] [16255] 0 16255 17618 8235 25 3 0 1000 syz-executor5 [ 471.071192] [16291] 0 16291 17618 8233 26 3 0 1000 syz-executor0 [ 471.071204] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 471.071215] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 [ 471.071226] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 471.071237] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 471.071248] [16447] 0 16447 17618 8233 26 3 0 1000 syz-executor0 [ 471.071260] [16505] 0 16505 17651 9422 28 4 0 1000 syz-executor0 [ 471.071276] [16511] 0 16511 17618 8233 26 3 0 1000 syz-executor0 [ 471.071408] [16523] 0 16523 17651 15517 37 4 0 1000 syz-executor1 [ 471.071417] Out of memory: Kill process 16523 (syz-executor1) score 1008 or sacrifice child [ 471.071449] Killed process 16523 (syz-executor1) total-vm:70604kB, anon-rss:17764kB, file-rss:44304kB, shmem-rss:0kB [ 471.078067] oom_reaper: reaped process 16523 (syz-executor1), now anon-rss:17756kB, file-rss:11536kB, shmem-rss:0kB [ 472.438293] syz-executor0 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 472.438310] CPU: 1 PID: 16566 Comm: syz-executor0 Not tainted 4.14.88+ #23 [ 472.438313] Call Trace: [ 472.438328] dump_stack+0xb9/0x11b [ 472.438343] dump_header+0x17d/0x7a8 [ 472.438351] ? trace_hardirqs_on_caller+0x381/0x520 [ 472.438361] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 472.438370] ? ___ratelimit+0x4f/0x3f0 [ 472.438384] oom_kill_process.cold.8+0x10/0xc88 [ 472.438394] ? lock_downgrade+0x560/0x560 [ 472.438409] ? check_preemption_disabled+0x34/0x1e0 [ 472.438426] out_of_memory+0x669/0xa60 [ 472.438439] ? oom_killer_disable+0x1f0/0x1f0 [ 472.438464] __alloc_pages_nodemask+0x182f/0x2180 [ 472.438494] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 472.438510] ? ___slab_alloc.constprop.35+0x1b6/0x480 [ 472.438520] ? copy_process.part.6+0x1435/0x6530 [ 472.438559] ? rcu_read_lock_sched_held+0x102/0x120 [ 472.438573] copy_process.part.6+0x267/0x6530 [ 472.438587] ? __handle_mm_fault+0xdab/0x25f0 [ 472.438598] ? lock_downgrade+0x560/0x560 [ 472.438607] ? __lru_cache_add+0x174/0x250 [ 472.438633] ? __cleanup_sighand+0x40/0x40 [ 472.438639] ? vm_insert_page+0x6d0/0x6d0 [ 472.438645] ? HARDIRQ_verbose+0x10/0x10 [ 472.438675] _do_fork+0x1c2/0xd50 [ 472.438691] ? fork_idle+0x250/0x250 [ 472.438702] ? up_read+0x17/0x30 [ 472.438710] ? __do_page_fault+0x64c/0xb60 [ 472.438744] ? do_syscall_64+0x43/0x4b0 [ 472.438756] ? sys_vfork+0x20/0x20 [ 472.438761] do_syscall_64+0x19b/0x4b0 [ 472.438776] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 472.438782] RIP: 0033:0x45a029 [ 472.438786] RSP: 002b:00007fff00e8e478 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 472.438800] RAX: ffffffffffffffda RBX: 00007fafdb421700 RCX: 000000000045a029 [ 472.438804] RDX: 00007fafdb4219d0 RSI: 00007fafdb420db0 RDI: 00000000003d0f00 [ 472.438809] RBP: 00007fff00e8e680 R08: 00007fafdb421700 R09: 00007fafdb421700 [ 472.438813] R10: 00007fafdb4219d0 R11: 0000000000000202 R12: 0000000000000000 [ 472.438817] R13: 00007fff00e8e52f R14: 00007fafdb4219c0 R15: 000000000072bf0c [ 472.438840] Mem-Info: [ 472.438856] active_anon:97017 inactive_anon:1282875 isolated_anon:0 [ 472.438856] active_file:166 inactive_file:338 isolated_file:6 [ 472.438856] unevictable:15700 dirty:7 writeback:0 unstable:0 [ 472.438856] slab_reclaimable:7944 slab_unreclaimable:83512 [ 472.438856] mapped:56357 shmem:339 pagetables:10595 bounce:0 [ 472.438856] free:7014 free_pcp:28 free_cma:0 [ 472.438869] Node 0 active_anon:388068kB inactive_anon:5131500kB active_file:664kB inactive_file:1352kB unevictable:62800kB isolated(anon):0kB isolated(file):24kB mapped:225428kB dirty:28kB writeback:0kB shmem:1356kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 472.438885] DMA32 free:21492kB min:4684kB low:7692kB high:10700kB active_anon:2872kB inactive_anon:2574940kB active_file:448kB inactive_file:620kB unevictable:32272kB writepending:76kB present:3145324kB managed:3012120kB mlocked:32272kB kernel_stack:5568kB pagetables:18296kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 472.438887] lowmem_reserve[]: 0 3505 3505 [ 472.438910] Normal free:6564kB min:5588kB low:9176kB high:12764kB active_anon:385196kB inactive_anon:2556560kB active_file:1016kB inactive_file:988kB unevictable:29096kB writepending:152kB present:4718592kB managed:3589232kB mlocked:29096kB kernel_stack:8000kB pagetables:24084kB bounce:0kB free_pcp:112kB local_pcp:4kB free_cma:0kB [ 472.438912] lowmem_reserve[]: 0 0 0 12:28:30 executing program 2: 12:28:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:30 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:30 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:30 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 12:28:30 executing program 2: [ 472.438923] DMA32: 158*4kB (UMH) 191*8kB (UMH) 79*16kB (UEH) 348*32kB (UEH) 113*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 21792kB [ 472.438970] Normal: 172*4kB (UMEH) 65*8kB (UMEH) 314*16kB (UMH) 7*32kB (UMH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6456kB [ 472.439014] 7629 total pagecache pages [ 472.439023] 0 pages in swap cache [ 472.439027] Swap cache stats: add 0, delete 0, find 0/0 12:28:30 executing program 2: [ 472.439029] Free swap = 0kB [ 472.439032] Total swap = 0kB [ 472.439035] 1965979 pages RAM [ 472.439037] 0 pages HighMem/MovableOnly [ 472.439040] 315641 pages reserved 12:28:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 12:28:30 executing program 2: getrusage(0x0, &(0x7f0000001480)) [ 472.439043] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 472.439062] [ 190] 0 190 5366 319 15 3 0 -1000 udevd 12:28:30 executing program 2: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ff8000/0x4000)=nil) [ 472.439073] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 472.439084] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 472.439095] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 472.439106] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 472.439117] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 472.439128] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 472.439139] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 472.439149] [ 1774] 0 1774 17821 292 40 3 0 0 sshd [ 472.439161] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 472.439172] [ 1832] 0 1832 17553 25 22 3 0 0 syz-executor0 [ 472.439183] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 472.439193] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 472.439204] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 472.439213] [ 1837] 0 1837 17552 8246 23 4 0 0 syz-executor0 [ 472.439222] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 472.439232] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 472.439249] [ 1843] 0 1843 17552 8221 23 4 0 0 syz-executor1 [ 472.439259] [ 1846] 0 1846 17552 8232 23 4 0 0 syz-executor5 [ 472.439269] [ 1847] 0 1847 17552 8216 22 4 0 0 syz-executor3 [ 472.439278] [ 1848] 0 1848 17552 8269 23 4 0 0 syz-executor4 [ 472.439288] [ 1849] 0 1849 17552 8266 23 4 0 0 syz-executor2 [ 472.439299] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 472.439308] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 472.439318] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 472.439330] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 472.439341] [ 4768] 0 4768 5365 377 15 3 0 -1000 udevd [ 472.439352] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 ** 54 printk messages dropped ** [ 472.439949] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 ** 170 printk messages dropped ** [ 472.445596] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 ** 92 printk messages dropped ** [ 472.460414] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 472.460425] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 [ 472.460436] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 472.460447] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 472.460458] [16447] 0 16447 17618 8233 26 3 0 1000 syz-executor0 [ 472.460469] [16511] 0 16511 17618 8233 26 3 0 1000 syz-executor0 [ 472.460481] [16554] 0 16554 17618 17356 40 4 0 1000 syz-executor1 [ 472.460491] [16556] 0 16556 17651 14513 35 4 0 1000 syz-executor5 [ 472.460501] [16566] 0 16566 17585 8214 24 4 0 1000 syz-executor0 [ 472.460512] [16568] 0 16568 17585 8214 22 4 0 1000 syz-executor3 [ 472.460521] [16569] 0 16569 17618 8231 27 4 0 1000 syz-executor4 [ 472.460531] [16570] 0 16570 5365 168 14 3 0 -1000 udevd [ 472.460538] Out of memory: Kill process 16554 (syz-executor1) score 1010 or sacrifice child [ 472.460586] Killed process 16554 (syz-executor1) total-vm:70472kB, anon-rss:17880kB, file-rss:51544kB, shmem-rss:0kB [ 472.491907] oom_reaper: reaped process 16554 (syz-executor1), now anon-rss:18072kB, file-rss:19488kB, shmem-rss:0kB [ 473.371815] syz-executor1 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 473.371831] CPU: 1 PID: 16582 Comm: syz-executor1 Not tainted 4.14.88+ #23 [ 473.371835] Call Trace: [ 473.371848] dump_stack+0xb9/0x11b [ 473.371863] dump_header+0x17d/0x7a8 [ 473.371872] ? trace_hardirqs_on_caller+0x381/0x520 [ 473.371883] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 473.371891] ? ___ratelimit+0x4f/0x3f0 [ 473.371906] oom_kill_process.cold.8+0x10/0xc88 [ 473.371916] ? lock_downgrade+0x560/0x560 [ 473.371931] ? check_preemption_disabled+0x34/0x1e0 [ 473.371947] out_of_memory+0x669/0xa60 [ 473.371960] ? oom_killer_disable+0x1f0/0x1f0 [ 473.371985] __alloc_pages_nodemask+0x182f/0x2180 [ 473.372016] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 473.372027] ? trace_hardirqs_on+0x10/0x10 [ 473.372033] ? check_preemption_disabled+0x34/0x1e0 [ 473.372077] ? rcu_read_lock_sched_held+0x102/0x120 [ 473.372094] copy_process.part.6+0x267/0x6530 [ 473.372107] ? __handle_mm_fault+0xdab/0x25f0 [ 473.372117] ? lock_downgrade+0x560/0x560 [ 473.372128] ? __lru_cache_add+0x174/0x250 [ 473.372156] ? __cleanup_sighand+0x40/0x40 [ 473.372162] ? vm_insert_page+0x6d0/0x6d0 [ 473.372169] ? HARDIRQ_verbose+0x10/0x10 [ 473.372205] _do_fork+0x1c2/0xd50 [ 473.372221] ? fork_idle+0x250/0x250 [ 473.372232] ? up_read+0x17/0x30 [ 473.372241] ? __do_page_fault+0x64c/0xb60 [ 473.372255] ? do_syscall_64+0x43/0x4b0 [ 473.372268] ? sys_vfork+0x20/0x20 [ 473.372273] do_syscall_64+0x19b/0x4b0 [ 473.372290] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 473.372296] RIP: 0033:0x45a029 [ 473.372305] RSP: 002b:00007ffe3f2bf238 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 473.372314] RAX: ffffffffffffffda RBX: 00007f989f15a700 RCX: 000000000045a029 [ 473.372318] RDX: 00007f989f15a9d0 RSI: 00007f989f159db0 RDI: 00000000003d0f00 [ 473.372324] RBP: 00007ffe3f2bf440 R08: 00007f989f15a700 R09: 00007f989f15a700 [ 473.372328] R10: 00007f989f15a9d0 R11: 0000000000000202 R12: 0000000000000000 [ 473.372332] R13: 00007ffe3f2bf2ef R14: 00007f989f15a9c0 R15: 000000000072c0ec [ 473.372840] Mem-Info: [ 473.372858] active_anon:97065 inactive_anon:1287425 isolated_anon:0 [ 473.372858] active_file:24 inactive_file:74 isolated_file:0 [ 473.372858] unevictable:11952 dirty:0 writeback:0 unstable:0 [ 473.372858] slab_reclaimable:7906 slab_unreclaimable:83494 [ 473.372858] mapped:54564 shmem:341 pagetables:10702 bounce:0 [ 473.372858] free:7556 free_pcp:73 free_cma:0 [ 473.372871] Node 0 active_anon:388260kB inactive_anon:5149700kB active_file:96kB inactive_file:296kB unevictable:47808kB isolated(anon):0kB isolated(file):0kB mapped:218256kB dirty:0kB writeback:0kB shmem:1364kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no ** 361 printk messages dropped ** [ 473.391983] [16295] 0 16295 17618 8235 25 3 0 1000 syz-executor5 [ 473.391994] [16335] 0 16335 17618 8233 26 3 0 1000 syz-executor0 [ 473.392005] [16339] 0 16339 17618 8235 25 3 0 1000 syz-executor5 [ 473.392016] [16404] 0 16404 17618 8233 26 3 0 1000 syz-executor0 [ 473.392027] [16447] 0 16447 17618 8233 26 3 0 1000 syz-executor0 [ 473.392038] [16511] 0 16511 17618 8233 26 3 0 1000 syz-executor0 [ 473.392456] [16566] 0 16566 17651 11072 31 4 0 1000 syz-executor0 [ 473.392467] [16577] 0 16577 17618 8233 26 3 0 1000 syz-executor0 [ 473.392478] [16580] 0 16580 17684 12771 31 3 0 1000 syz-executor5 [ 473.392488] [16582] 0 16582 17684 17421 40 4 0 1000 syz-executor1 [ 473.392500] [16593] 0 16593 17651 12771 31 3 0 1000 syz-executor1 [ 473.392547] Out of memory: Kill process 16582 (syz-executor1) score 1010 or sacrifice child [ 473.392589] Killed process 16593 (syz-executor1) total-vm:70604kB, anon-rss:18316kB, file-rss:32768kB, shmem-rss:0kB [ 473.425327] oom_reaper: reaped process 16593 (syz-executor1), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 473.448562] syz-executor1 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 473.448577] CPU: 0 PID: 16582 Comm: syz-executor1 Not tainted 4.14.88+ #23 [ 473.448580] Call Trace: [ 473.448593] dump_stack+0xb9/0x11b [ 473.448607] dump_header+0x17d/0x7a8 [ 473.448615] ? trace_hardirqs_on_caller+0x381/0x520 [ 473.448624] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 473.448631] ? ___ratelimit+0x4f/0x3f0 [ 473.448645] oom_kill_process.cold.8+0x10/0xc88 [ 473.448663] ? lock_downgrade+0x560/0x560 [ 473.448682] ? check_preemption_disabled+0x34/0x1e0 [ 473.448697] out_of_memory+0x669/0xa60 [ 473.448709] ? oom_killer_disable+0x1f0/0x1f0 [ 473.448732] __alloc_pages_nodemask+0x182f/0x2180 [ 473.448760] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 473.448770] ? trace_hardirqs_on+0x10/0x10 [ 473.448776] ? check_preemption_disabled+0x34/0x1e0 [ 473.448816] ? rcu_read_lock_sched_held+0x102/0x120 [ 473.448831] copy_process.part.6+0x267/0x6530 12:28:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 12:28:31 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 473.448844] ? __handle_mm_fault+0xdab/0x25f0 [ 473.448853] ? lock_downgrade+0x560/0x560 [ 473.448863] ? __lru_cache_add+0x174/0x250 [ 473.448889] ? __cleanup_sighand+0x40/0x40 [ 473.448894] ? vm_insert_page+0x6d0/0x6d0 [ 473.448900] ? HARDIRQ_verbose+0x10/0x10 [ 473.448928] _do_fork+0x1c2/0xd50 [ 473.448943] ? fork_idle+0x250/0x250 [ 473.448953] ? up_read+0x17/0x30 [ 473.448961] ? __do_page_fault+0x64c/0xb60 [ 473.448974] ? do_syscall_64+0x43/0x4b0 [ 473.448985] ? sys_vfork+0x20/0x20 12:28:31 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:31 executing program 2: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') socket$packet(0x11, 0x0, 0x300) sendfile(r0, r1, 0x0, 0x88001) [ 473.448991] do_syscall_64+0x19b/0x4b0 [ 473.449007] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 473.449012] RIP: 0033:0x45a029 [ 473.449016] RSP: 002b:00007ffe3f2bf238 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 473.449024] RAX: ffffffffffffffda RBX: 00007f989f15a700 RCX: 000000000045a029 [ 473.449028] RDX: 00007f989f15a9d0 RSI: 00007f989f159db0 RDI: 00000000003d0f00 [ 473.449032] RBP: 00007ffe3f2bf440 R08: 00007f989f15a700 R09: 00007f989f15a700 [ 473.449036] R10: 00007f989f15a9d0 R11: 0000000000000202 R12: 0000000000000000 [ 473.449041] R13: 00007ffe3f2bf2ef R14: 00007f989f15a9c0 R15: 000000000072c0ec [ 473.449064] Mem-Info: [ 473.449079] active_anon:97065 inactive_anon:1287425 isolated_anon:0 [ 473.449079] active_file:32 inactive_file:26 isolated_file:0 [ 473.449079] unevictable:12277 dirty:0 writeback:0 unstable:0 [ 473.449079] slab_reclaimable:7906 slab_unreclaimable:83494 [ 473.449079] mapped:54564 shmem:341 pagetables:10702 bounce:0 [ 473.449079] free:6932 free_pcp:57 free_cma:0 [ 473.449091] Node 0 active_anon:388260kB inactive_anon:5149700kB active_file:128kB inactive_file:104kB unevictable:49108kB isolated(anon):0kB isolated(file):0kB mapped:218256kB dirty:0kB writeback:0kB shmem:1364kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 473.449106] DMA32 free:21488kB min:4684kB low:7692kB high:10700kB active_anon:3100kB inactive_anon:2587248kB active_file:156kB inactive_file:112kB unevictable:20860kB writepending:0kB present:3145324kB managed:3012120kB mlocked:20860kB kernel_stack:5504kB pagetables:18652kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 473.449108] lowmem_reserve[]: 0 3505 3505 [ 473.449132] Normal free:6240kB min:5588kB low:9176kB high:12764kB active_anon:385060kB inactive_anon:2562452kB active_file:476kB inactive_file:232kB unevictable:27304kB writepending:0kB present:4718592kB managed:3589232kB mlocked:27304kB kernel_stack:8032kB pagetables:24156kB bounce:0kB free_pcp:228kB local_pcp:108kB free_cma:0kB [ 473.449134] lowmem_reserve[]: 0 0 0 [ 473.449144] DMA32: 88*4kB (UMH) 185*8kB (UMH) 148*16kB (UEH) 334*32kB (UEH) 112*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 22056kB [ 473.449190] Normal: 45*4kB (UEH) 6*8kB (UEH) 344*16kB (UMEH) 9*32kB (UH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6020kB ** 299 printk messages dropped ** [ 473.452525] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 ** 60 printk messages dropped ** [ 473.453136] [16511] 0 16511 17618 8233 26 3 0 1000 syz-executor0 [ 473.453145] [16566] 0 16566 17651 11270 31 4 0 1000 syz-executor0 [ 473.453155] [16577] 0 16577 17618 8233 26 3 0 1000 syz-executor0 ** 155 printk messages dropped ** [ 474.678946] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 ** 265 printk messages dropped ** [ 474.702768] [16605] 0 16605 17651 10941 31 4 0 1000 syz-executor0 [ 474.702877] [16609] 0 16609 17651 14607 36 4 0 1000 syz-executor1 ** 39 printk messages dropped ** [ 475.308308] RDX: 00007fafdb3be9d0 RSI: 00007fafdb3bddb0 RDI: 00000000003d0f00 ** 83 printk messages dropped ** [ 475.309257] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 475.309268] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 ** 94 printk messages dropped ** [ 475.310350] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 ** 54 printk messages dropped ** [ 475.310954] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 ** 142 printk messages dropped ** [ 475.312490] [16623] 0 16623 17618 8233 26 3 0 1000 syz-executor0 [ 475.312501] [16636] 0 16636 17651 12741 31 3 0 1000 syz-executor5 [ 475.312520] [16637] 0 16637 2097 28 10 3 0 -1000 blkid [ 475.312532] Out of memory: Kill process 16601 (syz-executor5) score 1010 or sacrifice child [ 475.312568] Killed process 16636 (syz-executor5) total-vm:70604kB, anon-rss:18196kB, file-rss:32768kB, shmem-rss:0kB [ 475.346728] oom_reaper: reaped process 16636 (syz-executor5), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 476.031506] syz-executor1 invoked oom-killer: gfp_mask=0x14201ca(GFP_HIGHUSER_MOVABLE|__GFP_COLD), nodemask=(null), order=0, oom_score_adj=1000 [ 476.031525] CPU: 1 PID: 16652 Comm: syz-executor1 Not tainted 4.14.88+ #23 [ 476.031528] Call Trace: [ 476.031544] dump_stack+0xb9/0x11b [ 476.031560] dump_header+0x17d/0x7a8 [ 476.031569] ? trace_hardirqs_on_caller+0x381/0x520 [ 476.031582] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 476.031591] ? ___ratelimit+0x4f/0x3f0 [ 476.031607] oom_kill_process.cold.8+0x10/0xc88 [ 476.031618] ? lock_downgrade+0x560/0x560 [ 476.031634] ? check_preemption_disabled+0x34/0x1e0 [ 476.031651] out_of_memory+0x669/0xa60 [ 476.031666] ? oom_killer_disable+0x1f0/0x1f0 [ 476.031691] __alloc_pages_nodemask+0x182f/0x2180 [ 476.031716] ? check_preemption_disabled+0x34/0x1e0 [ 476.031730] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 476.031742] ? find_get_entry+0x118/0x550 [ 476.031757] ? check_preemption_disabled+0x34/0x1e0 [ 476.031768] ? check_preemption_disabled+0x34/0x1e0 [ 476.031784] ? find_get_entry+0x13f/0x550 [ 476.031803] ? pagecache_get_page+0x129/0x770 [ 476.031821] filemap_fault+0xcdd/0x14a0 [ 476.031852] ext4_filemap_fault+0x7d/0xb0 [ 476.031862] __do_fault+0x80/0x210 [ 476.031874] __handle_mm_fault+0x991/0x25f0 [ 476.031891] ? vm_insert_page+0x6d0/0x6d0 [ 476.031906] ? follow_p4d_mask.isra.5+0x76f/0x1000 [ 476.031934] ? check_preemption_disabled+0x34/0x1e0 [ 476.031952] handle_mm_fault+0x3d5/0x6eb [ 476.031965] __get_user_pages+0x35d/0xe20 [ 476.031996] populate_vma_page_range+0x17a/0x210 [ 476.032012] __mm_populate+0x1bf/0x300 [ 476.032027] ? populate_vma_page_range+0x210/0x210 [ 476.032035] ? do_mlock+0x5c0/0x5c0 [ 476.032047] ? security_capable+0x8e/0xc0 [ 476.032065] SyS_mlockall+0x3e2/0x510 [ 476.032074] ? SyS_munlock+0xf0/0xf0 [ 476.032082] do_syscall_64+0x19b/0x4b0 [ 476.032101] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 476.032108] RIP: 0033:0x457659 [ 476.032112] RSP: 002b:00007f989f19bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 476.032122] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457659 [ 476.032126] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 476.032131] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 476.032136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f989f19c6d4 [ 476.032141] R13: 00000000004c2d35 R14: 00000000004d5060 R15: 00000000ffffffff [ 476.032168] Mem-Info: [ 476.032187] active_anon:97122 inactive_anon:1287459 isolated_anon:0 [ 476.032187] active_file:33 inactive_file:0 isolated_file:0 [ 476.032187] unevictable:16767 dirty:14 writeback:0 unstable:0 [ 476.032187] slab_reclaimable:7833 slab_unreclaimable:82796 [ 476.032187] mapped:56459 shmem:342 pagetables:10752 bounce:0 [ 476.032187] free:6010 free_pcp:43 free_cma:0 [ 476.032201] Node 0 active_anon:388488kB inactive_anon:5149836kB active_file:132kB inactive_file:0kB unevictable:67068kB isolated(anon):0kB isolated(file):0kB mapped:225836kB dirty:56kB writeback:0kB shmem:1368kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 12:28:33 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:33 executing program 4: getrandom(&(0x7f0000000040)=""/195, 0xc3, 0x2) 12:28:33 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:33 executing program 2: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r1, 0x0, 0x88001) 12:28:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 476.032225] DMA32 free:18664kB min:4684kB low:7692kB high:10700kB active_anon:3432kB inactive_anon:2587248kB active_file:184kB inactive_file:460kB unevictable:37832kB writepending:16kB present:3145324kB managed:3012120kB mlocked:37824kB kernel_stack:5600kB pagetables:18824kB bounce:0kB free_pcp:172kB local_pcp:0kB free_cma:0kB [ 476.033486] lowmem_reserve[]: 0 3505 3505 [ 476.033516] Normal free:5376kB min:5588kB low:9176kB high:12764kB active_anon:385256kB inactive_anon:2562532kB active_file:212kB inactive_file:492kB unevictable:28736kB writepending:40kB present:4718592kB managed:3589232kB mlocked:28708kB kernel_stack:8096kB pagetables:24184kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 12:28:33 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:33 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 476.033518] lowmem_reserve[]: 0 0 0 [ 476.033531] DMA32: 59*4kB (UMH) 21*8kB (UMH) 9*16kB (UMH) 267*32kB (UMH) 159*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 19268kB [ 476.033588] Normal: 77*4kB (UMH) 2*8kB (H) 313*16kB (UMH) 14*32kB (UH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5780kB 12:28:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 476.033642] 7660 total pagecache pages [ 476.033652] 0 pages in swap cache [ 476.033657] Swap cache stats: add 0, delete 0, find 0/0 [ 476.033659] Free swap = 0kB [ 476.033662] Total swap = 0kB [ 476.033666] 1965979 pages RAM [ 476.033669] 0 pages HighMem/MovableOnly [ 476.033672] 315641 pages reserved [ 476.033676] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name 12:28:33 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 476.033696] [ 190] 0 190 5366 168 15 3 0 -1000 udevd [ 476.033709] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 476.033721] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 476.033733] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 476.033745] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd ** 127 printk messages dropped ** [ 476.036606] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 ** 165 printk messages dropped ** [ 476.041267] [14599] 0 14599 17651 12714 31 3 0 1000 syz-executor1 ** 60 printk messages dropped ** [ 476.043283] Out of memory: Kill process 16601 (syz-executor5) score 1010 or sacrifice child [ 476.043332] Killed process 16601 (syz-executor5) total-vm:70604kB, anon-rss:18316kB, file-rss:52264kB, shmem-rss:0kB [ 476.077412] oom_reaper: reaped process 16601 (syz-executor5), now anon-rss:18316kB, file-rss:19488kB, shmem-rss:0kB [ 476.096801] syz-executor1 invoked oom-killer: gfp_mask=0x14201ca(GFP_HIGHUSER_MOVABLE|__GFP_COLD), nodemask=(null), order=0, oom_score_adj=1000 [ 476.096820] CPU: 1 PID: 16652 Comm: syz-executor1 Not tainted 4.14.88+ #23 [ 476.096823] Call Trace: [ 476.096838] dump_stack+0xb9/0x11b ** 25 printk messages dropped ** [ 476.097267] __get_user_pages+0x35d/0xe20 ** 396 printk messages dropped ** [ 476.153255] CPU: 0 PID: 16656 Comm: syz-executor0 Not tainted 4.14.88+ #23 [ 476.153259] Call Trace: [ 476.153275] dump_stack+0xb9/0x11b [ 476.153292] dump_header+0x17d/0x7a8 [ 476.153303] ? trace_hardirqs_on_caller+0x381/0x520 ** 424 printk messages dropped ** [ 477.289164] oom_kill_process.cold.8+0x10/0xc88 [ 477.289174] ? lock_downgrade+0x560/0x560 [ 477.289190] ? check_preemption_disabled+0x34/0x1e0 [ 477.289207] out_of_memory+0x669/0xa60 [ 477.289221] ? oom_killer_disable+0x1f0/0x1f0 [ 477.289247] __alloc_pages_nodemask+0x182f/0x2180 [ 477.289284] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 477.289296] ? __save_stack_trace+0x8d/0xf0 [ 477.289311] ? __lock_acquire+0x619/0x4320 [ 477.289330] ? kasan_kmalloc.part.1+0xa9/0xd0 [ 477.289367] ? new_slab+0x358/0x470 [ 477.289380] new_slab+0x3c0/0x470 [ 477.289399] ___slab_alloc.constprop.35+0x2e2/0x480 12:28:33 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:33 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 477.289410] ? getname_flags+0xc4/0x540 [ 477.289428] ? fs_reclaim_acquire+0x10/0x10 [ 477.289443] ? check_preemption_disabled+0x34/0x1e0 [ 477.289453] ? getname_flags+0xc4/0x540 [ 477.289462] __slab_alloc.isra.26.constprop.34+0x4b/0x90 12:28:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 477.289473] ? getname_flags+0xc4/0x540 [ 477.289480] kmem_cache_alloc+0x19e/0x2b0 [ 477.289494] getname_flags+0xc4/0x540 [ 477.289505] ? SyS_symlinkat+0x1e0/0x1e0 [ 477.289516] SyS_symlinkat+0xb0/0x1e0 [ 477.289530] ? SyS_unlink+0x20/0x20 12:28:34 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 477.289545] ? do_syscall_64+0x43/0x4b0 [ 477.289553] ? SyS_symlinkat+0x1e0/0x1e0 [ 477.289563] do_syscall_64+0x19b/0x4b0 [ 477.289581] entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:28:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 477.289587] RIP: 0033:0x457387 [ 477.289591] RSP: 002b:00007ffd44050c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000058 [ 477.289600] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457387 [ 477.289605] RDX: 00007ffd44050cb3 RSI: 00000000004bd097 RDI: 00007ffd44050ca0 [ 477.289609] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000013 [ 477.289613] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000000 [ 477.289618] R13: 0000000000000001 R14: 000000000000022e R15: 0000000000000003 [ 477.291018] Mem-Info: [ 477.291036] active_anon:97155 inactive_anon:1282880 isolated_anon:0 [ 477.291036] active_file:440 inactive_file:448 isolated_file:31 [ 477.291036] unevictable:19533 dirty:18 writeback:0 unstable:0 [ 477.291036] slab_reclaimable:7833 slab_unreclaimable:82800 [ 477.291036] mapped:56058 shmem:343 pagetables:10821 bounce:0 [ 477.291036] free:6116 free_pcp:56 free_cma:0 [ 477.291049] Node 0 active_anon:388620kB inactive_anon:5131520kB active_file:1760kB inactive_file:1792kB unevictable:78132kB isolated(anon):0kB isolated(file):124kB mapped:224232kB dirty:72kB writeback:0kB shmem:1372kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 477.291066] DMA32 free:19400kB min:4684kB low:7692kB high:10700kB active_anon:3420kB inactive_anon:2575068kB active_file:520kB inactive_file:1252kB unevictable:44892kB writepending:148kB present:3145324kB managed:3012120kB mlocked:44892kB kernel_stack:5856kB pagetables:19156kB bounce:0kB free_pcp:160kB local_pcp:160kB free_cma:0kB [ 477.291069] lowmem_reserve[]: 0 3505 3505 [ 477.291095] Normal free:5064kB min:5588kB low:9176kB high:12764kB active_anon:385200kB inactive_anon:2556548kB active_file:2068kB inactive_file:1388kB unevictable:32196kB writepending:124kB present:4718592kB managed:3589232kB mlocked:32196kB kernel_stack:8032kB pagetables:24128kB bounce:0kB free_pcp:72kB local_pcp:0kB free_cma:0kB 12:28:34 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 477.291097] lowmem_reserve[]: 0 0 0 [ 477.291109] DMA32: 69*4kB (UMH) 24*8kB (UH) 9*16kB (MH) 267*32kB (UMH) 162*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 19524kB [ 477.291159] Normal: 141*4kB (UMH) 32*8kB (UMH) 276*16kB (UMH) 11*32kB (UEH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5588kB [ 477.291217] 7407 total pagecache pages [ 477.291227] 0 pages in swap cache [ 477.291231] Swap cache stats: add 0, delete 0, find 0/0 [ 477.291234] Free swap = 0kB [ 477.291237] Total swap = 0kB [ 477.291240] 1965979 pages RAM [ 477.291243] 0 pages HighMem/MovableOnly [ 477.291246] 315641 pages reserved [ 477.291249] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 477.291267] [ 190] 0 190 5366 419 15 3 0 -1000 udevd [ 477.291279] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 477.291290] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 477.291301] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 477.291313] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 477.291325] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 477.291340] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd ** 141 printk messages dropped ** [ 477.308723] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 ** 234 printk messages dropped ** [ 477.394078] ? __lock_acquire+0x619/0x4320 [ 477.394095] ? kasan_kmalloc.part.1+0xa9/0xd0 [ 477.394117] ? new_slab+0x358/0x470 [ 477.394130] new_slab+0x3c0/0x470 [ 477.394146] ___slab_alloc.constprop.35+0x2e2/0x480 [ 477.394155] ? getname_flags+0xc4/0x540 [ 477.394174] ? fs_reclaim_acquire+0x10/0x10 [ 477.394188] ? check_preemption_disabled+0x34/0x1e0 [ 477.394198] ? getname_flags+0xc4/0x540 [ 477.394206] __slab_alloc.isra.26.constprop.34+0x4b/0x90 [ 477.394215] ? getname_flags+0xc4/0x540 ** 196 printk messages dropped ** [ 477.396225] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 ** 214 printk messages dropped ** [ 477.443964] ? check_preemption_disabled+0x34/0x1e0 [ 477.443980] out_of_memory+0x669/0xa60 [ 477.443994] ? oom_killer_disable+0x1f0/0x1f0 [ 477.444019] __alloc_pages_nodemask+0x182f/0x2180 [ 477.444050] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 477.444061] ? trace_hardirqs_on+0x10/0x10 [ 477.444068] ? check_preemption_disabled+0x34/0x1e0 [ 477.444080] ? copy_process.part.6+0x1435/0x6530 [ 477.444119] ? rcu_read_lock_sched_held+0x102/0x120 [ 477.444134] copy_process.part.6+0x267/0x6530 [ 477.444148] ? __handle_mm_fault+0xdab/0x25f0 [ 477.444157] ? lock_downgrade+0x560/0x560 [ 477.444168] ? __lru_cache_add+0x174/0x250 [ 477.444197] ? __cleanup_sighand+0x40/0x40 [ 477.444204] ? vm_insert_page+0x6d0/0x6d0 [ 477.444210] ? HARDIRQ_verbose+0x10/0x10 [ 477.444241] _do_fork+0x1c2/0xd50 [ 477.444258] ? fork_idle+0x250/0x250 [ 477.444269] ? up_read+0x17/0x30 [ 477.444277] ? __do_page_fault+0x64c/0xb60 [ 477.444292] ? do_syscall_64+0x43/0x4b0 [ 477.444304] ? sys_vfork+0x20/0x20 [ 477.444310] do_syscall_64+0x19b/0x4b0 [ 477.444328] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 477.444334] RIP: 0033:0x45a029 [ 477.444338] RSP: 002b:00007fff00e8e478 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 477.444354] RAX: ffffffffffffffda RBX: 00007fafdb400700 RCX: 000000000045a029 [ 477.444359] RDX: 00007fafdb4009d0 RSI: 00007fafdb3ffdb0 RDI: 00000000003d0f00 [ 477.444363] RBP: 00007fff00e8e680 R08: 00007fafdb400700 R09: 00007fafdb400700 [ 477.444367] R10: 00007fafdb4009d0 R11: 0000000000000202 R12: 0000000000000000 [ 477.444372] R13: 00007fff00e8e52f R14: 00007fafdb4009c0 R15: 000000000072bfac [ 477.444399] Mem-Info: [ 477.444415] active_anon:97171 inactive_anon:1282876 isolated_anon:0 [ 477.444415] active_file:33 inactive_file:1 isolated_file:0 [ 477.444415] unevictable:20080 dirty:0 writeback:0 unstable:0 [ 477.444415] slab_reclaimable:7833 slab_unreclaimable:82809 [ 477.444415] mapped:55845 shmem:343 pagetables:10842 bounce:0 [ 477.444415] free:6658 free_pcp:188 free_cma:0 [ 477.444429] Node 0 active_anon:388684kB inactive_anon:5131504kB active_file:132kB inactive_file:4kB unevictable:80320kB isolated(anon):0kB isolated(file):0kB mapped:223380kB dirty:0kB writeback:0kB shmem:1372kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 477.444445] DMA32 free:19252kB min:4684kB low:7692kB high:10700kB active_anon:3456kB inactive_anon:2574960kB active_file:272kB inactive_file:124kB unevictable:47768kB writepending:0kB present:3145324kB managed:3012120kB mlocked:47768kB kernel_stack:5760kB pagetables:19200kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 477.444447] lowmem_reserve[]: 0 3505 3505 [ 477.444473] Normal free:7380kB min:5588kB low:9176kB high:12764kB active_anon:385228kB inactive_anon:2556544kB active_file:100kB inactive_file:308kB unevictable:32500kB writepending:0kB present:4718592kB managed:3589232kB mlocked:32500kB kernel_stack:8000kB pagetables:24168kB bounce:0kB free_pcp:752kB local_pcp:628kB free_cma:0kB [ 477.444475] lowmem_reserve[]: 0 0 0 [ 477.444487] DMA32: 111*4kB (UMH) 36*8kB (UMEH) 11*16kB (UMH) 241*32kB (UMH) 162*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18988kB [ 477.444537] Normal: 434*4kB (UMH) 75*8kB (UMH) 280*16kB (UMH) 14*32kB (UEH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 7264kB [ 477.444586] 7077 total pagecache pages [ 477.444594] 0 pages in swap cache [ 477.444599] Swap cache stats: add 0, delete 0, find 0/0 [ 477.444602] Free swap = 0kB [ 477.444604] Total swap = 0kB [ 477.444607] 1965979 pages RAM [ 477.444610] 0 pages HighMem/MovableOnly [ 477.444613] 315641 pages reserved [ 477.444616] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 477.444633] [ 190] 0 190 5366 168 15 3 0 -1000 udevd ** 368 printk messages dropped ** [ 478.226828] oom_reaper: reaped process 16706 (syz-executor1), now anon-rss:17756kB, file-rss:3224kB, shmem-rss:0kB [ 478.576412] oom_kill_process: 2 callbacks suppressed [ 478.576420] syz-executor5 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 478.576435] CPU: 1 PID: 16728 Comm: syz-executor5 Not tainted 4.14.88+ #23 [ 478.576438] Call Trace: [ 478.576451] dump_stack+0xb9/0x11b [ 478.576465] dump_header+0x17d/0x7a8 [ 478.576473] ? trace_hardirqs_on_caller+0x381/0x520 [ 478.576483] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 478.576490] ? ___ratelimit+0x4f/0x3f0 [ 478.576504] oom_kill_process.cold.8+0x10/0xc88 [ 478.576513] ? lock_downgrade+0x560/0x560 [ 478.576527] ? check_preemption_disabled+0x34/0x1e0 [ 478.576542] out_of_memory+0x669/0xa60 [ 478.576554] ? oom_killer_disable+0x1f0/0x1f0 [ 478.576576] __alloc_pages_nodemask+0x182f/0x2180 [ 478.576604] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 478.576620] ? ___slab_alloc.constprop.35+0x1b6/0x480 12:28:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:35 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 478.576629] ? copy_process.part.6+0x1435/0x6530 [ 478.576663] ? rcu_read_lock_sched_held+0x102/0x120 [ 478.576677] copy_process.part.6+0x267/0x6530 [ 478.576689] ? __handle_mm_fault+0xdab/0x25f0 [ 478.576698] ? lock_downgrade+0x560/0x560 [ 478.576708] ? __lru_cache_add+0x174/0x250 [ 478.576734] ? __cleanup_sighand+0x40/0x40 [ 478.576740] ? vm_insert_page+0x6d0/0x6d0 [ 478.576746] ? HARDIRQ_verbose+0x10/0x10 [ 478.576779] _do_fork+0x1c2/0xd50 [ 478.576799] ? fork_idle+0x250/0x250 [ 478.576809] ? up_read+0x17/0x30 [ 478.576816] ? __do_page_fault+0x64c/0xb60 [ 478.576829] ? do_syscall_64+0x43/0x4b0 [ 478.576841] ? sys_vfork+0x20/0x20 [ 478.576846] do_syscall_64+0x19b/0x4b0 [ 478.576862] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 478.576867] RIP: 0033:0x45a029 [ 478.576871] RSP: 002b:00007fff8fbebb98 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 478.576879] RAX: ffffffffffffffda RBX: 00007f2eebe9c700 RCX: 000000000045a029 [ 478.576883] RDX: 00007f2eebe9c9d0 RSI: 00007f2eebe9bdb0 RDI: 00000000003d0f00 [ 478.576887] RBP: 00007fff8fbebda0 R08: 00007f2eebe9c700 R09: 00007f2eebe9c700 [ 478.576891] R10: 00007f2eebe9c9d0 R11: 0000000000000202 R12: 0000000000000000 [ 478.576895] R13: 00007fff8fbebc4f R14: 00007f2eebe9c9c0 R15: 000000000072c04c [ 478.577054] Mem-Info: [ 478.577069] active_anon:97170 inactive_anon:1282901 isolated_anon:0 [ 478.577069] active_file:87 inactive_file:104 isolated_file:0 [ 478.577069] unevictable:18209 dirty:0 writeback:0 unstable:0 [ 478.577069] slab_reclaimable:7802 slab_unreclaimable:82864 [ 478.577069] mapped:53612 shmem:343 pagetables:10846 bounce:0 [ 478.577069] free:6163 free_pcp:0 free_cma:0 [ 478.577081] Node 0 active_anon:388680kB inactive_anon:5131604kB active_file:348kB inactive_file:416kB unevictable:72836kB isolated(anon):0kB isolated(file):0kB mapped:214448kB dirty:0kB writeback:0kB shmem:1372kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 478.577097] DMA32 free:18968kB min:4684kB low:7692kB high:10700kB active_anon:3352kB inactive_anon:2575016kB active_file:628kB inactive_file:256kB unevictable:40524kB writepending:0kB present:3145324kB managed:3012120kB mlocked:40524kB kernel_stack:5824kB pagetables:19008kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 478.577099] lowmem_reserve[]: 0 3505 3505 [ 478.577122] Normal free:5684kB min:5588kB low:9176kB high:12764kB active_anon:385428kB inactive_anon:2556604kB active_file:400kB inactive_file:424kB unevictable:32380kB writepending:0kB present:4718592kB managed:3589232kB mlocked:32380kB kernel_stack:8032kB pagetables:24376kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 478.577124] lowmem_reserve[]: 0 0 0 [ 478.577134] DMA32: 58*4kB (UMH) 79*8kB (UMEH) 116*16kB (UMH) 187*32kB (UMEH) 164*64kB (UMEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 19200kB [ 478.577180] Normal: 74*4kB (UMH) 72*8kB (UMH) 325*16kB (UMH) 3*32kB (H) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6168kB [ 478.577223] 4879 total pagecache pages [ 478.577231] 0 pages in swap cache [ 478.577236] Swap cache stats: add 0, delete 0, find 0/0 [ 478.577238] Free swap = 0kB [ 478.577241] Total swap = 0kB [ 478.577243] 1965979 pages RAM [ 478.577246] 0 pages HighMem/MovableOnly [ 478.577248] 315641 pages reserved [ 478.577251] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 478.577275] [ 190] 0 190 5366 266 15 3 0 -1000 udevd ** 287 printk messages dropped ** [ 478.584134] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 ** 75 printk messages dropped ** [ 478.586216] Killed process 16733 (syz-executor4) total-vm:70604kB, anon-rss:17844kB, file-rss:32768kB, shmem-rss:0kB [ 478.626529] oom_reaper: reaped process 16733 (syz-executor4), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 478.642553] syz-executor5 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 478.642568] CPU: 1 PID: 16728 Comm: syz-executor5 Not tainted 4.14.88+ #23 [ 478.642571] Call Trace: [ 478.642585] dump_stack+0xb9/0x11b [ 478.642598] dump_header+0x17d/0x7a8 [ 478.642607] ? trace_hardirqs_on_caller+0x381/0x520 [ 478.642616] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 478.642624] ? ___ratelimit+0x4f/0x3f0 [ 478.642637] oom_kill_process.cold.8+0x10/0xc88 [ 478.642647] ? lock_downgrade+0x560/0x560 [ 478.642660] ? check_preemption_disabled+0x34/0x1e0 [ 478.642675] out_of_memory+0x669/0xa60 [ 478.642688] ? oom_killer_disable+0x1f0/0x1f0 [ 478.642710] __alloc_pages_nodemask+0x182f/0x2180 [ 478.642738] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 478.642753] ? ___slab_alloc.constprop.35+0x1b6/0x480 [ 478.642762] ? copy_process.part.6+0x1435/0x6530 [ 478.642802] ? rcu_read_lock_sched_held+0x102/0x120 [ 478.642817] copy_process.part.6+0x267/0x6530 [ 478.642829] ? __handle_mm_fault+0xdab/0x25f0 [ 478.642838] ? lock_downgrade+0x560/0x560 [ 478.642848] ? __lru_cache_add+0x174/0x250 [ 478.642874] ? __cleanup_sighand+0x40/0x40 [ 478.642880] ? vm_insert_page+0x6d0/0x6d0 [ 478.642886] ? HARDIRQ_verbose+0x10/0x10 [ 478.642914] _do_fork+0x1c2/0xd50 [ 478.642929] ? fork_idle+0x250/0x250 [ 478.642939] ? up_read+0x17/0x30 [ 478.642946] ? __do_page_fault+0x64c/0xb60 [ 478.642959] ? do_syscall_64+0x43/0x4b0 [ 478.642971] ? sys_vfork+0x20/0x20 [ 478.642976] do_syscall_64+0x19b/0x4b0 [ 478.642992] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 478.642997] RIP: 0033:0x45a029 [ 478.643001] RSP: 002b:00007fff8fbebb98 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 478.643009] RAX: ffffffffffffffda RBX: 00007f2eebe9c700 RCX: 000000000045a029 [ 478.643013] RDX: 00007f2eebe9c9d0 RSI: 00007f2eebe9bdb0 RDI: 00000000003d0f00 [ 478.643018] RBP: 00007fff8fbebda0 R08: 00007f2eebe9c700 R09: 00007f2eebe9c700 [ 478.643022] R10: 00007f2eebe9c9d0 R11: 0000000000000202 R12: 0000000000000000 [ 478.643026] R13: 00007fff8fbebc4f R14: 00007f2eebe9c9c0 R15: 000000000072c04c [ 478.643049] Mem-Info: [ 478.643064] active_anon:97168 inactive_anon:1282886 isolated_anon:0 [ 478.643064] active_file:13 inactive_file:4 isolated_file:0 [ 478.643064] unevictable:18447 dirty:0 writeback:0 unstable:0 [ 478.643064] slab_reclaimable:7802 slab_unreclaimable:82864 [ 478.643064] mapped:53700 shmem:343 pagetables:10815 bounce:0 [ 478.643064] free:6087 free_pcp:49 free_cma:0 [ 478.643076] Node 0 active_anon:388672kB inactive_anon:5131544kB active_file:52kB inactive_file:16kB unevictable:73788kB isolated(anon):0kB isolated(file):0kB mapped:214800kB dirty:0kB writeback:0kB shmem:1372kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 478.643092] DMA32 free:19060kB min:4684kB low:7692kB high:10700kB active_anon:3336kB inactive_anon:2574956kB active_file:492kB inactive_file:4kB unevictable:40904kB writepending:0kB present:3145324kB managed:3012120kB mlocked:40904kB kernel_stack:5792kB pagetables:18884kB bounce:0kB free_pcp:76kB local_pcp:76kB free_cma:0kB [ 478.643094] lowmem_reserve[]: 0 3505 3505 [ 478.643117] Normal free:5288kB min:5588kB low:9176kB high:12764kB active_anon:385436kB inactive_anon:2556604kB active_file:240kB inactive_file:276kB unevictable:32952kB writepending:0kB present:4718592kB managed:3589232kB mlocked:32952kB kernel_stack:8032kB pagetables:24376kB bounce:0kB free_pcp:120kB local_pcp:120kB free_cma:0kB [ 478.643119] lowmem_reserve[]: 0 0 0 [ 478.643129] DMA32: 54*4kB (UMH) 61*8kB (UMEH) 127*16kB (UMH) 188*32kB (UMEH) 164*64kB (UMEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 19248kB [ 478.643176] Normal: 59*4kB (MH) 34*8kB (UMH) 322*16kB (UMH) 3*32kB (H) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5756kB [ 478.643219] 4905 total pagecache pages [ 478.643227] 0 pages in swap cache [ 478.643231] Swap cache stats: add 0, delete 0, find 0/0 [ 478.643234] Free swap = 0kB [ 478.643236] Total swap = 0kB [ 478.643239] 1965979 pages RAM [ 478.643241] 0 pages HighMem/MovableOnly [ 478.643244] 315641 pages reserved [ 478.643247] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 478.643270] [ 190] 0 190 5366 167 15 3 0 -1000 udevd [ 478.643281] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 478.643291] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 478.643300] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 478.643311] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 478.643321] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 478.643331] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 478.643340] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 478.643350] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 478.643360] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 478.643370] [ 1832] 0 1832 17553 25 22 3 0 0 syz-executor0 [ 478.643380] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 478.643390] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 478.643401] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 478.643410] [ 1837] 0 1837 17552 8214 23 4 0 0 syz-executor0 [ 478.643420] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 478.643430] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 12:28:36 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:36 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:36 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:36 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:36 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 478.643440] [ 1843] 0 1843 17552 8233 23 4 0 0 syz-executor1 [ 478.643450] [ 1846] 0 1846 17552 8254 23 4 0 0 syz-executor5 [ 478.643459] [ 1847] 0 1847 17552 8265 22 4 0 0 syz-executor3 [ 478.643469] [ 1848] 0 1848 17552 8264 23 4 0 0 syz-executor4 [ 478.643478] [ 1849] 0 1849 17552 8233 23 4 0 0 syz-executor2 [ 478.643489] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 478.643498] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 478.643508] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 12:28:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 478.643518] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 478.643528] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd [ 478.643537] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 478.643547] [ 4829] 0 4829 17620 8257 25 4 0 1000 syz-executor3 [ 478.643558] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 478.643568] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 12:28:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 478.643577] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 478.643587] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 478.643596] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 478.643606] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 ** 336 printk messages dropped ** [ 479.131585] ? ___ratelimit+0x4f/0x3f0 [ 479.131599] oom_kill_process.cold.8+0x10/0xc88 [ 479.131608] ? lock_downgrade+0x560/0x560 [ 479.131622] ? check_preemption_disabled+0x34/0x1e0 [ 479.131637] out_of_memory+0x669/0xa60 [ 479.131649] ? oom_killer_disable+0x1f0/0x1f0 [ 479.131672] __alloc_pages_nodemask+0x182f/0x2180 [ 479.131700] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 479.131710] ? trace_hardirqs_on+0x10/0x10 [ 479.131716] ? check_preemption_disabled+0x34/0x1e0 [ 479.131728] ? copy_process.part.6+0x1435/0x6530 [ 479.131780] ? rcu_read_lock_sched_held+0x102/0x120 [ 479.131793] copy_process.part.6+0x267/0x6530 [ 479.131806] ? __handle_mm_fault+0xdab/0x25f0 [ 479.131815] ? lock_downgrade+0x560/0x560 [ 479.131825] ? __lru_cache_add+0x174/0x250 [ 479.131852] ? __cleanup_sighand+0x40/0x40 [ 479.131857] ? vm_insert_page+0x6d0/0x6d0 [ 479.131863] ? HARDIRQ_verbose+0x10/0x10 [ 479.131891] _do_fork+0x1c2/0xd50 [ 479.131906] ? fork_idle+0x250/0x250 [ 479.131916] ? up_read+0x17/0x30 [ 479.131924] ? __do_page_fault+0x64c/0xb60 [ 479.131938] ? do_syscall_64+0x43/0x4b0 [ 479.131949] ? sys_vfork+0x20/0x20 12:28:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:37 executing program 1: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 479.131954] do_syscall_64+0x19b/0x4b0 [ 479.131970] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 479.131976] RIP: 0033:0x45a029 [ 479.131980] RSP: 002b:00007fff8fbebb98 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 479.131987] RAX: ffffffffffffffda RBX: 00007f2eebe7b700 RCX: 000000000045a029 12:28:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 479.131992] RDX: 00007f2eebe7b9d0 RSI: 00007f2eebe7adb0 RDI: 00000000003d0f00 ** 402 printk messages dropped ** [ 480.000440] wp_page_copy+0x16d/0x13e0 [ 480.000455] ? do_wp_page+0x244/0x1880 [ 480.000468] ? add_mm_counter_fast+0xb0/0xb0 [ 480.000475] ? HARDIRQ_verbose+0x10/0x10 [ 480.000500] do_wp_page+0x24c/0x1880 [ 480.000518] ? finish_mkwrite_fault+0x4e0/0x4e0 [ 480.000526] ? __handle_mm_fault+0x7f0/0x25f0 [ 480.000539] ? trace_hardirqs_on+0x10/0x10 [ 480.000559] __handle_mm_fault+0xdc7/0x25f0 [ 480.000577] ? vm_insert_page+0x6d0/0x6d0 [ 480.000592] ? follow_p4d_mask.isra.5+0x358/0x1000 [ 480.000624] ? check_preemption_disabled+0x34/0x1e0 [ 480.000643] handle_mm_fault+0x3d5/0x6eb [ 480.000657] __get_user_pages+0x35d/0xe20 [ 480.000681] populate_vma_page_range+0x17a/0x210 [ 480.000699] __mm_populate+0x1bf/0x300 [ 480.000716] ? populate_vma_page_range+0x210/0x210 [ 480.000724] ? do_mlock+0x5c0/0x5c0 [ 480.000736] ? security_capable+0x8e/0xc0 12:28:38 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 480.000757] SyS_mlockall+0x3e2/0x510 [ 480.000766] ? SyS_munlock+0xf0/0xf0 [ 480.000776] do_syscall_64+0x19b/0x4b0 ** 281 printk messages dropped ** [ 480.005510] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 ** 129 printk messages dropped ** [ 481.130758] ? HARDIRQ_verbose+0x10/0x10 [ 481.130780] ? __cleanup_sighand+0x40/0x40 ** 422 printk messages dropped ** [ 481.522263] ? avc_has_perm_noaudit+0x17c/0x300 ** 2 printk messages dropped ** [ 481.522318] ___slab_alloc.constprop.35+0x2e2/0x480 [ 481.522328] ? getname_flags+0xc4/0x540 [ 481.522346] ? fs_reclaim_acquire+0x10/0x10 [ 481.522359] ? check_preemption_disabled+0x34/0x1e0 [ 481.522369] ? getname_flags+0xc4/0x540 [ 481.522378] __slab_alloc.isra.26.constprop.34+0x4b/0x90 [ 481.522387] ? getname_flags+0xc4/0x540 [ 481.522394] kmem_cache_alloc+0x19e/0x2b0 12:28:38 executing program 1: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 481.522408] getname_flags+0xc4/0x540 [ 481.522425] user_path_mountpoint_at+0x22/0x70 [ 481.522435] SyS_umount+0x131/0xc90 [ 481.522444] ? SyS_newlstat+0x92/0xf0 [ 481.522453] ? SyS_newstat+0xf0/0xf0 [ 481.522464] ? __detach_mounts+0x2c0/0x2c0 [ 481.522488] ? do_syscall_64+0x43/0x4b0 [ 481.522497] ? __detach_mounts+0x2c0/0x2c0 [ 481.522507] do_syscall_64+0x19b/0x4b0 [ 481.522525] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.522531] RIP: 0033:0x45a0a7 [ 481.522535] RSP: 002b:00007ffd4404fb48 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 481.522543] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a0a7 ** 26 printk messages dropped ** [ 481.522863] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd ** 379 printk messages dropped ** [ 481.859051] ? kmem_cache_alloc+0xe4/0x2b0 [ 481.859058] ? do_brk_flags+0x54b/0x8b0 [ 481.859064] ? SyS_brk+0x310/0x540 [ 481.859071] ? do_syscall_64+0x19b/0x4b0 [ 481.859078] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.859091] ? __lock_acquire+0x619/0x4320 [ 481.859098] ? __lock_acquire+0x619/0x4320 ** 163 printk messages dropped ** [ 481.861405] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 ** 255 printk messages dropped ** [ 481.935910] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 481.935919] ? trace_hardirqs_on+0x10/0x10 [ 481.935925] ? check_preemption_disabled+0x34/0x1e0 [ 481.935937] ? copy_process.part.6+0x1435/0x6530 [ 481.935976] ? rcu_read_lock_sched_held+0x102/0x120 ** 1 printk messages dropped ** [ 481.936022] ? __handle_mm_fault+0xdab/0x25f0 [ 481.936032] ? lock_downgrade+0x560/0x560 [ 481.936043] ? __lru_cache_add+0x174/0x250 [ 481.936068] ? __cleanup_sighand+0x40/0x40 [ 481.936074] ? vm_insert_page+0x6d0/0x6d0 [ 481.936079] ? HARDIRQ_verbose+0x10/0x10 [ 481.936107] _do_fork+0x1c2/0xd50 [ 481.936122] ? fork_idle+0x250/0x250 [ 481.936132] ? up_read+0x17/0x30 [ 481.936140] ? __do_page_fault+0x64c/0xb60 [ 481.936153] ? do_syscall_64+0x43/0x4b0 [ 481.936165] ? sys_vfork+0x20/0x20 [ 481.936171] do_syscall_64+0x19b/0x4b0 [ 481.936187] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.936192] RIP: 0033:0x45a029 [ 481.936196] RSP: 002b:00007ffe3f2bf238 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 481.936204] RAX: ffffffffffffffda RBX: 00007f989f17b700 RCX: 000000000045a029 [ 481.936208] RDX: 00007f989f17b9d0 RSI: 00007f989f17adb0 RDI: 00000000003d0f00 [ 481.936213] RBP: 00007ffe3f2bf440 R08: 00007f989f17b700 R09: 00007f989f17b700 [ 481.936217] R10: 00007f989f17b9d0 R11: 0000000000000202 R12: 0000000000000000 [ 481.936221] R13: 00007ffe3f2bf2ef R14: 00007f989f17b9c0 R15: 000000000072c04c [ 481.936561] Mem-Info: [ 481.936577] active_anon:97290 inactive_anon:1282877 isolated_anon:0 [ 481.936577] active_file:252 inactive_file:352 isolated_file:23 [ 481.936577] unevictable:16818 dirty:18 writeback:0 unstable:0 [ 481.936577] slab_reclaimable:7809 slab_unreclaimable:83067 [ 481.936577] mapped:56079 shmem:343 pagetables:10912 bounce:0 [ 481.936577] free:6067 free_pcp:72 free_cma:0 [ 481.936589] Node 0 active_anon:389160kB inactive_anon:5131508kB active_file:1008kB inactive_file:1408kB unevictable:67272kB isolated(anon):0kB isolated(file):92kB mapped:224316kB dirty:72kB writeback:0kB shmem:1372kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 481.936605] DMA32 free:18860kB min:4684kB low:7692kB high:10700kB active_anon:3248kB inactive_anon:2574948kB active_file:664kB inactive_file:1356kB unevictable:34292kB writepending:0kB present:3145324kB managed:3012120kB mlocked:34636kB kernel_stack:5728kB pagetables:18788kB bounce:0kB free_pcp:288kB local_pcp:116kB free_cma:0kB [ 481.936607] lowmem_reserve[]: 0 3505 3505 [ 481.936632] Normal free:5408kB min:5588kB low:9176kB high:12764kB active_anon:385712kB inactive_anon:2556560kB active_file:464kB inactive_file:828kB unevictable:32224kB writepending:0kB present:4718592kB managed:3589232kB mlocked:31808kB kernel_stack:8288kB pagetables:24860kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 481.936634] lowmem_reserve[]: 0 0 0 [ 481.936645] DMA32: 3*4kB (H) 12*8kB (UH) 371*16kB (UH) 59*32kB (UEH) 166*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18556kB [ 481.936696] Normal: 129*4kB (UMEH) 106*8kB (UMH) 259*16kB (UMEH) 16*32kB (UH) 2*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6148kB [ 481.936745] 7465 total pagecache pages [ 481.936753] 0 pages in swap cache [ 481.936758] Swap cache stats: add 0, delete 0, find 0/0 [ 481.936761] Free swap = 0kB [ 481.936763] Total swap = 0kB [ 481.936767] 1965979 pages RAM [ 481.936769] 0 pages HighMem/MovableOnly [ 481.936772] 315641 pages reserved [ 481.936775] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 481.936793] [ 190] 0 190 5366 167 15 3 0 -1000 udevd [ 481.936804] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 481.936815] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 481.936825] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 481.936836] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 481.936846] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 481.936857] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd 12:28:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:39 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:39 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:39 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:39 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:39 executing program 1: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 481.936867] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 481.936877] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 481.936888] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 481.936899] [ 1832] 0 1832 17553 25 22 3 0 0 syz-executor0 [ 481.936910] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 481.936920] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 481.936931] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 481.936941] [ 1837] 0 1837 17552 8213 23 4 0 0 syz-executor0 [ 481.936952] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 12:28:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) [ 481.936963] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 481.936973] [ 1843] 0 1843 17552 8252 23 4 0 0 syz-executor1 [ 481.936984] [ 1846] 0 1846 17552 8234 23 4 0 0 syz-executor5 [ 481.936995] [ 1847] 0 1847 17552 8250 22 4 0 0 syz-executor3 12:28:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) shutdown(r1, 0x1) dup(r0) [ 481.937022] [ 1848] 0 1848 17552 8228 23 4 0 0 syz-executor4 [ 481.937033] [ 1849] 0 1849 17552 8224 23 4 0 0 syz-executor2 12:28:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) shutdown(r1, 0x1) dup(r0) [ 481.937045] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 481.937056] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 481.937067] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 481.937078] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 481.937089] [ 4768] 0 4768 5365 228 15 3 0 -1000 udevd ** 382 printk messages dropped ** [ 482.337731] R13: 00000000004c2d35 R14: 00000000004d5060 R15: 00000000ffffffff ** 1 printk messages dropped ** [ 482.337780] active_anon:97231 inactive_anon:1282876 isolated_anon:0 [ 482.337780] active_file:458 inactive_file:478 isolated_file:32 [ 482.337780] unevictable:16291 dirty:27 writeback:0 unstable:0 [ 482.337780] slab_reclaimable:7826 slab_unreclaimable:83145 [ 482.337780] mapped:52995 shmem:342 pagetables:10821 bounce:0 [ 482.337780] free:6204 free_pcp:94 free_cma:0 ** 427 printk messages dropped ** [ 482.409794] Node 0 active_anon:388772kB inactive_anon:5131508kB active_file:180kB inactive_file:92kB unevictable:70580kB isolated(anon):0kB isolated(file):0kB mapped:208452kB dirty:112kB writeback:0kB shmem:1372kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no ** 305 printk messages dropped ** [ 482.415673] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 ** 117 printk messages dropped ** [ 483.772373] SyS_newstat+0x81/0xf0 [ 483.772389] ? SyS_fstat+0xe0/0xe0 ** 2 printk messages dropped ** [ 483.772428] ? do_syscall_64+0x43/0x4b0 [ 483.772440] ? SyS_fstat+0xe0/0xe0 ** 114 printk messages dropped ** [ 483.779550] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 ** 317 printk messages dropped ** [ 483.853780] RIP: 0033:0x7fbde2b29120 [ 483.853784] RSP: 002b:00007ffda26eab08 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 483.853792] RAX: ffffffffffffffda RBX: 0000000001268c70 RCX: 00007fbde2b29120 [ 483.853796] RDX: 00000000000001b6 RSI: 0000000000080241 RDI: 00007ffda26eaff0 [ 483.853801] RBP: 00007ffda26eab80 R08: 0000000000000004 R09: 0000000000000001 [ 483.853805] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000004 [ 483.853809] R13: 0000000000420721 R14: 00007ffda26eabf0 R15: 0000000000000000 [ 483.853833] Mem-Info: [ 483.853848] active_anon:97342 inactive_anon:1278329 isolated_anon:0 [ 483.853848] active_file:23 inactive_file:22 isolated_file:1 [ 483.853848] unevictable:21088 dirty:5 writeback:0 unstable:0 [ 483.853848] slab_reclaimable:7824 slab_unreclaimable:83193 [ 483.853848] mapped:58387 shmem:342 pagetables:10959 bounce:0 [ 483.853848] free:5903 free_pcp:139 free_cma:0 [ 483.853868] Node 0 active_anon:389368kB inactive_anon:5113316kB active_file:92kB inactive_file:88kB unevictable:84352kB isolated(anon):0kB isolated(file):4kB mapped:233548kB dirty:20kB writeback:0kB shmem:1368kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 483.853883] DMA32 free:18492kB min:4684kB low:7692kB high:10700kB active_anon:3136kB inactive_anon:2574940kB active_file:132kB inactive_file:204kB unevictable:36604kB writepending:0kB present:3145324kB managed:3012120kB mlocked:36604kB kernel_stack:5504kB pagetables:18708kB bounce:0kB free_pcp:228kB local_pcp:4kB free_cma:0kB 12:28:40 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:40 executing program 1: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) shutdown(r1, 0x1) dup(r0) [ 483.853885] lowmem_reserve[]: 0 3505 3505 [ 483.853908] Normal free:5120kB min:5588kB low:9176kB high:12764kB active_anon:386032kB inactive_anon:2538376kB active_file:452kB inactive_file:312kB unevictable:47288kB writepending:0kB present:4718592kB managed:3589232kB mlocked:47288kB kernel_stack:8544kB pagetables:25128kB bounce:0kB free_pcp:328kB local_pcp:92kB free_cma:0kB [ 483.853910] lowmem_reserve[]: 0 0 0 [ 483.853920] DMA32: 11*4kB (UH) 16*8kB (UMH) 348*16kB (UMH) 53*32kB (UEH) 165*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 17996kB [ 483.853966] Normal: 55*4kB (UMH) 6*8kB (MH) 278*16kB (UM) 12*32kB (UEH) 3*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5292kB [ 483.854012] 9645 total pagecache pages [ 483.854020] 0 pages in swap cache [ 483.854024] Swap cache stats: add 0, delete 0, find 0/0 [ 483.854026] Free swap = 0kB [ 483.854029] Total swap = 0kB [ 483.854032] 1965979 pages RAM [ 483.854035] 0 pages HighMem/MovableOnly [ 483.854037] 315641 pages reserved [ 483.854040] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 483.854056] [ 190] 0 190 5366 168 15 3 0 -1000 udevd ** 179 printk messages dropped ** [ 483.855894] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 ** 226 printk messages dropped ** [ 483.884090] RDX: 00000000000001b6 RSI: 0000000000080241 RDI: 00007ffda26eaff0 [ 483.884094] RBP: 00007ffda26eab80 R08: 0000000000000004 R09: 0000000000000001 [ 483.884098] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000004 ** 139 printk messages dropped ** [ 483.885916] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 ** 286 printk messages dropped ** [ 483.922871] ? __do_page_fault+0x64c/0xb60 [ 483.922885] ? do_syscall_64+0x43/0x4b0 [ 483.922896] ? sys_vfork+0x20/0x20 [ 483.922902] do_syscall_64+0x19b/0x4b0 [ 483.922918] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 483.922924] RIP: 0033:0x45a029 [ 483.922927] RSP: 002b:00007ffd44050968 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 483.922935] RAX: ffffffffffffffda RBX: 00007f5136087700 RCX: 000000000045a029 [ 483.922940] RDX: 00007f51360879d0 RSI: 00007f5136086db0 RDI: 00000000003d0f00 [ 483.922944] RBP: 00007ffd44050b70 R08: 00007f5136087700 R09: 00007f5136087700 [ 483.922948] R10: 00007f51360879d0 R11: 0000000000000202 R12: 0000000000000000 [ 483.922952] R13: 00007ffd44050a1f R14: 00007f51360879c0 R15: 000000000072bfac [ 483.922976] Mem-Info: [ 483.922992] active_anon:97306 inactive_anon:1278329 isolated_anon:0 [ 483.922992] active_file:11 inactive_file:10 isolated_file:1 [ 483.922992] unevictable:21088 dirty:5 writeback:0 unstable:0 [ 483.922992] slab_reclaimable:7824 slab_unreclaimable:83193 [ 483.922992] mapped:58377 shmem:342 pagetables:10959 bounce:0 [ 483.922992] free:5935 free_pcp:97 free_cma:0 [ 483.923003] Node 0 active_anon:389224kB inactive_anon:5113316kB active_file:44kB inactive_file:40kB unevictable:84352kB isolated(anon):0kB isolated(file):4kB mapped:233508kB dirty:20kB writeback:0kB shmem:1368kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 483.923019] DMA32 free:18492kB min:4684kB low:7692kB high:10700kB active_anon:3128kB inactive_anon:2574940kB active_file:132kB inactive_file:200kB unevictable:36604kB writepending:0kB present:3145324kB managed:3012120kB mlocked:36604kB kernel_stack:5504kB pagetables:18708kB bounce:0kB free_pcp:12kB local_pcp:12kB free_cma:0kB [ 483.923021] lowmem_reserve[]: 0 3505 3505 [ 483.923044] Normal free:5248kB min:5588kB low:9176kB high:12764kB active_anon:385896kB inactive_anon:2538376kB active_file:404kB inactive_file:268kB unevictable:47288kB writepending:0kB present:4718592kB managed:3589232kB mlocked:47288kB kernel_stack:8416kB pagetables:25128kB bounce:0kB free_pcp:376kB local_pcp:228kB free_cma:0kB ** 411 printk messages dropped ** [ 484.610867] getname_flags+0xc4/0x540 [ 484.610877] user_path_at_empty+0x28/0x80 ** 18 printk messages dropped ** [ 484.613378] Node 0 active_anon:389276kB inactive_anon:5095124kB active_file:856kB inactive_file:1012kB unevictable:97564kB isolated(anon):0kB isolated(file):132kB mapped:225320kB dirty:40kB writeback:0kB shmem:1360kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no ** 401 printk messages dropped ** [ 484.661895] ? check_preemption_disabled+0x34/0x1e0 [ 484.661912] ? find_get_entry+0x13f/0x550 [ 484.661931] ? pagecache_get_page+0x129/0x770 [ 484.661949] filemap_fault+0xcdd/0x14a0 [ 484.661979] ext4_filemap_fault+0x7d/0xb0 [ 484.661990] __do_fault+0x80/0x210 [ 484.662003] __handle_mm_fault+0x991/0x25f0 ** 131 printk messages dropped ** [ 484.663682] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 ** 284 printk messages dropped ** [ 485.142529] ? check_preemption_disabled+0x34/0x1e0 [ 485.142546] out_of_memory+0x669/0xa60 [ 485.142559] ? oom_killer_disable+0x1f0/0x1f0 ** 207 printk messages dropped ** [ 485.144996] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 ** 207 printk messages dropped ** [ 485.147328] Killed process 16860 (syz-executor5) total-vm:70736kB, anon-rss:18196kB, file-rss:52256kB, shmem-rss:0kB ** 6 printk messages dropped ** [ 485.200101] ? trace_hardirqs_on_caller+0x381/0x520 [ 485.200112] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 485.200121] ? ___ratelimit+0x4f/0x3f0 [ 485.200137] oom_kill_process.cold.8+0x10/0xc88 [ 485.200165] out_of_memory+0x669/0xa60 [ 485.200180] ? oom_killer_disable+0x1f0/0x1f0 [ 485.200205] __alloc_pages_nodemask+0x182f/0x2180 [ 485.200237] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 485.200249] ? __lock_acquire+0x619/0x4320 [ 485.200266] ? __lock_acquire+0x619/0x4320 [ 485.200273] ? mark_held_locks+0xc2/0x130 [ 485.200293] ? trace_hardirqs_on+0x10/0x10 [ 485.200310] ? trace_hardirqs_on+0x10/0x10 [ 485.200320] ? check_preemption_disabled+0x34/0x1e0 [ 485.200339] __handle_mm_fault+0x1113/0x25f0 [ 485.200357] ? vm_insert_page+0x6d0/0x6d0 [ 485.200372] ? follow_p4d_mask.isra.5+0x76f/0x1000 [ 485.200405] ? check_preemption_disabled+0x34/0x1e0 [ 485.200422] handle_mm_fault+0x3d5/0x6eb [ 485.200435] __get_user_pages+0x35d/0xe20 [ 485.200460] populate_vma_page_range+0x17a/0x210 [ 485.200476] __mm_populate+0x1bf/0x300 [ 485.200492] ? populate_vma_page_range+0x210/0x210 [ 485.200500] ? do_mlock+0x5c0/0x5c0 [ 485.200511] ? security_capable+0x8e/0xc0 [ 485.200530] SyS_mlockall+0x3e2/0x510 [ 485.200539] ? SyS_munlock+0xf0/0xf0 [ 485.200548] do_syscall_64+0x19b/0x4b0 [ 485.200567] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 485.200573] RIP: 0033:0x457659 [ 485.200578] RSP: 002b:00007f0095193c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 485.200587] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457659 [ 485.200592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 485.200597] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 485.200602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00951946d4 [ 485.200607] R13: 00000000004c2d35 R14: 00000000004d5060 R15: 00000000ffffffff [ 485.200645] Mem-Info: [ 485.200683] active_anon:97286 inactive_anon:1273782 isolated_anon:0 [ 485.200683] active_file:13 inactive_file:14 isolated_file:0 12:28:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) shutdown(r1, 0x1) dup(r0) 12:28:42 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(r0) 12:28:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) shutdown(r1, 0x1) dup(r0) 12:28:42 executing program 1: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 485.200683] unevictable:24866 dirty:0 writeback:0 unstable:0 [ 485.200683] slab_reclaimable:7876 slab_unreclaimable:83310 [ 485.200683] mapped:56238 shmem:342 pagetables:10851 bounce:0 [ 485.200683] free:5869 free_pcp:211 free_cma:0 [ 485.200877] Node 0 active_anon:389144kB inactive_anon:5095128kB active_file:52kB inactive_file:56kB unevictable:99464kB isolated(anon):0kB isolated(file):0kB mapped:224952kB dirty:0kB writeback:0kB shmem:1368kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 485.200911] DMA32 free:18304kB min:4684kB low:7692kB high:10700kB active_anon:3136kB inactive_anon:2574940kB active_file:16kB inactive_file:0kB unevictable:35708kB writepending:0kB present:3145324kB managed:3012120kB mlocked:35708kB kernel_stack:5504kB pagetables:18668kB bounce:0kB free_pcp:724kB local_pcp:40kB free_cma:0kB [ 485.200938] lowmem_reserve[]: 0 3505 3505 [ 485.200999] Normal free:5172kB min:5588kB low:9176kB high:12764kB active_anon:386108kB inactive_anon:2520188kB active_file:36kB inactive_file:8kB unevictable:63272kB writepending:0kB present:4718592kB managed:3589232kB mlocked:63272kB kernel_stack:8384kB pagetables:24736kB bounce:0kB free_pcp:120kB local_pcp:120kB free_cma:0kB [ 485.201175] lowmem_reserve[]: 0 0 0 [ 485.201221] DMA32: 3*4kB (H) 7*8kB (H) 354*16kB (UH) 51*32kB (UEH) 169*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18180kB [ 485.201541] Normal: 62*4kB (UMH) 3*8kB (MH) 271*16kB (UM) 18*32kB (UMEH) 4*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5440kB [ 485.201989] 7471 total pagecache pages [ 485.202048] 0 pages in swap cache [ 485.202067] Swap cache stats: add 0, delete 0, find 0/0 [ 485.202081] Free swap = 0kB [ 485.202088] Total swap = 0kB [ 485.202101] 1965979 pages RAM [ 485.202168] 0 pages HighMem/MovableOnly [ 485.202182] 315641 pages reserved [ 485.202295] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 485.202369] [ 190] 0 190 5366 167 15 3 0 -1000 udevd [ 485.202419] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient 12:28:42 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:42 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:42 executing program 4: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 485.202646] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 485.202798] [ 1679] 0 1679 4725 50 15 3 0 0 cron 12:28:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) shutdown(r1, 0x1) dup(r0) [ 485.202839] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 485.203106] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 485.203153] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 485.203195] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 485.203235] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 485.203372] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 485.203476] [ 1832] 0 1832 17553 25 22 3 0 0 syz-executor0 [ 485.203523] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 485.203605] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 485.203646] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 485.203896] [ 1837] 0 1837 17552 8280 23 4 0 0 syz-executor0 [ 485.204237] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 12:28:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) shutdown(r1, 0x1) dup(r0) [ 485.204285] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 485.204326] [ 1843] 0 1843 17552 8220 23 4 0 0 syz-executor1 [ 485.204366] [ 1846] 0 1846 17552 8194 23 4 0 0 syz-executor5 12:28:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) shutdown(r1, 0x1) dup(r0) [ 485.204406] [ 1847] 0 1847 17552 8248 22 4 0 0 syz-executor3 [ 485.204494] [ 1848] 0 1848 17552 8221 23 4 0 0 syz-executor4 [ 485.204600] [ 1849] 0 1849 17552 8265 23 4 0 0 syz-executor2 [ 485.204649] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 485.204690] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 485.204835] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 485.204876] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 12:28:43 executing program 1: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:43 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 485.204918] [ 4768] 0 4768 5365 168 15 3 0 -1000 udevd [ 485.204958] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 485.204999] [ 4829] 0 4829 17620 8257 25 4 0 1000 syz-executor3 [ 485.205135] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 12:28:43 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(0xffffffffffffffff, 0x1) dup(r0) [ 485.205354] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 485.205482] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 485.205524] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 485.205715] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 485.205794] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 485.205834] [ 5707] 0 5707 17651 12714 32 3 0 1000 syz-executor0 [ 485.205875] [ 5781] 0 5781 17651 12714 32 3 0 1000 syz-executor0 [ 485.205915] [ 5845] 0 5845 17651 12714 32 3 0 1000 syz-executor0 [ 485.205963] [ 5901] 0 5901 17651 12714 32 3 0 1000 syz-executor0 [ 485.206045] [ 5970] 0 5970 17651 12714 32 3 0 1000 syz-executor0 [ 485.206086] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 485.206174] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 485.206214] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 [ 485.206255] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 485.206303] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 [ 485.206460] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 485.206687] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 485.206728] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 485.206863] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 485.207111] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 12:28:43 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:43 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 485.207232] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 12:28:44 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 485.207273] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 485.207340] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 485.207381] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 485.207578] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 485.207626] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 485.207667] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 485.207707] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 485.207797] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 485.207837] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 485.208184] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 485.208371] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 485.208412] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 485.208453] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 485.208493] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 485.208534] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 485.208698] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 485.208797] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 485.208837] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 485.208879] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 [ 485.208926] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 [ 485.208967] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 [ 485.209008] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 [ 485.209168] [ 7028] 0 7028 17651 12714 31 3 0 1000 syz-executor1 12:28:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x0) dup(r0) 12:28:44 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:44 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 485.209306] [ 7062] 0 7062 17651 12714 32 3 0 1000 syz-executor0 [ 485.209353] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 [ 485.209454] [ 7097] 0 7097 17651 12714 31 3 0 1000 syz-executor1 [ 485.209494] [ 7099] 0 7099 17651 12714 30 3 0 1000 syz-executor3 [ 485.209536] [ 7134] 0 7134 17651 12714 32 3 0 1000 syz-executor0 [ 485.209604] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 [ 485.209644] [ 7203] 0 7203 17618 12682 32 3 0 1000 syz-executor0 [ 485.209685] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 [ 485.209835] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 485.209903] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 485.209944] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 485.211055] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 485.211098] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 [ 485.211219] [ 7336] 0 7336 17618 12682 32 3 0 1000 syz-executor0 [ 485.211260] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 [ 485.211300] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 [ 485.211437] [ 7379] 0 7379 17651 12714 30 3 0 1000 syz-executor3 [ 485.211498] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 [ 485.211538] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 [ 485.211806] [ 7457] 0 7457 17651 12714 31 3 0 1000 syz-executor1 [ 485.211989] [ 7460] 0 7460 17651 12714 31 3 0 1000 syz-executor4 [ 485.212179] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 485.212227] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 [ 485.212268] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 485.212335] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 485.212377] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 485.212418] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 485.212606] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 [ 485.212706] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 485.212746] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 485.212798] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 485.212846] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 485.212888] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 485.212976] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 485.213017] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 485.213058] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 485.213146] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 485.213324] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 485.213491] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 485.213533] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 [ 485.213600] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 485.213641] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 [ 485.213682] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 12:28:45 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 485.213723] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 485.213831] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 ** 291 printk messages dropped ** [ 485.280997] lowmem_reserve[]: 0 3505 3505 [ 485.281021] Normal free:5440kB min:5588kB low:9176kB high:12764kB active_anon:385988kB inactive_anon:2520188kB active_file:40kB inactive_file:4kB unevictable:63384kB writepending:0kB present:4718592kB managed:3589232kB mlocked:63384kB kernel_stack:8352kB pagetables:24740kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 485.281023] lowmem_reserve[]: 0 0 0 [ 485.281035] DMA32: 16*4kB (UMH) 47*8kB (UMH) 376*16kB (UMEH) 51*32kB (UEH) 169*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18904kB [ 485.281085] Normal: 84*4kB (UMH) 10*8kB (MH) 274*16kB (UM) 20*32kB (UMEH) 4*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5696kB [ 485.281135] 7482 total pagecache pages [ 485.281144] 0 pages in swap cache [ 485.281148] Swap cache stats: add 0, delete 0, find 0/0 [ 485.281151] Free swap = 0kB [ 485.281154] Total swap = 0kB [ 485.281157] 1965979 pages RAM [ 485.281160] 0 pages HighMem/MovableOnly [ 485.281162] 315641 pages reserved ** 223 printk messages dropped ** [ 485.283824] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 ** 193 printk messages dropped ** [ 485.327813] lowmem_reserve[]: 0 3505 3505 [ 485.327894] Normal free:5440kB min:5588kB low:9176kB high:12764kB active_anon:385988kB inactive_anon:2520188kB active_file:40kB inactive_file:4kB unevictable:63384kB writepending:0kB present:4718592kB managed:3589232kB mlocked:63384kB kernel_stack:8352kB pagetables:24740kB bounce:0kB free_pcp:128kB local_pcp:128kB free_cma:0kB [ 485.327922] lowmem_reserve[]: 0 0 0 [ 485.327970] DMA32: 16*4kB (UMH) 47*8kB (UMH) 376*16kB (UMEH) 52*32kB (UEH) 169*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18936kB [ 485.328225] Normal: 83*4kB (UMH) 11*8kB (UMH) 273*16kB (UM) 22*32kB (UMEH) 4*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5748kB 12:28:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(0xffffffffffffffff) 12:28:45 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:45 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 485.328490] 7482 total pagecache pages [ 485.328542] 0 pages in swap cache [ 485.328551] Swap cache stats: add 0, delete 0, find 0/0 [ 485.328569] Free swap = 0kB [ 485.328584] Total swap = 0kB [ 485.328602] 1965979 pages RAM [ 485.328610] 0 pages HighMem/MovableOnly [ 485.328811] 315641 pages reserved [ 485.328826] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 485.328896] [ 190] 0 190 5366 167 15 3 0 -1000 udevd [ 485.328956] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 485.329014] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 485.329068] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 485.329118] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd ** 103 printk messages dropped ** [ 485.337426] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 ** 229 printk messages dropped ** [ 485.367696] [16063] 0 16063 17618 8233 26 3 0 1000 syz-executor0 ** 72 printk messages dropped ** [ 489.099802] ? fs_reclaim_acquire+0x10/0x10 [ 489.099811] ? check_preemption_disabled+0x34/0x1e0 [ 489.099817] ? getname_flags+0xc4/0x540 [ 489.099824] __slab_alloc.isra.26.constprop.34+0x4b/0x90 [ 489.099830] ? getname_flags+0xc4/0x540 [ 489.099836] kmem_cache_alloc+0x19e/0x2b0 [ 489.099845] getname_flags+0xc4/0x540 [ 489.099857] do_sys_open+0x1ea/0x580 [ 489.099866] ? filp_open+0x60/0x60 [ 489.099873] ? up_read+0x17/0x30 [ 489.099880] ? __do_page_fault+0x64c/0xb60 [ 489.099890] ? do_syscall_64+0x43/0x4b0 ** 233 printk messages dropped ** [ 489.116638] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 ** 183 printk messages dropped ** [ 489.224606] ___slab_alloc.constprop.35+0x2e2/0x480 [ 489.224615] ? getname_flags+0xc4/0x540 [ 489.224632] ? fs_reclaim_acquire+0x10/0x10 [ 489.224644] ? check_preemption_disabled+0x34/0x1e0 [ 489.224653] ? getname_flags+0xc4/0x540 [ 489.224661] __slab_alloc.isra.26.constprop.34+0x4b/0x90 [ 489.224671] ? getname_flags+0xc4/0x540 [ 489.224677] kmem_cache_alloc+0x19e/0x2b0 [ 489.224690] getname_flags+0xc4/0x540 ** 21 printk messages dropped ** [ 489.224908] lowmem_reserve[]: 0 0 0 ** 395 printk messages dropped ** [ 489.694052] ? trace_hardirqs_on_caller+0x381/0x520 [ 489.694062] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 489.694081] ? retint_kernel+0x2d/0x2d [ 489.694115] __handle_mm_fault+0x1113/0x25f0 [ 489.694123] ? retint_kernel+0x2d/0x2d [ 489.694137] ? vm_insert_page+0x6d0/0x6d0 [ 489.694174] ? check_preemption_disabled+0x34/0x1e0 [ 489.694191] handle_mm_fault+0x3d5/0x6eb [ 489.694205] __get_user_pages+0x35d/0xe20 [ 489.694229] populate_vma_page_range+0x17a/0x210 [ 489.694246] __mm_populate+0x1bf/0x300 [ 489.694261] ? populate_vma_page_range+0x210/0x210 [ 489.694269] ? do_mlock+0x5c0/0x5c0 [ 489.694280] ? security_capable+0x8e/0xc0 [ 489.694300] SyS_mlockall+0x3e2/0x510 [ 489.694309] ? SyS_munlock+0xf0/0xf0 [ 489.694317] do_syscall_64+0x19b/0x4b0 [ 489.694336] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.694342] RIP: 0033:0x457659 [ 489.694346] RSP: 002b:00007fafdb3dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 489.694356] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457659 [ 489.694360] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 489.694365] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 489.694370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fafdb3df6d4 [ 489.694375] R13: 00000000004c2d35 R14: 00000000004d5060 R15: 00000000ffffffff [ 489.694421] Mem-Info: [ 489.694461] active_anon:97357 inactive_anon:1273810 isolated_anon:0 [ 489.694461] active_file:294 inactive_file:290 isolated_file:32 [ 489.694461] unevictable:17542 dirty:27 writeback:15 unstable:0 [ 489.694461] slab_reclaimable:7909 slab_unreclaimable:84591 [ 489.694461] mapped:52571 shmem:343 pagetables:10930 bounce:0 [ 489.694461] free:6152 free_pcp:228 free_cma:0 [ 489.694505] Node 0 active_anon:389428kB inactive_anon:5095240kB active_file:1176kB inactive_file:1160kB unevictable:70168kB isolated(anon):0kB isolated(file):128kB mapped:210284kB dirty:108kB writeback:60kB shmem:1372kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no ** 94 printk messages dropped ** [ 489.707011] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 ** 299 printk messages dropped ** [ 489.802598] out_of_memory+0x669/0xa60 [ 489.802613] ? oom_killer_disable+0x1f0/0x1f0 [ 489.802639] __alloc_pages_nodemask+0x182f/0x2180 [ 489.802665] ? check_preemption_disabled+0x34/0x1e0 [ 489.802678] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 489.802690] ? __lock_acquire+0x619/0x4320 [ 489.802700] ? finish_task_switch+0x1e6/0x610 [ 489.802715] ? __lock_acquire+0x619/0x4320 [ 489.802724] ? finish_task_switch+0x1bd/0x610 [ 489.802743] ? trace_hardirqs_on+0x10/0x10 [ 489.802760] ? trace_hardirqs_on+0x10/0x10 [ 489.802768] ? check_preemption_disabled+0x34/0x1e0 ** 297 printk messages dropped ** [ 489.806613] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 ** 110 printk messages dropped ** [ 489.862492] CPU: 0 PID: 16993 Comm: syz-executor5 Not tainted 4.14.88+ #23 [ 489.862496] Call Trace: [ 489.862511] dump_stack+0xb9/0x11b [ 489.862526] dump_header+0x17d/0x7a8 [ 489.862536] ? trace_hardirqs_on_caller+0x381/0x520 ** 154 printk messages dropped ** [ 489.865536] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 ** 264 printk messages dropped ** [ 489.922982] oom_reaper: reaped process 16954 (syz-executor0), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 490.068283] syz-executor2 invoked oom-killer: gfp_mask=0x14280ca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=1000 [ 490.068302] CPU: 0 PID: 16991 Comm: syz-executor2 Not tainted 4.14.88+ #23 [ 490.068305] Call Trace: [ 490.068319] dump_stack+0xb9/0x11b [ 490.068335] dump_header+0x17d/0x7a8 [ 490.068344] ? trace_hardirqs_on_caller+0x381/0x520 [ 490.068355] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 490.068365] ? ___ratelimit+0x4f/0x3f0 [ 490.068390] oom_kill_process.cold.8+0x10/0xc88 [ 490.068407] ? lock_downgrade+0x560/0x560 [ 490.068423] ? check_preemption_disabled+0x34/0x1e0 [ 490.068441] out_of_memory+0x669/0xa60 [ 490.068456] ? oom_killer_disable+0x1f0/0x1f0 [ 490.068481] __alloc_pages_nodemask+0x182f/0x2180 [ 490.068513] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 490.068525] ? __lock_acquire+0x619/0x4320 ** 272 printk messages dropped ** [ 490.092451] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 ** 131 printk messages dropped ** [ 490.094121] [16984] 0 16984 17585 12396 31 4 0 1000 syz-executor1 [ 490.094134] [16988] 0 16988 17618 11407 29 4 0 1000 syz-executor5 [ 490.094143] Out of memory: Kill process 16949 (syz-executor0) score 1007 or sacrifice child [ 490.094188] Killed process 16949 (syz-executor0) total-vm:70604kB, anon-rss:15772kB, file-rss:35884kB, shmem-rss:0kB [ 490.148219] oom_reaper: reaped process 16949 (syz-executor0), now anon-rss:15804kB, file-rss:3120kB, shmem-rss:0kB [ 490.162828] syz-executor1 invoked oom-killer: gfp_mask=0x14280ca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=1000 [ 490.162847] CPU: 0 PID: 16986 Comm: syz-executor1 Not tainted 4.14.88+ #23 ** 228 printk messages dropped ** [ 490.165805] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 ** 184 printk messages dropped ** [ 490.168072] [16780] 0 16780 17618 8230 25 3 0 1000 syz-executor4 [ 490.168084] [16839] 0 16839 17618 8230 25 3 0 1000 syz-executor4 [ 490.168096] [16916] 0 16916 17618 8228 26 3 0 1000 syz-executor0 [ 490.168116] [16983] 0 16983 17618 10797 29 4 0 1000 syz-executor2 [ 490.168128] [16984] 0 16984 17585 12858 32 4 0 1000 syz-executor1 [ 490.168140] [16988] 0 16988 17618 12067 30 4 0 1000 syz-executor5 12:28:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(0xffffffffffffffff) 12:28:46 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 490.168146] Out of memory: Kill process 16984 (syz-executor1) score 1007 or sacrifice child [ 490.168180] Killed process 16984 (syz-executor1) total-vm:70340kB, anon-rss:16264kB, file-rss:35168kB, shmem-rss:0kB [ 490.188922] oom_reaper: reaped process 16984 (syz-executor1), now anon-rss:16324kB, file-rss:3112kB, shmem-rss:0kB [ 490.203243] syz-executor2 invoked oom-killer: gfp_mask=0x14280ca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=1000 [ 490.203262] CPU: 0 PID: 16991 Comm: syz-executor2 Not tainted 4.14.88+ #23 [ 490.203265] Call Trace: [ 490.203281] dump_stack+0xb9/0x11b [ 490.203297] dump_header+0x17d/0x7a8 12:28:47 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 490.203308] ? trace_hardirqs_on_caller+0x381/0x520 [ 490.203319] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 490.203328] ? ___ratelimit+0x4f/0x3f0 [ 490.203345] oom_kill_process.cold.8+0x10/0xc88 [ 490.203356] ? lock_downgrade+0x560/0x560 [ 490.203380] ? check_preemption_disabled+0x34/0x1e0 [ 490.203403] out_of_memory+0x669/0xa60 [ 490.203418] ? oom_killer_disable+0x1f0/0x1f0 [ 490.203444] __alloc_pages_nodemask+0x182f/0x2180 [ 490.203476] ? gfp_pfmemalloc_allowed+0x150/0x150 12:28:47 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:47 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(r1, 0x1) dup(0xffffffffffffffff) [ 490.203488] ? __lock_acquire+0x619/0x4320 [ 490.203505] ? __lock_acquire+0x619/0x4320 [ 490.203526] ? trace_hardirqs_on+0x10/0x10 [ 490.203544] ? trace_hardirqs_on+0x10/0x10 [ 490.203552] ? check_preemption_disabled+0x34/0x1e0 [ 490.203570] __handle_mm_fault+0x1113/0x25f0 [ 490.203587] ? vm_insert_page+0x6d0/0x6d0 [ 490.203602] ? follow_p4d_mask.isra.5+0x76f/0x1000 [ 490.203630] ? check_preemption_disabled+0x34/0x1e0 [ 490.203648] handle_mm_fault+0x3d5/0x6eb [ 490.203661] __get_user_pages+0x35d/0xe20 [ 490.203687] populate_vma_page_range+0x17a/0x210 [ 490.203703] __mm_populate+0x1bf/0x300 [ 490.203720] ? populate_vma_page_range+0x210/0x210 [ 490.203727] ? do_mlock+0x5c0/0x5c0 [ 490.203739] ? security_capable+0x8e/0xc0 [ 490.203758] SyS_mlockall+0x3e2/0x510 [ 490.203767] ? SyS_munlock+0xf0/0xf0 [ 490.203776] do_syscall_64+0x19b/0x4b0 [ 490.203795] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 490.203801] RIP: 0033:0x457659 [ 490.203806] RSP: 002b:00007fe7928cdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 12:28:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x4e, 0x0, 0xff, 0x46a}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) dup2(r0, r0) shutdown(0xffffffffffffffff, 0x1) dup(r0) [ 490.203815] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457659 [ 490.203821] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 490.203825] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 490.203830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7928ce6d4 [ 490.203835] R13: 00000000004c2d35 R14: 00000000004d5060 R15: 00000000ffffffff [ 490.203863] Mem-Info: [ 490.203880] active_anon:97260 inactive_anon:1276613 isolated_anon:0 [ 490.203880] active_file:30 inactive_file:0 isolated_file:0 [ 490.203880] unevictable:15747 dirty:0 writeback:0 unstable:0 [ 490.203880] slab_reclaimable:7938 slab_unreclaimable:84600 [ 490.203880] mapped:51479 shmem:344 pagetables:10838 bounce:0 [ 490.203880] free:5970 free_pcp:87 free_cma:0 [ 490.203896] Node 0 active_anon:389040kB inactive_anon:5106452kB active_file:120kB inactive_file:0kB unevictable:62988kB isolated(anon):0kB isolated(file):0kB mapped:205916kB dirty:0kB writeback:0kB shmem:1376kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 490.203914] DMA32 free:18456kB min:4684kB low:7692kB high:10700kB active_anon:3192kB inactive_anon:2579824kB active_file:24kB inactive_file:280kB unevictable:22008kB writepending:0kB present:3145324kB managed:3012120kB mlocked:22008kB kernel_stack:5632kB pagetables:18744kB bounce:0kB free_pcp:120kB local_pcp:120kB free_cma:0kB [ 490.203917] lowmem_reserve[]: 0 3505 3505 [ 490.203945] Normal free:5424kB min:5588kB low:9176kB high:12764kB active_anon:385848kB inactive_anon:2526892kB active_file:96kB inactive_file:8kB unevictable:40512kB writepending:0kB present:4718592kB managed:3589232kB mlocked:40512kB kernel_stack:8192kB pagetables:24608kB bounce:0kB free_pcp:228kB local_pcp:228kB free_cma:0kB [ 490.203948] lowmem_reserve[]: 0 0 0 [ 490.203960] DMA32: 70*4kB (UH) 321*8kB (UH) 703*16kB (UEH) 43*32kB (UEH) 52*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18800kB [ 490.204015] Normal: 87*4kB (UH) 27*8kB (UH) 303*16kB (U) 7*32kB (U) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5636kB 12:28:48 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:48 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:48 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 490.204068] 2720 total pagecache pages [ 490.204078] 0 pages in swap cache [ 490.204083] Swap cache stats: add 0, delete 0, find 0/0 [ 490.204086] Free swap = 0kB [ 490.204089] Total swap = 0kB [ 490.204092] 1965979 pages RAM [ 490.204095] 0 pages HighMem/MovableOnly [ 490.204098] 315641 pages reserved [ 490.204101] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 490.204121] [ 190] 0 190 5366 168 15 3 0 -1000 udevd [ 490.204133] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 490.204145] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 490.204158] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 490.204170] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 490.204182] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond 12:28:48 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 490.204194] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 490.204206] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 490.204218] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 490.204230] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 490.204242] [ 1832] 0 1832 17553 20 22 3 0 0 syz-executor0 [ 490.204254] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 490.204266] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 490.204279] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 490.204291] [ 1837] 0 1837 17552 8225 23 4 0 0 syz-executor0 [ 490.204303] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 490.204315] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 490.204327] [ 1843] 0 1843 17552 8281 23 4 0 0 syz-executor1 [ 490.204339] [ 1846] 0 1846 17552 8242 23 4 0 0 syz-executor5 [ 490.204351] [ 1847] 0 1847 17552 8185 22 4 0 0 syz-executor3 [ 490.204363] [ 1848] 0 1848 17552 8255 23 4 0 0 syz-executor4 [ 490.204388] [ 1849] 0 1849 17552 8283 23 4 0 0 syz-executor2 [ 490.204401] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 490.204414] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 490.204426] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 490.204439] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 490.204452] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd 12:28:49 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 490.204464] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 490.204476] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 [ 490.204492] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 490.204505] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 490.204517] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 490.204530] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 490.204542] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 490.204555] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 490.204567] [ 5707] 0 5707 17651 12714 32 3 0 1000 syz-executor0 [ 490.204580] [ 5781] 0 5781 17651 12714 32 3 0 1000 syz-executor0 [ 490.204592] [ 5845] 0 5845 17651 12714 32 3 0 1000 syz-executor0 [ 490.204604] [ 5901] 0 5901 17651 12714 32 3 0 1000 syz-executor0 [ 490.204616] [ 5970] 0 5970 17651 12714 32 3 0 1000 syz-executor0 12:28:49 executing program 3: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 12:28:49 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:49 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:49 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 490.204629] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 490.204642] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 490.204654] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 [ 490.204666] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 490.204678] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 [ 490.204690] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 490.204703] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 490.204715] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 490.204727] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 490.204739] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 12:28:49 executing program 3: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 490.204751] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 [ 490.204763] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 490.204775] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 12:28:49 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 490.204787] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 12:28:50 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 490.204799] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 490.204811] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 490.204823] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 490.204835] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 490.204847] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 490.204859] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 490.204872] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 490.204884] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 490.204896] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 490.204908] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 490.204921] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 490.204933] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 490.204945] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 490.204957] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 490.204970] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 490.204982] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 [ 490.204994] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 [ 490.205006] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 [ 490.205018] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 [ 490.205032] [ 7028] 0 7028 17651 12714 31 3 0 1000 syz-executor1 [ 490.205044] [ 7062] 0 7062 17651 12714 32 3 0 1000 syz-executor0 12:28:50 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 490.205056] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 [ 490.205068] [ 7097] 0 7097 17651 12714 31 3 0 1000 syz-executor1 [ 490.205080] [ 7099] 0 7099 17651 12714 30 3 0 1000 syz-executor3 [ 490.205092] [ 7134] 0 7134 17651 12714 32 3 0 1000 syz-executor0 [ 490.205104] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 [ 490.205116] [ 7203] 0 7203 17618 12682 32 3 0 1000 syz-executor0 [ 490.205129] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 [ 490.205143] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 490.205157] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 490.205170] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 490.205181] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 490.205193] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 [ 490.205205] [ 7336] 0 7336 17618 12682 32 3 0 1000 syz-executor0 [ 490.205217] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 [ 490.205230] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 [ 490.205242] [ 7379] 0 7379 17651 12714 30 3 0 1000 syz-executor3 [ 490.205255] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 [ 490.205267] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 [ 490.205279] [ 7457] 0 7457 17651 12714 31 3 0 1000 syz-executor1 [ 490.205290] [ 7460] 0 7460 17651 12714 31 3 0 1000 syz-executor4 [ 490.205300] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 490.205314] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 [ 490.205327] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 490.205337] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 490.205349] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 490.205363] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 490.205382] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 [ 490.205400] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 490.205412] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 490.205424] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 490.205436] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 490.205449] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 ** 127 printk messages dropped ** [ 490.207026] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 ** 171 printk messages dropped ** [ 490.538576] lowmem_reserve[]: 0 3505 3505 [ 490.538607] Normal free:6040kB min:5588kB low:9176kB high:12764kB active_anon:385848kB inactive_anon:2502004kB active_file:292kB inactive_file:1200kB unevictable:63512kB writepending:0kB present:4718592kB managed:3589232kB mlocked:63536kB kernel_stack:8160kB pagetables:24604kB bounce:0kB free_pcp:884kB local_pcp:232kB free_cma:0kB ** 434 printk messages dropped ** [ 490.649804] [ 190] 0 190 5366 167 15 3 0 -1000 udevd [ 490.649816] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 490.649827] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 490.649838] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 490.649854] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 490.649866] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 490.649877] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 490.649888] [ 1758] 0 1758 3649 41 13 3 0 0 getty ** 5 printk messages dropped ** [ 490.649952] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 ** 64 printk messages dropped ** [ 490.651582] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 ** 69 printk messages dropped ** [ 490.652922] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 ** 76 printk messages dropped ** [ 490.667733] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 ** 59 printk messages dropped ** [ 490.668922] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 ** 66 printk messages dropped ** [ 490.671864] [16687] 0 16687 17618 8227 25 3 0 1000 syz-executor2 ** 81 printk messages dropped ** [ 494.817011] active_anon:97474 inactive_anon:1269244 isolated_anon:0 [ 494.817011] active_file:27 inactive_file:8 isolated_file:0 [ 494.817011] unevictable:27845 dirty:0 writeback:0 unstable:0 [ 494.817011] slab_reclaimable:8009 slab_unreclaimable:84141 [ 494.817011] mapped:57929 shmem:346 pagetables:11032 bounce:0 [ 494.817011] free:5987 free_pcp:0 free_cma:0 [ 494.817033] Node 0 active_anon:389896kB inactive_anon:5076976kB active_file:108kB inactive_file:32kB unevictable:111380kB isolated(anon):0kB isolated(file):0kB mapped:231716kB dirty:0kB writeback:0kB shmem:1384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 494.817053] DMA32 free:18588kB min:4684kB low:7692kB high:10700kB active_anon:3508kB inactive_anon:2578576kB active_file:16kB inactive_file:220kB unevictable:38884kB writepending:8kB present:3145324kB managed:3012120kB mlocked:38884kB kernel_stack:5824kB pagetables:19424kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 494.817055] lowmem_reserve[]: 0 3505 3505 [ 494.817084] Normal free:5360kB min:5588kB low:9176kB high:12764kB active_anon:386288kB inactive_anon:2498000kB active_file:96kB inactive_file:32kB unevictable:72100kB writepending:60kB present:4718592kB managed:3589232kB mlocked:72100kB kernel_stack:8320kB pagetables:24704kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 494.817087] lowmem_reserve[]: 0 0 0 [ 494.817100] DMA32: 34*4kB (UMH) 28*8kB (UMH) 27*16kB (UMH) 457*32kB (UMH) 56*64kB (UH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 19000kB [ 494.817163] Normal: 152*4kB (UMH) 29*8kB (UH) 25*16kB (UH) 129*32kB (U) 12*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6136kB [ 494.817224] 9166 total pagecache pages 12:28:51 executing program 0: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 494.817233] 0 pages in swap cache [ 494.817238] Swap cache stats: add 0, delete 0, find 0/0 [ 494.817241] Free swap = 0kB [ 494.817245] Total swap = 0kB [ 494.817248] 1965979 pages RAM [ 494.817251] 0 pages HighMem/MovableOnly [ 494.817254] 315641 pages reserved [ 494.817258] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 494.817281] [ 190] 0 190 5366 168 15 3 0 -1000 udevd 12:28:52 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 494.817294] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 494.817306] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 494.817318] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 494.817330] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd ** 291 printk messages dropped ** [ 494.828325] [14600] 0 14600 17651 12714 30 3 0 1000 syz-executor3 ** 115 printk messages dropped ** [ 494.873211] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004576aa [ 494.873215] RDX: 0000000000000003 RSI: 0000000000021000 RDI: 0000000000000000 [ 494.873220] RBP: ffffffffffffffff R08: ffffffffffffffff R09: 0000000000000000 12:28:52 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:52 executing program 3: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xff, 0x46a}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 494.873224] R10: 0000000000020022 R11: 0000000000000246 R12: 0000000000000000 [ 494.873228] R13: 0000000000021000 R14: 0000000000020022 R15: 0000000000000000 [ 494.873251] Mem-Info: [ 494.873266] active_anon:97474 inactive_anon:1269172 isolated_anon:0 [ 494.873266] active_file:53 inactive_file:0 isolated_file:0 [ 494.873266] unevictable:28156 dirty:0 writeback:0 unstable:0 [ 494.873266] slab_reclaimable:8009 slab_unreclaimable:84125 [ 494.873266] mapped:57949 shmem:346 pagetables:11034 bounce:0 [ 494.873266] free:5873 free_pcp:46 free_cma:0 12:28:52 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:52 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 494.873279] Node 0 active_anon:389896kB inactive_anon:5076688kB active_file:212kB inactive_file:0kB unevictable:112624kB isolated(anon):0kB isolated(file):0kB mapped:231796kB dirty:0kB writeback:0kB shmem:1384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 494.873294] DMA32 free:18428kB min:4684kB low:7692kB high:10700kB active_anon:3512kB inactive_anon:2578584kB active_file:32kB inactive_file:28kB unevictable:39236kB writepending:0kB present:3145324kB managed:3012120kB mlocked:39236kB kernel_stack:5824kB pagetables:19416kB bounce:0kB free_pcp:64kB local_pcp:0kB free_cma:0kB ** 422 printk messages dropped ** [ 495.026235] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 495.026240] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 495.026246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00951946d4 ** 150 printk messages dropped ** [ 495.059101] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 ** 277 printk messages dropped ** [ 495.865259] R10: 00007f989f1bd9d0 R11: 0000000000000202 R12: 0000000000000000 [ 495.865264] R13: 00007ffe3f2bf2ef R14: 00007f989f1bd9c0 R15: 000000000072bf0c [ 495.865291] Mem-Info: [ 495.865307] active_anon:97480 inactive_anon:1269171 isolated_anon:0 [ 495.865307] active_file:196 inactive_file:522 isolated_file:32 [ 495.865307] unevictable:26830 dirty:4 writeback:0 unstable:0 [ 495.865307] slab_reclaimable:7994 slab_unreclaimable:83974 [ 495.865307] mapped:58412 shmem:346 pagetables:11001 bounce:0 [ 495.865307] free:6714 free_pcp:127 free_cma:0 [ 495.865320] Node 0 active_anon:389920kB inactive_anon:5076684kB active_file:784kB inactive_file:2088kB unevictable:107320kB isolated(anon):0kB isolated(file):128kB mapped:233648kB dirty:16kB writeback:0kB shmem:1384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 495.865337] DMA32 free:21176kB min:4684kB low:7692kB high:10700kB active_anon:3528kB inactive_anon:2578820kB active_file:0kB inactive_file:180kB unevictable:36644kB writepending:0kB present:3145324kB managed:3012120kB mlocked:36740kB kernel_stack:5920kB pagetables:19276kB bounce:0kB free_pcp:188kB local_pcp:188kB free_cma:0kB [ 495.865339] lowmem_reserve[]: 0 3505 3505 12:28:53 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:53 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 495.865365] Normal free:5680kB min:5588kB low:9176kB high:12764kB active_anon:386392kB inactive_anon:2498272kB active_file:576kB inactive_file:1684kB unevictable:69828kB writepending:16kB present:4718592kB managed:3589232kB mlocked:69480kB kernel_stack:8256kB pagetables:24728kB bounce:0kB free_pcp:320kB local_pcp:264kB free_cma:0kB [ 495.865367] lowmem_reserve[]: 0 0 0 [ 495.865379] DMA32: 53*4kB (UMH) 79*8kB (UMH) 82*16kB (UH) 494*32kB (UH) 56*64kB (UH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 21548kB [ 495.865431] Normal: 35*4kB (H) 11*8kB (MH) 15*16kB (MH) 118*32kB (U) 12*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5012kB [ 495.865480] 9910 total pagecache pages [ 495.865489] 0 pages in swap cache [ 495.865494] Swap cache stats: add 0, delete 0, find 0/0 [ 495.865496] Free swap = 0kB [ 495.865499] Total swap = 0kB [ 495.865502] 1965979 pages RAM [ 495.865505] 0 pages HighMem/MovableOnly [ 495.865508] 315641 pages reserved [ 495.865511] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 495.865528] [ 190] 0 190 5366 221 15 3 0 -1000 udevd [ 495.865539] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 495.865550] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd ** 409 printk messages dropped ** [ 496.517798] Node 0 active_anon:390060kB inactive_anon:5101228kB active_file:1236kB inactive_file:1456kB unevictable:86308kB isolated(anon):0kB isolated(file):128kB mapped:238748kB dirty:44kB writeback:0kB shmem:1384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 12:28:53 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 496.517814] DMA32 free:18968kB min:4684kB low:7692kB high:10700kB active_anon:3516kB inactive_anon:2587244kB active_file:484kB inactive_file:572kB unevictable:31440kB writepending:20kB present:3145324kB managed:3012120kB mlocked:31480kB kernel_stack:5920kB pagetables:18988kB bounce:0kB free_pcp:24kB local_pcp:24kB free_cma:0kB 12:28:53 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 496.517817] lowmem_reserve[]: 0 3505 3505 [ 496.517843] Normal free:5228kB min:5588kB low:9176kB high:12764kB active_anon:386444kB inactive_anon:2513552kB active_file:1272kB inactive_file:1644kB unevictable:54944kB writepending:124kB present:4718592kB managed:3589232kB mlocked:55272kB kernel_stack:8128kB pagetables:25008kB bounce:0kB free_pcp:276kB local_pcp:0kB free_cma:0kB ** 19 printk messages dropped ** [ 496.518095] [ 1758] 0 1758 3649 41 13 3 0 0 getty ** 368 printk messages dropped ** [ 496.715174] dump_stack+0xb9/0x11b ** 39 printk messages dropped ** [ 496.718085] DMA32 free:21564kB min:4684kB low:7692kB high:10700kB active_anon:3516kB inactive_anon:2585732kB active_file:764kB inactive_file:492kB unevictable:29928kB writepending:20kB present:3145324kB managed:3012120kB mlocked:29776kB kernel_stack:5920kB pagetables:18988kB bounce:0kB free_pcp:332kB local_pcp:196kB free_cma:0kB [ 496.718087] lowmem_reserve[]: 0 3505 3505 [ 496.718113] Normal free:6568kB min:5588kB low:9176kB high:12764kB active_anon:386444kB inactive_anon:2509016kB active_file:672kB inactive_file:1352kB unevictable:58976kB writepending:124kB present:4718592kB managed:3589232kB mlocked:59104kB kernel_stack:8128kB pagetables:25008kB bounce:0kB free_pcp:224kB local_pcp:188kB free_cma:0kB ** 429 printk messages dropped ** [ 497.333128] DMA32 free:18604kB min:4684kB low:7692kB high:10700kB active_anon:3548kB inactive_anon:2590656kB active_file:156kB inactive_file:12kB unevictable:27356kB writepending:4kB present:3145324kB managed:3012120kB mlocked:27208kB kernel_stack:5888kB pagetables:18956kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB ** 26 printk messages dropped ** [ 497.333455] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 ** 372 printk messages dropped ** [ 497.736881] out_of_memory+0x669/0xa60 [ 497.736895] ? oom_killer_disable+0x1f0/0x1f0 ** 31 printk messages dropped ** [ 497.741272] lowmem_reserve[]: 0 3505 3505 [ 497.741296] Normal free:5884kB min:5588kB low:9176kB high:12764kB active_anon:386596kB inactive_anon:2520284kB active_file:1676kB inactive_file:1652kB unevictable:48652kB writepending:136kB present:4718592kB managed:3589232kB mlocked:48448kB kernel_stack:8288kB pagetables:25172kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 497.741298] lowmem_reserve[]: 0 0 0 [ 497.741308] DMA32: 59*4kB (UMH) 50*8kB (UMH) 15*16kB (UH) 459*32kB (UMEH) 53*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18956kB [ 497.741354] Normal: 180*4kB (UMH) 33*8kB (MH) 4*16kB (M) 143*32kB (UM) 10*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6264kB [ 497.741399] 6756 total pagecache pages [ 497.741407] 0 pages in swap cache [ 497.741411] Swap cache stats: add 0, delete 0, find 0/0 [ 497.741414] Free swap = 0kB [ 497.741416] Total swap = 0kB [ 497.741419] 1965979 pages RAM [ 497.741421] 0 pages HighMem/MovableOnly [ 497.741424] 315641 pages reserved [ 497.741427] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 497.741444] [ 190] 0 190 5366 387 15 3 0 -1000 udevd [ 497.741455] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient 12:28:54 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 497.741465] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 497.741475] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 497.741485] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd 12:28:54 executing program 5: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 497.741495] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 497.741506] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 497.741516] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 497.741527] [ 1774] 0 1774 17821 362 40 3 0 0 sshd [ 497.741537] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 497.741547] [ 1832] 0 1832 17553 20 22 3 0 0 syz-executor0 [ 497.741557] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 497.741567] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 497.741577] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 497.741587] [ 1837] 0 1837 17552 8328 23 4 0 0 syz-executor0 [ 497.741597] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 497.741607] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 497.741617] [ 1843] 0 1843 17552 8253 23 4 0 0 syz-executor1 [ 497.741627] [ 1846] 0 1846 17552 8254 23 4 0 0 syz-executor5 [ 497.741636] [ 1847] 0 1847 17552 8243 22 4 0 0 syz-executor3 [ 497.741646] [ 1848] 0 1848 17552 8214 23 4 0 0 syz-executor4 [ 497.741655] [ 1849] 0 1849 17552 8247 23 4 0 0 syz-executor2 [ 497.741666] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 497.741676] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 497.741692] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 497.742886] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 497.742897] [ 4768] 0 4768 5365 470 15 3 0 -1000 udevd [ 497.742907] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 497.742918] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 [ 497.742929] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 12:28:55 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:55 executing program 0: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:55 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:55 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 497.742940] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 497.742950] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 497.742960] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 497.742970] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 497.742980] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 497.742991] [ 5845] 0 5845 17651 12714 32 3 0 1000 syz-executor0 [ 497.743001] [ 5901] 0 5901 17651 12714 32 3 0 1000 syz-executor0 [ 497.743011] [ 5970] 0 5970 17651 12714 32 3 0 1000 syz-executor0 [ 497.743021] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 497.743032] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 497.743042] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 [ 497.743053] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 497.743063] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 [ 497.743074] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 497.743084] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 497.743094] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 497.743104] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 497.743114] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 497.743125] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 [ 497.743135] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 497.743145] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 497.743155] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 12:28:56 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:56 executing program 5: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:56 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:56 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 497.743166] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 497.743176] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 497.743186] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 497.743196] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 497.743206] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 497.743216] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 497.743226] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 497.743236] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 497.743246] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 497.743257] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 ** 294 printk messages dropped ** [ 497.753952] [16998] 0 16998 17651 12651 31 3 0 1000 syz-executor2 ** 95 printk messages dropped ** [ 497.822508] [ 1847] 0 1847 17552 8243 22 4 0 0 syz-executor3 [ 497.822518] [ 1848] 0 1848 17552 8214 23 4 0 0 syz-executor4 [ 497.822527] [ 1849] 0 1849 17552 8235 23 4 0 0 syz-executor2 [ 497.822537] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 497.822547] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 497.822557] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 497.822567] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 497.822577] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd [ 497.822587] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 497.822597] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 [ 497.822609] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 497.822619] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 497.822629] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 497.822639] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 497.822649] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 497.822659] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 497.822668] [ 5845] 0 5845 17651 12714 32 3 0 1000 syz-executor0 [ 497.822678] [ 5901] 0 5901 17651 12714 32 3 0 1000 syz-executor0 [ 497.822688] [ 5970] 0 5970 17651 12714 32 3 0 1000 syz-executor0 [ 497.822698] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 497.822708] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 497.822719] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 [ 497.822729] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 497.822739] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 [ 497.822749] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 497.822758] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 497.822768] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 497.822778] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 497.822796] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 497.822811] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 [ 497.822821] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 497.822831] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 497.822841] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 497.822851] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 497.822861] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 497.822871] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 497.822880] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 497.822890] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 497.822900] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 497.822910] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 497.822920] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 497.822929] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 ** 71 printk messages dropped ** [ 497.823643] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 ** 274 printk messages dropped ** [ 498.014817] SyS_newstat+0x81/0xf0 ** 52 printk messages dropped ** [ 498.017849] [ 1847] 0 1847 17552 8243 22 4 0 0 syz-executor3 [ 498.017859] [ 1848] 0 1848 17552 8214 23 4 0 0 syz-executor4 [ 498.017868] [ 1849] 0 1849 17552 8235 23 4 0 0 syz-executor2 [ 498.017879] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 498.017889] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 498.017899] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 ** 77 printk messages dropped ** [ 498.021143] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 ** 43 printk messages dropped ** [ 498.021594] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 ** 119 printk messages dropped ** [ 498.027742] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 ** 181 printk messages dropped ** [ 500.166323] lowmem_reserve[]: 0 0 0 [ 500.166335] DMA32: 5*4kB (MH) 8*8kB (MH) 39*16kB (UH) 302*32kB (UH) 127*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18500kB [ 500.166386] Normal: 59*4kB (UMEH) 20*8kB (UMH) 21*16kB (UMH) 46*32kB (UMH) 53*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5596kB [ 500.166433] 9833 total pagecache pages [ 500.166442] 0 pages in swap cache [ 500.166446] Swap cache stats: add 0, delete 0, find 0/0 [ 500.166448] Free swap = 0kB [ 500.166451] Total swap = 0kB [ 500.166454] 1965979 pages RAM [ 500.166457] 0 pages HighMem/MovableOnly [ 500.166460] 315641 pages reserved 12:28:57 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 500.166463] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name 12:28:57 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 500.166481] [ 190] 0 190 5366 444 15 3 0 -1000 udevd [ 500.166491] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 500.166501] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 500.166511] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 500.166521] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 500.166532] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond ** 206 printk messages dropped ** [ 500.169086] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 ** 545 printk messages dropped ** [ 500.655049] [15138] 0 15138 2667 34 10 3 0 0 init ** 103 printk messages dropped ** [ 500.746314] lowmem_reserve[]: 0 0 0 [ 500.746413] DMA32: 19*4kB (UMH) 19*8kB (UMH) 28*16kB (UMH) 305*32kB (UMH) 127*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18564kB ** 324 printk messages dropped ** [ 500.787903] [14846] 0 14846 17651 12714 32 3 0 1000 syz-executor0 ** 107 printk messages dropped ** [ 501.284791] Normal: 8*4kB (H) 8*8kB (H) 6*16kB (UH) 37*32kB (UH) 57*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5024kB [ 501.284840] 12396 total pagecache pages [ 501.284848] 0 pages in swap cache [ 501.284853] Swap cache stats: add 0, delete 0, find 0/0 [ 501.284856] Free swap = 0kB [ 501.284859] Total swap = 0kB [ 501.284862] 1965979 pages RAM [ 501.284865] 0 pages HighMem/MovableOnly [ 501.284867] 315641 pages reserved [ 501.284871] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 501.284890] [ 190] 0 190 5366 444 15 3 0 -1000 udevd ** 65 printk messages dropped ** [ 501.289340] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 ** 359 printk messages dropped ** [ 501.331719] Normal: 10*4kB (UMH) 13*8kB (EH) 6*16kB (UEH) 36*32kB (UH) 57*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5040kB [ 501.331769] 11855 total pagecache pages [ 501.331777] 0 pages in swap cache [ 501.331782] Swap cache stats: add 0, delete 0, find 0/0 [ 501.331785] Free swap = 0kB [ 501.331787] Total swap = 0kB [ 501.331790] 1965979 pages RAM [ 501.331793] 0 pages HighMem/MovableOnly [ 501.331796] 315641 pages reserved [ 501.331799] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name 12:28:58 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:28:58 executing program 5: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 501.331817] [ 190] 0 190 5366 167 15 3 0 -1000 udevd [ 501.331829] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 501.331840] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 501.331852] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 501.331863] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 501.331874] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 501.331884] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 501.331895] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 501.331905] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 501.331916] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 501.331927] [ 1832] 0 1832 17553 20 22 3 0 0 syz-executor0 [ 501.331938] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 501.331949] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 501.331960] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 ** 417 printk messages dropped ** [ 501.384387] 1965979 pages RAM [ 501.384390] 0 pages HighMem/MovableOnly [ 501.384392] 315641 pages reserved [ 501.384395] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name ** 438 printk messages dropped ** [ 501.462947] 0 pages HighMem/MovableOnly [ 501.462950] 315641 pages reserved [ 501.462954] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 501.462975] [ 190] 0 190 5366 167 15 3 0 -1000 udevd [ 501.462988] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 501.463000] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 501.463013] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 501.463031] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 501.463043] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond 12:28:58 executing program 0: futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:28:58 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200), 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 501.463056] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 501.463068] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 501.463080] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 501.463093] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 501.463106] [ 1832] 0 1832 17553 20 22 3 0 0 syz-executor0 [ 501.463122] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 501.463309] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 501.463321] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 501.463333] [ 1837] 0 1837 17552 8324 23 4 0 0 syz-executor0 [ 501.463346] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 12:28:59 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 501.463359] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 12:28:59 executing program 5: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 501.463371] [ 1843] 0 1843 17552 8291 23 4 0 0 syz-executor1 [ 501.463383] [ 1846] 0 1846 17552 8236 23 4 0 0 syz-executor5 [ 501.463395] [ 1847] 0 1847 17552 8281 22 4 0 0 syz-executor3 [ 501.463406] [ 1848] 0 1848 17552 8300 23 4 0 0 syz-executor4 12:28:59 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 501.463418] [ 1849] 0 1849 17552 8294 23 4 0 0 syz-executor2 [ 501.463433] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 501.463445] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 501.463458] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 501.463471] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 501.463484] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd [ 501.463500] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 ** 154 printk messages dropped ** [ 501.465836] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 ** 255 printk messages dropped ** [ 502.233035] [ 190] 0 190 5366 226 15 3 0 -1000 udevd ** 2 printk messages dropped ** [ 502.233074] [ 1679] 0 1679 4725 50 15 3 0 0 cron ** 1 printk messages dropped ** [ 502.233101] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 502.233114] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 502.233126] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 502.233140] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 502.233152] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 502.233165] [ 1832] 0 1832 17553 20 22 3 0 0 syz-executor0 [ 502.233178] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 502.233190] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 502.233202] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 502.233214] [ 1837] 0 1837 17552 8324 23 4 0 0 syz-executor0 [ 502.233228] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 12:29:00 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200), 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:00 executing program 5: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 502.233242] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 502.233256] [ 1843] 0 1843 17552 8291 23 4 0 0 syz-executor1 [ 502.233269] [ 1846] 0 1846 17552 8224 23 4 0 0 syz-executor5 [ 502.233281] [ 1847] 0 1847 17552 8280 22 4 0 0 syz-executor3 12:29:00 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 502.233292] [ 1848] 0 1848 17552 8300 23 4 0 0 syz-executor4 [ 502.233304] [ 1849] 0 1849 17552 8277 23 4 0 0 syz-executor2 [ 502.233318] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 502.233331] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 502.233344] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 502.233355] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 502.233367] [ 4768] 0 4768 5365 241 15 3 0 -1000 udevd [ 502.233380] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 502.233393] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 [ 502.233408] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 502.233421] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 502.233434] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 502.233459] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 502.233471] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 502.233485] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 502.233499] [ 5845] 0 5845 17651 12714 32 3 0 1000 syz-executor0 [ 502.233513] [ 5901] 0 5901 17651 12714 32 3 0 1000 syz-executor0 [ 502.233526] [ 5970] 0 5970 17651 12714 32 3 0 1000 syz-executor0 [ 502.233539] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 502.233552] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 502.233565] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 [ 502.233579] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 12:29:00 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200), 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:00 executing program 5: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 502.233592] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 [ 502.233605] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 502.233618] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 502.233632] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 502.233645] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 12:29:01 executing program 0: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 502.233658] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 502.233671] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 [ 502.233685] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 502.233698] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 502.233711] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 502.233724] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 502.233736] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 502.233749] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 502.233761] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 502.233774] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 502.233787] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 502.233800] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 12:29:01 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) [ 502.233813] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 502.233827] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 502.233840] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 502.233854] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 502.233867] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 502.233880] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 502.233893] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 502.233907] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 502.233919] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 ** 389 printk messages dropped ** [ 502.300832] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 ** 438 printk messages dropped ** [ 503.488209] [ 1848] 0 1848 17552 8296 23 4 0 0 syz-executor4 [ 503.488220] [ 1849] 0 1849 17552 8277 23 4 0 0 syz-executor2 [ 503.488231] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 ** 160 printk messages dropped ** [ 503.509698] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 ** 275 printk messages dropped ** [ 505.385796] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 505.385806] [ 1776] 0 1776 124934 91905 206 5 0 0 syz-fuzzer [ 505.385817] [ 1832] 0 1832 17553 20 22 3 0 0 syz-executor0 [ 505.385826] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 505.385859] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 505.385869] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 505.385879] [ 1837] 0 1837 17552 8316 23 4 0 0 syz-executor0 [ 505.385889] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 12:29:01 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:01 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x0, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 505.385899] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 505.385909] [ 1843] 0 1843 17552 8272 23 4 0 0 syz-executor1 [ 505.385918] [ 1846] 0 1846 17552 8296 23 4 0 0 syz-executor5 [ 505.385928] [ 1847] 0 1847 17552 8261 22 4 0 0 syz-executor3 [ 505.385938] [ 1848] 0 1848 17552 8292 23 4 0 0 syz-executor4 [ 505.385948] [ 1849] 0 1849 17552 8274 23 4 0 0 syz-executor2 [ 505.385958] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 505.385968] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 505.385978] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 505.385989] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 12:29:02 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 505.385999] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd [ 505.386009] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 505.386019] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 [ 505.386031] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 ** 419 printk messages dropped ** [ 505.398030] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 505.398040] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 505.398049] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 ** 331 printk messages dropped ** [ 505.401618] [16404] 0 16404 17618 8228 26 3 0 1000 syz-executor0 ** 108 printk messages dropped ** [ 505.436178] [ 1837] 0 1837 17552 8316 23 4 0 0 syz-executor0 [ 505.436188] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 505.436198] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 505.436215] [ 1843] 0 1843 17552 8272 23 4 0 0 syz-executor1 ** 439 printk messages dropped ** [ 506.266175] [ 1846] 0 1846 17552 8296 23 4 0 0 syz-executor5 [ 506.266185] [ 1847] 0 1847 17552 8261 22 4 0 0 syz-executor3 [ 506.266195] [ 1848] 0 1848 17552 8276 23 4 0 0 syz-executor4 [ 506.266205] [ 1849] 0 1849 17552 8274 23 4 0 0 syz-executor2 ** 421 printk messages dropped ** [ 506.352295] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name ** 16 printk messages dropped ** [ 506.352472] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 ** 439 printk messages dropped ** [ 506.403171] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 506.403181] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 506.403191] [ 1837] 0 1837 17552 8316 23 4 0 0 syz-executor0 [ 506.403201] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 12:29:03 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 506.403211] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 506.403221] [ 1843] 0 1843 17552 8272 23 4 0 0 syz-executor1 [ 506.403230] [ 1846] 0 1846 17552 8296 23 4 0 0 syz-executor5 [ 506.403240] [ 1847] 0 1847 17552 8237 22 4 0 0 syz-executor3 [ 506.403249] [ 1848] 0 1848 17552 8276 23 4 0 0 syz-executor4 [ 506.403259] [ 1849] 0 1849 17552 8274 23 4 0 0 syz-executor2 12:29:03 executing program 0: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 506.403269] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 506.403280] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 506.403290] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 506.403299] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 12:29:03 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x0, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 506.403309] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd [ 506.403319] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 506.403329] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 [ 506.403340] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 12:29:03 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 506.403350] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 506.403360] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 506.403370] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 506.403379] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 506.403389] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 506.403399] [ 5901] 0 5901 17651 12714 32 3 0 1000 syz-executor0 [ 506.403409] [ 5970] 0 5970 17651 12714 32 3 0 1000 syz-executor0 [ 506.403419] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 506.403429] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 506.403439] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 12:29:04 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 506.403449] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 506.403459] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 12:29:04 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 506.403469] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 506.403478] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 506.403488] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 506.403498] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 506.403508] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 506.403517] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 12:29:04 executing program 0: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 506.403527] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 506.403537] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 506.403547] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 12:29:04 executing program 3: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 506.403557] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 506.403567] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 506.403577] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 12:29:04 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) mlockall(0x3) [ 506.403587] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 506.403598] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 506.403607] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 506.403617] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 506.403627] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 506.403637] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 506.403647] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 506.403657] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 506.403667] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 506.403677] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 506.403687] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 506.403696] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 506.403706] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 ** 21 printk messages dropped ** [ 506.404101] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 ** 13 printk messages dropped ** [ 506.404253] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 ** 121 printk messages dropped ** [ 506.405664] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 ** 34 printk messages dropped ** [ 506.406199] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 ** 92 printk messages dropped ** [ 506.407319] [16780] 0 16780 17618 8230 25 3 0 1000 syz-executor4 ** 110 printk messages dropped ** [ 506.445800] [ 1847] 0 1847 17552 8228 22 4 0 0 syz-executor3 [ 506.445809] [ 1848] 0 1848 17552 8276 23 4 0 0 syz-executor4 [ 506.445819] [ 1849] 0 1849 17552 8274 23 4 0 0 syz-executor2 [ 506.445829] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 506.445839] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 506.445849] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 506.445858] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 12:29:05 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 506.445868] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd [ 506.445878] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 506.445888] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 ** 439 printk messages dropped ** [ 506.504283] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 506.504293] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 506.504304] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 506.504321] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 506.504332] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 12:29:05 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) mlockall(0x3) [ 506.504343] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 506.504354] [ 5901] 0 5901 17651 12714 32 3 0 1000 syz-executor0 [ 506.504365] [ 5970] 0 5970 17651 12714 32 3 0 1000 syz-executor0 [ 506.504377] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 506.504388] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 506.504399] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 [ 506.504410] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 506.504421] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 [ 506.504431] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 506.504442] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 506.504452] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 506.504461] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 506.504471] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 506.504481] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 [ 506.504491] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 12:29:06 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 506.504501] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 506.504513] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 506.504523] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 506.504534] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 506.504544] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 506.504555] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 506.504565] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 506.504577] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 506.504587] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 506.504598] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 12:29:06 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) mlockall(0x3) 12:29:06 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x0, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:06 executing program 3: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 506.504609] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 12:29:06 executing program 0: futex(0x0, 0x0, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 506.504620] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 12:29:07 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) [ 506.504630] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 506.504640] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 506.504651] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 506.504662] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 506.504673] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 506.504683] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 [ 506.504694] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 [ 506.504704] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 [ 506.504716] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 [ 506.504726] [ 7028] 0 7028 17651 12714 31 3 0 1000 syz-executor1 [ 506.504737] [ 7062] 0 7062 17651 12714 32 3 0 1000 syz-executor0 [ 506.504748] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 [ 506.504759] [ 7097] 0 7097 17651 12714 31 3 0 1000 syz-executor1 [ 506.504769] [ 7099] 0 7099 17651 12714 30 3 0 1000 syz-executor3 [ 506.504780] [ 7134] 0 7134 17651 12714 32 3 0 1000 syz-executor0 [ 506.504790] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 [ 506.504801] [ 7203] 0 7203 17618 12682 32 3 0 1000 syz-executor0 [ 506.504811] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 [ 506.504822] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 506.504833] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 506.504844] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 506.504855] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 506.504866] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 [ 506.504877] [ 7336] 0 7336 17618 12682 32 3 0 1000 syz-executor0 [ 506.504888] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 [ 506.504898] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 ** 101 printk messages dropped ** [ 506.506027] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 ** 75 printk messages dropped ** [ 506.506888] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 ** 94 printk messages dropped ** [ 506.507921] [17078] 0 17078 17618 8235 25 3 0 1000 syz-executor4 ** 72 printk messages dropped ** [ 508.766667] DMA32: 52*4kB (UMH) 16*8kB (UMH) 18*16kB (UMH) 343*32kB (UMH) 119*64kB (UEH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 19216kB ** 62 printk messages dropped ** [ 508.792203] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 508.792244] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 508.792433] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 508.792493] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 508.792542] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 508.792623] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 508.792664] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 508.792711] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 508.792753] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 508.792793] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 508.792833] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 508.793011] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 508.793052] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 508.793093] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 508.793134] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 [ 508.793241] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 [ 508.793282] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 12:29:07 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 508.793344] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 [ 508.793432] [ 7028] 0 7028 17651 12714 31 3 0 1000 syz-executor1 12:29:07 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 508.793494] [ 7062] 0 7062 17651 12714 32 3 0 1000 syz-executor0 [ 508.793562] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 [ 508.793623] [ 7097] 0 7097 17651 12714 31 3 0 1000 syz-executor1 [ 508.793663] [ 7099] 0 7099 17651 12714 30 3 0 1000 syz-executor3 [ 508.793704] [ 7134] 0 7134 17651 12714 32 3 0 1000 syz-executor0 [ 508.793771] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 [ 508.793832] [ 7203] 0 7203 17618 12682 32 3 0 1000 syz-executor0 [ 508.793873] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 [ 508.793914] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 508.793981] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 508.794123] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 508.794164] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 508.794493] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 ** 253 printk messages dropped ** [ 508.837990] [16167] 0 16167 17618 8227 25 3 0 1000 syz-executor0 ** 167 printk messages dropped ** [ 509.234900] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 509.234910] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 509.234929] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 509.234940] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 509.234951] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 509.234962] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 509.234972] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 509.234983] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 509.234994] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 509.235005] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 509.235016] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 [ 509.235027] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 [ 509.235037] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 [ 509.235048] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 ** 37 printk messages dropped ** [ 509.235468] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 ** 111 printk messages dropped ** [ 509.236717] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 ** 176 printk messages dropped ** [ 509.814657] Out of memory: Kill process 17349 (syz-executor2) score 1007 or sacrifice child ** 114 printk messages dropped ** [ 511.233371] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 511.233447] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 511.233489] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 511.233530] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 511.233572] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 511.233620] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 511.233660] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 511.233701] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 511.233785] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 511.233881] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 ** 45 printk messages dropped ** [ 511.236689] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 ** 221 printk messages dropped ** [ 511.269325] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 ** 175 printk messages dropped ** [ 512.037075] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 512.037086] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 512.037097] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 ** 122 printk messages dropped ** [ 512.045565] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 ** 265 printk messages dropped ** [ 512.251975] Node 0 active_anon:392368kB inactive_anon:5111880kB active_file:132kB inactive_file:152kB unevictable:116408kB isolated(anon):0kB isolated(file):0kB mapped:241464kB dirty:0kB writeback:0kB shmem:1472kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 12:29:09 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:09 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) ** 63 printk messages dropped ** [ 512.264858] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 512.264898] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 512.265006] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 512.265067] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 512.265107] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 12:29:09 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 512.265148] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 512.265188] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 512.265235] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 512.265436] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 12:29:09 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 512.265558] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 512.265598] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 512.265727] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 512.265769] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 512.265898] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 12:29:09 executing program 0: futex(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 512.265938] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 512.266006] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 512.266066] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 512.266287] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 512.266328] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 [ 512.266369] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 ** 434 printk messages dropped ** [ 512.538287] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 ** 454 printk messages dropped ** [ 512.657589] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 ** 376 printk messages dropped ** [ 513.819884] ? do_syscall_64+0x43/0x4b0 ** 73 printk messages dropped ** [ 513.834479] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 513.834490] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 [ 513.834506] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 513.834668] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 513.834679] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 513.834690] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 513.834701] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 513.834712] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 ** 442 printk messages dropped ** [ 513.936367] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 513.936377] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 513.936388] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 513.936399] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 ** 267 printk messages dropped ** [ 513.945926] [14907] 0 14907 17651 12624 31 3 0 1000 syz-executor2 ** 178 printk messages dropped ** [ 513.996794] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 513.996805] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 ** 1 printk messages dropped ** [ 513.996827] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 12:29:10 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 513.996838] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 513.996849] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 12:29:10 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 513.996860] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 12:29:10 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 513.996871] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 513.996883] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 513.996894] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 513.996904] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 513.996915] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 513.996926] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 12:29:11 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) [ 513.996935] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 513.996946] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 513.996957] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 513.996968] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 513.996979] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 513.996989] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 12:29:11 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 513.997001] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 513.997011] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 513.997023] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 513.997034] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 513.997045] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 513.997056] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 12:29:11 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 513.997074] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 [ 513.997085] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 [ 513.997096] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 [ 513.997107] [ 7028] 0 7028 17651 12714 31 3 0 1000 syz-executor1 [ 513.997118] [ 7062] 0 7062 17651 12714 32 3 0 1000 syz-executor0 [ 513.997129] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 [ 513.997140] [ 7097] 0 7097 17651 12714 31 3 0 1000 syz-executor1 [ 513.997151] [ 7099] 0 7099 17651 12714 30 3 0 1000 syz-executor3 [ 513.997162] [ 7134] 0 7134 17651 12714 32 3 0 1000 syz-executor0 [ 513.997173] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 [ 513.997184] [ 7203] 0 7203 17618 12682 32 3 0 1000 syz-executor0 [ 513.997195] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 [ 513.997207] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 513.997218] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 513.997229] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 513.997240] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 513.997250] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 [ 513.997261] [ 7336] 0 7336 17618 12682 32 3 0 1000 syz-executor0 [ 513.997272] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 [ 513.997283] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 [ 513.997294] [ 7379] 0 7379 17651 12714 30 3 0 1000 syz-executor3 [ 513.997306] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 [ 513.997317] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 [ 513.997327] [ 7457] 0 7457 17651 12714 31 3 0 1000 syz-executor1 [ 513.997338] [ 7460] 0 7460 17651 12714 31 3 0 1000 syz-executor4 [ 513.997349] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 513.997361] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 [ 513.997372] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 513.997383] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 513.997394] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 513.997406] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 513.997417] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 [ 513.997427] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 513.997439] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 513.997450] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 513.997461] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 513.997472] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 513.997483] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 513.997494] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 513.997505] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 12:29:12 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 513.997516] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 12:29:12 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 513.997528] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 513.997539] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 513.997559] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 [ 513.997570] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 513.997579] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 [ 513.997588] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 513.997599] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 513.997610] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 513.997622] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 [ 513.997633] [ 8228] 0 8228 17651 12714 31 3 0 1000 syz-executor1 [ 513.997644] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 12:29:13 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:13 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) [ 513.997654] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 [ 513.997665] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 [ 513.997675] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 [ 513.997686] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 513.997697] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 513.997707] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 513.997717] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 [ 513.997728] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 513.997739] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 513.997749] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 12:29:13 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:13 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 513.997760] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 513.997771] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 513.997781] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 [ 513.997793] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 513.997804] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 [ 513.997815] [ 8978] 0 8978 17651 12714 32 3 0 1000 syz-executor0 [ 513.997826] [ 9016] 0 9016 17618 8206 26 3 0 1000 syz-executor0 [ 513.997837] [ 9040] 0 9040 17651 12714 31 3 0 1000 syz-executor4 [ 513.997848] [ 9105] 0 9105 17651 12714 32 3 0 1000 syz-executor0 [ 513.997859] [ 9118] 0 9118 17618 8256 25 4 0 1000 syz-executor4 [ 513.997870] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 [ 513.997881] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 513.997891] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 [ 513.997902] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 513.997913] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 513.997924] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 513.997935] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 [ 513.997945] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 513.997956] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 513.997967] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 ** 125 printk messages dropped ** [ 513.999433] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 ** 210 printk messages dropped ** [ 514.098908] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 ** 29 printk messages dropped ** [ 514.099209] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 514.099219] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 514.099229] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 514.099239] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 12:29:14 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 514.099250] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 12:29:14 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 514.099259] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 [ 514.099269] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 [ 514.099279] [ 7028] 0 7028 17651 12714 31 3 0 1000 syz-executor1 [ 514.099289] [ 7062] 0 7062 17651 12714 32 3 0 1000 syz-executor0 [ 514.099300] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 [ 514.099309] [ 7097] 0 7097 17651 12714 31 3 0 1000 syz-executor1 12:29:14 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 514.099319] [ 7099] 0 7099 17651 12714 30 3 0 1000 syz-executor3 [ 514.099329] [ 7134] 0 7134 17651 12714 32 3 0 1000 syz-executor0 [ 514.099339] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 [ 514.099349] [ 7203] 0 7203 17618 12682 32 3 0 1000 syz-executor0 [ 514.099359] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 [ 514.099369] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 514.099379] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 514.099389] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 514.099399] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 514.099409] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 12:29:15 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 514.099419] [ 7336] 0 7336 17618 12682 32 3 0 1000 syz-executor0 [ 514.099429] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 [ 514.099439] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 [ 514.099449] [ 7379] 0 7379 17651 12714 30 3 0 1000 syz-executor3 [ 514.099460] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 [ 514.099470] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 [ 514.099479] [ 7457] 0 7457 17651 12714 31 3 0 1000 syz-executor1 [ 514.099489] [ 7460] 0 7460 17651 12714 31 3 0 1000 syz-executor4 [ 514.099499] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 514.099509] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 12:29:15 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:15 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:15 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:15 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 514.099519] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 514.099529] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 514.099548] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 514.099563] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 514.099573] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 [ 514.099584] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 514.099593] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 514.099603] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 514.099613] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 514.099623] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 514.099634] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 514.099644] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 514.099654] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 514.099664] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 514.099674] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 514.099685] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 514.099695] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 [ 514.099705] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 514.099715] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 [ 514.099725] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 514.099736] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 514.099745] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 514.099755] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 [ 514.099765] [ 8228] 0 8228 17651 12714 31 3 0 1000 syz-executor1 ** 79 printk messages dropped ** [ 514.100677] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 ** 290 printk messages dropped ** [ 514.171322] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 ** 41 printk messages dropped ** [ 514.173089] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 514.173101] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 514.173112] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 514.173123] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 514.173135] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 [ 514.173146] [ 7336] 0 7336 17618 12682 32 3 0 1000 syz-executor0 [ 514.173157] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 12:29:16 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:16 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 514.173168] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 [ 514.173180] [ 7379] 0 7379 17651 12714 30 3 0 1000 syz-executor3 [ 514.173191] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 [ 514.173202] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 [ 514.173213] [ 7457] 0 7457 17651 12714 31 3 0 1000 syz-executor1 [ 514.173224] [ 7460] 0 7460 17651 12714 31 3 0 1000 syz-executor4 [ 514.173235] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 514.173246] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 [ 514.173257] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 514.173269] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 ** 452 printk messages dropped ** [ 517.777954] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 [ 517.778082] [ 7379] 0 7379 17651 12714 30 3 0 1000 syz-executor3 [ 517.778202] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 [ 517.778244] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 [ 517.778303] [ 7457] 0 7457 17651 12714 31 3 0 1000 syz-executor1 [ 517.778354] [ 7460] 0 7460 17651 12714 31 3 0 1000 syz-executor4 [ 517.778483] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 517.778522] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 [ 517.778664] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 517.778703] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 517.778880] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 517.778922] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 517.778962] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 [ 517.779003] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 517.779043] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 517.779091] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 517.779424] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 517.779502] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 517.779543] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 517.779583] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 517.779623] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 517.779751] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 517.779932] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 517.779973] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 517.780192] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 [ 517.784560] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 12:29:17 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:17 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 517.784604] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 12:29:17 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 517.784655] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 517.784706] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 517.784756] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 517.784806] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 [ 517.784856] [ 8228] 0 8228 17651 12714 31 3 0 1000 syz-executor1 [ 517.784906] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 [ 517.784956] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 [ 517.785006] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 [ 517.785055] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 [ 517.785106] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 517.785156] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 517.785205] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 517.785255] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 [ 517.785325] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 517.785376] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 517.785426] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 517.785476] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 517.785526] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 517.785577] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 ** 419 printk messages dropped ** [ 519.881550] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 519.881624] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 [ 519.881688] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 519.881731] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 519.881807] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 519.881868] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 519.881910] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 [ 519.881954] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 519.881981] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 519.882061] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 519.882212] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 519.882321] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 519.882429] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 519.882470] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 519.882510] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 519.882551] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 519.882598] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 519.882679] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 519.882721] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 12:29:18 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 519.882762] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 519.882909] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 [ 519.882950] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 519.882992] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 519.883040] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 519.883081] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 [ 519.883167] [ 8228] 0 8228 17651 12714 31 3 0 1000 syz-executor1 [ 519.883210] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 [ 519.883335] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 [ 519.883384] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 [ 519.883425] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 [ 519.883465] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 519.883646] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 519.883754] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 519.883794] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 12:29:19 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 519.883836] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 519.883884] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 519.883925] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 12:29:19 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 519.883981] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 519.884110] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 519.884171] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 [ 519.884293] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 519.884334] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 [ 519.884476] [ 8978] 0 8978 17651 12714 32 3 0 1000 syz-executor0 [ 519.884524] [ 9016] 0 9016 17618 8206 26 3 0 1000 syz-executor0 [ 519.884605] [ 9040] 0 9040 17651 12714 31 3 0 1000 syz-executor4 [ 519.884962] [ 9105] 0 9105 17651 12714 32 3 0 1000 syz-executor0 [ 519.885024] [ 9118] 0 9118 17618 8256 25 4 0 1000 syz-executor4 [ 519.885085] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 [ 519.885173] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 519.885294] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 [ 519.885339] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 519.885366] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 519.885592] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 519.885679] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 12:29:19 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:19 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:19 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:19 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 519.885740] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 519.885881] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 519.885922] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 [ 519.885963] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 519.886010] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 519.886051] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 519.886092] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 519.886142] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 519.886189] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 519.886351] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 519.886391] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 519.886432] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 519.886472] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 519.886761] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 519.886809] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 519.886850] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 519.886912] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 12:29:20 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 519.887140] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 519.887180] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 519.887222] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 519.887294] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 [ 519.887324] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 [ 519.887353] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 [ 519.887401] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 519.887470] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 519.887628] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 ** 391 printk messages dropped ** [ 520.617581] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 520.617591] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 520.617601] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 520.617612] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 ** 136 printk messages dropped ** [ 520.619114] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 ** 139 printk messages dropped ** [ 520.624210] [17345] 0 17345 17618 8235 25 3 0 1000 syz-executor4 ** 190 printk messages dropped ** [ 521.846903] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 521.846914] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 12:29:20 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:20 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 521.846925] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 521.846937] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 521.846956] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 521.846967] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 521.846977] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 521.846988] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 521.846999] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 12:29:21 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 521.847010] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 521.847021] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 521.847032] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 [ 521.847042] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 521.847053] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 [ 521.847063] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 521.847074] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 12:29:21 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) ** 453 printk messages dropped ** [ 524.393575] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 524.393586] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 524.393597] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 524.393608] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 524.393620] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 524.393631] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 524.393642] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 ** 239 printk messages dropped ** [ 524.396346] [16653] 0 16653 17618 8228 26 3 0 1000 syz-executor0 ** 697 printk messages dropped ** [ 525.184018] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 ** 409 printk messages dropped ** [ 525.359758] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 ** 62 printk messages dropped ** [ 525.366488] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 525.366500] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 12:29:22 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:22 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 525.366512] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 525.366524] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 12:29:22 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:22 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 525.366534] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 525.366546] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 525.366557] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 525.366569] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 525.366579] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 12:29:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f000000c380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 525.366590] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 525.366600] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 12:29:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc)={0x0, 0x0, 0x3}, 0x4) [ 525.366610] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 525.366621] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 525.366632] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 525.366643] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 ** 189 printk messages dropped ** [ 525.375329] [14771] 0 14771 17651 12714 30 3 0 1000 syz-executor3 ** 270 printk messages dropped ** [ 525.426180] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 ** 49 printk messages dropped ** [ 525.426746] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 ** 424 printk messages dropped ** [ 525.475752] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 525.475763] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 525.475774] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 525.475785] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 ** 467 printk messages dropped ** [ 526.227182] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 526.227194] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 ** 468 printk messages dropped ** [ 526.281069] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 ** 2 printk messages dropped ** [ 526.281098] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 526.281108] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 526.281119] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 526.281128] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 [ 526.281143] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 526.281201] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 [ 526.281211] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 526.281221] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 526.281231] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 526.281240] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 [ 526.281250] [ 8228] 0 8228 17651 12714 31 3 0 1000 syz-executor1 12:29:22 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:22 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:22 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:22 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 526.281260] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 12:29:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@nat={'\nat\x00', 0x19, 0x1, 0x170, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x90, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}, 0x1e8) [ 526.281270] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 [ 526.281280] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 [ 526.281290] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 [ 526.281300] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 526.281310] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 526.281320] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 526.281330] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 [ 526.281341] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 526.281351] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 526.281361] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 526.281370] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 526.281380] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 526.281390] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 [ 526.281400] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 526.281410] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 [ 526.281420] [ 8978] 0 8978 17651 12714 32 3 0 1000 syz-executor0 [ 526.281430] [ 9016] 0 9016 17618 8206 26 3 0 1000 syz-executor0 [ 526.281440] [ 9040] 0 9040 17651 12714 31 3 0 1000 syz-executor4 [ 526.281450] [ 9105] 0 9105 17651 12714 32 3 0 1000 syz-executor0 [ 526.281460] [ 9118] 0 9118 17618 8256 25 4 0 1000 syz-executor4 [ 526.281470] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 [ 526.281480] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 526.281490] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 [ 526.281500] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 526.281510] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 526.281520] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 526.281530] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 [ 526.281540] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 526.281550] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 526.281560] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 [ 526.281570] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 526.281580] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 526.281591] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 526.281601] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 526.281619] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 526.281634] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 526.281645] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 526.281655] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 526.281665] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 526.281675] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 526.281685] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 526.281695] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 526.281705] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 526.281715] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 526.281725] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 526.281735] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 526.281745] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 526.281755] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 [ 526.281765] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 [ 526.281775] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 [ 526.281784] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 526.281794] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 526.281804] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 526.281814] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 526.281824] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 [ 526.281833] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 [ 526.281844] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 526.281854] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 526.281864] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 [ 526.281874] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 526.281884] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 526.281894] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 526.281904] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 526.281914] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 526.281924] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 526.281933] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 526.281943] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 526.281953] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 526.281963] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 526.281973] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 526.281983] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 526.281993] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 526.282003] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 526.282014] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 [ 526.282024] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 [ 526.282034] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 [ 526.282045] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 526.282054] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 526.282065] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 526.282075] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 526.282085] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 526.282095] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 526.282105] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 526.282115] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 526.282126] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 526.282136] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 526.282146] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 526.282156] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 526.282166] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 526.282176] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 [ 526.282186] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 526.282196] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 526.282206] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 526.282216] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 526.282226] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 [ 526.282240] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 526.282293] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 526.282304] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 526.282314] [11756] 0 11756 5365 169 15 3 0 -1000 udevd [ 526.282323] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 526.282334] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 526.282344] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 526.282354] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 526.282364] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 526.282374] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 526.282384] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 526.282395] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 526.282405] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 526.282415] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 526.282425] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 [ 526.282435] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 526.282445] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 526.282455] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 526.282465] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 526.282475] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 526.282485] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 526.282495] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 526.282505] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 526.282515] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 526.282525] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 526.282535] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 526.282545] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 526.282555] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 526.282565] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 526.282576] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 526.282586] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 526.282596] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 [ 526.282606] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 526.282623] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 [ 526.282637] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 526.282647] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 526.282657] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 526.282668] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 526.282678] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 526.282688] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 526.282698] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 526.282708] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 526.282718] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 526.282729] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 526.282739] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 526.282749] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 526.282759] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 526.282769] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 526.282779] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 526.282789] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 526.282798] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 526.282809] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 526.282819] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 526.282828] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 526.282838] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 526.282849] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 526.282859] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 526.282870] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 526.282881] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 526.282890] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 526.282900] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 [ 526.282910] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 526.282921] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 [ 526.282931] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 526.282941] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 526.282951] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 [ 526.282961] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 526.282971] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 526.282980] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 [ 526.282991] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 [ 526.283001] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 526.283011] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 526.283021] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 [ 526.283031] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 526.283041] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 526.283051] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 526.283062] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 526.283072] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 [ 526.283081] [14590] 0 14590 17651 12714 31 3 0 1000 syz-executor2 [ 526.283091] [14595] 0 14595 17651 12714 31 3 0 1000 syz-executor5 [ 526.283101] [14599] 0 14599 17651 12714 31 3 0 1000 syz-executor1 [ 526.283112] [14600] 0 14600 17651 12714 30 3 0 1000 syz-executor3 [ 526.283121] [14651] 0 14651 17651 12714 31 3 0 1000 syz-executor2 [ 526.283131] [14656] 0 14656 17651 12714 32 3 0 1000 syz-executor0 [ 526.283141] [14659] 0 14659 17651 12714 31 3 0 1000 syz-executor1 [ 526.283151] [14660] 0 14660 17651 12714 30 3 0 1000 syz-executor3 [ 526.283161] [14663] 0 14663 17651 12714 31 3 0 1000 syz-executor5 [ 526.283171] [14723] 0 14723 17651 12714 30 3 0 1000 syz-executor3 [ 526.283182] [14725] 0 14725 17651 12714 31 3 0 1000 syz-executor5 [ 526.283192] [14727] 0 14727 17651 12714 31 3 0 1000 syz-executor2 [ 526.283202] [14729] 0 14729 17651 12714 31 3 0 1000 syz-executor1 [ 526.283213] [14731] 0 14731 17651 12714 32 3 0 1000 syz-executor0 [ 526.283222] [14771] 0 14771 17651 12714 30 3 0 1000 syz-executor3 [ 526.283233] [14773] 0 14773 17651 12714 32 3 0 1000 syz-executor0 [ 526.283243] [14779] 0 14779 17651 12714 31 3 0 1000 syz-executor2 [ 526.283253] [14782] 0 14782 17651 12714 31 3 0 1000 syz-executor1 [ 526.283264] [14787] 0 14787 17651 12714 31 3 0 1000 syz-executor5 [ 526.283274] [14842] 0 14842 17651 12714 31 3 0 1000 syz-executor1 [ 526.283284] [14845] 0 14845 17651 12714 30 3 0 1000 syz-executor3 [ 526.283294] [14846] 0 14846 17651 12714 32 3 0 1000 syz-executor0 [ 526.283304] [14848] 0 14848 17651 12714 31 3 0 1000 syz-executor2 [ 526.283314] [14907] 0 14907 17651 12624 31 3 0 1000 syz-executor2 [ 526.283325] [14919] 0 14919 5365 169 15 3 0 -1000 udevd [ 526.283382] [14928] 0 14928 17651 12714 32 3 0 1000 syz-executor0 [ 526.283393] [14930] 0 14930 17651 12714 31 3 0 1000 syz-executor1 [ 526.283402] [15136] 0 15136 2667 34 10 3 0 0 init [ 526.283412] [15138] 0 15138 2667 34 10 3 0 0 init [ 526.283422] [15141] 0 15141 2667 34 10 3 0 0 init [ 526.283432] [15142] 0 15142 2667 34 10 3 0 0 init [ 526.283441] [15143] 0 15143 2667 34 10 3 0 0 init [ 526.283451] [15144] 0 15144 2667 34 10 3 0 0 init [ 526.283461] [15150] 0 15150 5365 169 15 3 0 -1000 udevd [ 526.283472] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 [ 526.283481] [15328] 0 15328 17651 12626 30 3 0 1000 syz-executor3 [ 526.283491] [15429] 0 15429 17651 12627 31 3 0 1000 syz-executor1 [ 526.283501] [15596] 0 15596 5365 169 15 3 0 -1000 udevd [ 526.283511] [15782] 0 15782 17618 8229 25 3 0 1000 syz-executor1 [ 526.283521] [15853] 0 15853 17618 8229 25 3 0 1000 syz-executor1 [ 526.283531] [15904] 0 15904 17651 12648 31 3 0 1000 syz-executor5 [ 526.283541] [15926] 0 15926 17618 8229 25 3 0 1000 syz-executor1 [ 526.283551] [16005] 0 16005 17618 8228 26 3 0 1000 syz-executor0 [ 526.283561] [16063] 0 16063 17618 8228 26 3 0 1000 syz-executor0 [ 526.283571] [16116] 0 16116 17618 8227 25 3 0 1000 syz-executor0 [ 526.283581] [16167] 0 16167 17618 8227 25 3 0 1000 syz-executor0 [ 526.283591] [16248] 0 16248 17618 8227 25 3 0 1000 syz-executor0 [ 526.283602] [16255] 0 16255 17618 8230 25 3 0 1000 syz-executor5 [ 526.283620] [16291] 0 16291 17618 8228 26 3 0 1000 syz-executor0 [ 526.283635] [16295] 0 16295 17618 8230 25 3 0 1000 syz-executor5 [ 526.283645] [16335] 0 16335 17618 8228 26 3 0 1000 syz-executor0 [ 526.283655] [16339] 0 16339 17618 8230 25 3 0 1000 syz-executor5 [ 526.283665] [16404] 0 16404 17618 8228 26 3 0 1000 syz-executor0 [ 526.283675] [16447] 0 16447 17618 8228 26 3 0 1000 syz-executor0 [ 526.283685] [16511] 0 16511 17618 8228 26 3 0 1000 syz-executor0 [ 526.283695] [16577] 0 16577 17618 8228 26 3 0 1000 syz-executor0 [ 526.283706] [16623] 0 16623 17618 8228 26 3 0 1000 syz-executor0 [ 526.283716] [16653] 0 16653 17618 8228 26 3 0 1000 syz-executor0 [ 526.283726] [16687] 0 16687 17618 8227 25 3 0 1000 syz-executor2 [ 526.283736] [16779] 0 16779 17618 8227 25 3 0 1000 syz-executor2 [ 526.283746] [16780] 0 16780 17618 8230 25 3 0 1000 syz-executor4 [ 526.283756] [16839] 0 16839 17618 8230 25 3 0 1000 syz-executor4 [ 526.283766] [16916] 0 16916 17618 8228 26 3 0 1000 syz-executor0 [ 526.283776] [16998] 0 16998 17651 12651 31 3 0 1000 syz-executor2 [ 526.283786] [17010] 0 17010 17618 8235 25 3 0 1000 syz-executor4 [ 526.283796] [17026] 0 17026 17618 8233 26 3 0 1000 syz-executor0 [ 526.283807] [17046] 0 17046 17618 8232 24 3 0 1000 syz-executor3 [ 526.283817] [17078] 0 17078 17618 8235 25 3 0 1000 syz-executor4 [ 526.283828] [17079] 0 17079 17618 8232 25 3 0 1000 syz-executor2 [ 526.283838] [17115] 0 17115 17651 12653 31 3 0 1000 syz-executor5 [ 526.283848] [17142] 0 17142 17651 8237 25 3 0 1000 syz-executor4 [ 526.283858] [17207] 0 17207 17618 8235 25 3 0 1000 syz-executor4 [ 526.283868] [17219] 0 17219 17618 8232 24 3 0 1000 syz-executor3 [ 526.283878] [17233] 0 17233 17618 8232 25 3 0 1000 syz-executor2 [ 526.283888] [17238] 0 17238 17618 12651 31 3 0 1000 syz-executor5 [ 526.283898] [17248] 0 17248 17585 8229 25 3 0 1000 syz-executor0 [ 526.283908] [17260] 0 17260 17618 8235 25 3 0 1000 syz-executor4 12:29:26 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:26 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:26 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:26 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:26 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x40080) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_TSC(0x19, &(0x7f00000014c0)) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bond_slave_0\x00'}, 0x18) 12:29:26 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 526.283918] [17269] 0 17269 17618 8232 24 3 0 1000 syz-executor3 [ 526.283928] [17296] 0 17296 17585 8229 25 3 0 1000 syz-executor0 [ 526.283939] [17305] 0 17305 17618 8235 25 3 0 1000 syz-executor4 [ 526.283949] [17320] 0 17320 17618 8232 24 3 0 1000 syz-executor3 [ 526.283959] [17331] 0 17331 17585 8229 25 3 0 1000 syz-executor0 [ 526.283969] [17335] 0 17335 17618 12651 31 3 0 1000 syz-executor5 [ 526.283979] [17345] 0 17345 17618 8235 25 3 0 1000 syz-executor4 [ 526.283989] [17364] 0 17364 17585 8229 25 3 0 1000 syz-executor0 [ 526.283999] [17370] 0 17370 17585 8228 24 3 0 1000 syz-executor3 [ 526.284009] [17375] 0 17375 17618 8235 25 3 0 1000 syz-executor4 [ 526.284019] [17386] 0 17386 17618 8235 25 3 0 1000 syz-executor4 [ 526.284029] [17405] 0 17405 17585 8228 24 3 0 1000 syz-executor3 [ 526.284039] [17411] 0 17411 17618 8235 25 3 0 1000 syz-executor4 [ 526.284049] [17412] 0 17412 17585 8229 25 3 0 1000 syz-executor0 [ 526.284059] [17434] 0 17434 17618 8235 25 3 0 1000 syz-executor4 [ 526.284069] [17443] 0 17443 17618 8235 25 3 0 1000 syz-executor4 [ 526.284079] [17459] 0 17459 17585 8229 25 3 0 1000 syz-executor0 12:29:26 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4, 0xffff}]}, 0x10) [ 526.284089] [17468] 0 17468 17618 8235 25 3 0 1000 syz-executor4 [ 526.284099] [17480] 0 17480 17618 8232 25 3 0 1000 syz-executor2 [ 526.284109] [17493] 0 17493 17618 8235 25 3 0 1000 syz-executor4 [ 526.284119] [17502] 0 17502 17618 8235 25 3 0 1000 syz-executor4 [ 526.284129] [17505] 0 17505 17585 8229 25 3 0 1000 syz-executor0 ** 202 printk messages dropped ** [ 526.331246] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 ** 472 printk messages dropped ** [ 526.352129] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 526.352139] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 12:29:27 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 526.352149] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 12:29:27 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 526.352159] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 12:29:27 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000300), 0x0) [ 526.352169] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 526.352179] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 12:29:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) [ 526.352189] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 526.352199] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 12:29:27 executing program 3: [ 526.352210] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 526.352220] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 [ 526.352230] [ 8978] 0 8978 17651 12714 32 3 0 1000 syz-executor0 [ 526.352240] [ 9016] 0 9016 17618 8206 26 3 0 1000 syz-executor0 [ 526.352250] [ 9040] 0 9040 17651 12714 31 3 0 1000 syz-executor4 [ 526.352260] [ 9105] 0 9105 17651 12714 32 3 0 1000 syz-executor0 [ 526.352270] [ 9118] 0 9118 17618 8256 25 4 0 1000 syz-executor4 [ 526.352281] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 [ 526.352291] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 526.352301] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 [ 526.352311] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 526.352321] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 526.352331] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 526.352341] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 12:29:27 executing program 3: 12:29:27 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:28 executing program 3: [ 526.352351] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 526.352361] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 526.352371] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 [ 526.352381] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 526.352391] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 526.352401] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 526.352412] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 526.352422] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 526.352432] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 526.352442] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 526.352452] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 526.352462] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 526.352472] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 526.352482] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 526.352491] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 526.352501] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 526.352512] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 526.352522] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 526.352532] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 526.352542] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 ** 431 printk messages dropped ** [ 530.630953] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 530.630964] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 530.630975] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 530.630985] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 [ 530.630997] [ 8228] 0 8228 17651 12714 31 3 0 1000 syz-executor1 [ 530.631008] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 [ 530.631018] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 [ 530.631029] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 [ 530.631040] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 [ 530.631051] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 530.631062] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 530.631072] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 530.631083] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 [ 530.631094] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 530.631105] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 12:29:28 executing program 3: 12:29:29 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 530.631116] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 530.631127] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 530.631137] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 12:29:29 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:29 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:29 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200), 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:29 executing program 3: [ 530.631149] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 [ 530.631159] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 530.631170] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 [ 530.631182] [ 8978] 0 8978 17651 12714 32 3 0 1000 syz-executor0 [ 530.631192] [ 9016] 0 9016 17618 8206 26 3 0 1000 syz-executor0 12:29:29 executing program 3: [ 530.631203] [ 9040] 0 9040 17651 12714 31 3 0 1000 syz-executor4 12:29:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="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") fgetxattr(r0, &(0x7f0000000380)=@known='user.syz\x00', &(0x7f0000000540)=""/157, 0xfffffffffffffed3) [ 530.631214] [ 9105] 0 9105 17651 12714 32 3 0 1000 syz-executor0 12:29:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="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") fgetxattr(r0, &(0x7f0000000380)=@known='user.syz\x00', &(0x7f0000000540)=""/157, 0xfffffffffffffed3) [ 530.631224] [ 9118] 0 9118 17618 8256 25 4 0 1000 syz-executor4 12:29:29 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 530.631235] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 12:29:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="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") fchown(r0, 0x0, 0x0) [ 530.631246] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 530.631257] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 12:29:29 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 530.631268] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 530.631289] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 530.631299] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 530.631310] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 [ 530.631320] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 12:29:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x1}}, 0x14}}, 0x0) [ 530.631331] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 530.631343] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 [ 530.631354] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 530.631365] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 530.631377] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 530.631388] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 530.631399] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 530.631410] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 530.631421] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 530.631432] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 530.631443] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 530.631458] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 530.633854] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 530.633865] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 530.633876] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 530.633887] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 530.633898] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 ** 258 printk messages dropped ** [ 530.680747] dump_header+0x17d/0x7a8 ** 169 printk messages dropped ** [ 530.682728] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 [ 530.682739] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 [ 530.682769] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 ** 208 printk messages dropped ** [ 530.685056] [15596] 0 15596 5365 169 15 3 0 -1000 udevd ** 263 printk messages dropped ** [ 532.295238] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 ** 1 printk messages dropped ** [ 532.295260] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 532.295271] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 532.295281] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 532.295293] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 [ 532.295304] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 532.295314] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 532.295325] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 532.295336] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 532.295347] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 ** 464 printk messages dropped ** [ 533.928996] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 [ 533.929007] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 [ 533.929018] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 533.929042] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 533.929058] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 533.929069] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 [ 533.929080] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 533.929091] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 533.929101] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 533.929113] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 533.929124] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 533.929136] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 [ 533.929146] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 533.929157] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 [ 533.929167] [ 8978] 0 8978 17651 12714 32 3 0 1000 syz-executor0 [ 533.929178] [ 9016] 0 9016 17618 8206 26 3 0 1000 syz-executor0 [ 533.929189] [ 9040] 0 9040 17651 12714 31 3 0 1000 syz-executor4 [ 533.929200] [ 9105] 0 9105 17651 12714 32 3 0 1000 syz-executor0 [ 533.929211] [ 9118] 0 9118 17618 8256 25 4 0 1000 syz-executor4 [ 533.929222] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 [ 533.929233] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 533.929243] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 [ 533.929254] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 533.929265] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 533.929276] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 533.929287] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 [ 533.929298] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 533.929309] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 533.929319] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 [ 533.929330] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 533.929341] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 533.929352] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 533.929363] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 533.929374] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 533.929385] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 533.929396] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 533.929407] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 533.929418] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 533.929428] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 533.929439] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 533.929450] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 533.929461] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 533.929473] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 533.929484] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 533.929495] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 533.929505] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 533.929517] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 [ 533.929528] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 [ 533.929538] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 [ 533.929548] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 533.929559] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 533.929570] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 533.929581] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 533.929592] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 [ 533.929603] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 [ 533.929619] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 533.933136] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 533.933148] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 [ 533.933159] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 533.933170] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 533.933181] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 533.933192] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 533.933203] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 533.933213] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 533.933224] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 533.933235] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 533.933246] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 12:29:31 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:31 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x2) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0xfffffffffffffef0, 0x4007ffd, 0x0, 0x432) 12:29:31 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:31 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:31 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200), 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 533.933258] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 533.933268] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 533.933279] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 533.933290] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 533.933301] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 533.933312] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 [ 533.933323] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 12:29:31 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 533.933334] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 [ 533.933344] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 533.933355] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 533.933366] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 533.933377] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 533.933387] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 533.933398] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 533.933409] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 533.933420] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 533.933431] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 533.933442] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 533.933453] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 533.933464] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 533.933475] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 533.933486] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 [ 533.933497] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 533.933508] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 533.933519] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 533.933530] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 533.933541] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 [ 533.933551] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 533.933562] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 533.933572] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 533.933584] [11756] 0 11756 5365 179 15 3 0 -1000 udevd [ 533.933595] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 533.933606] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 533.933617] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 533.933628] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 533.933639] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 533.933650] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 533.933661] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 533.933671] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 533.933683] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 533.933694] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 533.933705] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 12:29:32 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 533.933716] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 533.933726] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 533.933737] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 533.933748] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 533.933759] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 533.933770] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 533.933782] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 533.933793] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 533.933804] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 533.933814] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 533.933825] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 533.933836] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 ** 360 printk messages dropped ** [ 534.079309] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 534.079320] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 534.079334] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 534.079345] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 534.079356] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 534.079366] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 [ 534.079377] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 ** 29 printk messages dropped ** [ 534.079748] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 ** 108 printk messages dropped ** [ 534.086375] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 ** 169 printk messages dropped ** [ 534.245366] ? SyS_mmap_pgoff+0x1a0/0x1a0 ** 55 printk messages dropped ** [ 534.245993] [ 1847] 0 1847 17552 8299 22 4 0 0 syz-executor3 ** 110 printk messages dropped ** [ 534.247126] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 534.247136] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 ** 59 printk messages dropped ** [ 534.247778] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 ** 240 printk messages dropped ** [ 536.359633] ? gfp_pfmemalloc_allowed+0x150/0x150 ** 180 printk messages dropped ** [ 536.367784] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 [ 536.367794] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 536.367804] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 ** 104 printk messages dropped ** [ 536.371339] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 ** 261 printk messages dropped ** [ 536.620390] [ 1849] 0 1849 17552 8309 23 4 0 0 syz-executor2 ** 116 printk messages dropped ** [ 536.640747] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 12:29:33 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 536.640788] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 [ 536.640834] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 536.640987] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 12:29:33 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 536.641088] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 536.641129] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 [ 536.641176] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 536.641217] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 536.641258] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 [ 536.641300] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 536.642579] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 536.642688] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 536.642866] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 536.642906] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 536.642947] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 536.642988] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 536.643028] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 536.643355] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 536.643396] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 12:29:34 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200), 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 536.643437] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 536.643478] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 536.643518] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 536.643646] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 536.644995] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 536.645102] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 536.645143] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 536.645183] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 12:29:34 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:34 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 536.645224] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 12:29:34 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 536.645311] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 [ 536.645390] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 536.645431] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 536.645731] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 536.645772] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 536.645856] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 [ 536.647291] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 [ 536.647320] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 536.647370] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 536.647420] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 [ 536.647469] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 536.647519] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 536.647569] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 536.647637] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 536.647698] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 536.647749] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 536.647798] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 536.647888] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 536.647939] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 536.647988] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 536.648038] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 536.648088] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 536.648138] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 536.648188] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 536.648238] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 12:29:35 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 536.648288] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 [ 536.649566] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 12:29:35 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 536.649596] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 536.649624] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 536.649674] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 536.649724] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 536.649775] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 536.649833] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 536.649881] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 12:29:35 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x0, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:35 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 536.649924] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 536.649974] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 536.650734] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 536.650780] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 536.650861] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 536.650913] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 536.650943] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 [ 536.651010] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 536.651070] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 536.651129] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 536.651173] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 536.651241] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 12:29:36 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 536.651294] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 536.651324] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 536.651353] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 536.651384] [11756] 0 11756 5365 169 15 3 0 -1000 udevd [ 536.651429] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 12:29:36 executing program 4: futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 536.651472] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 536.651523] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 536.651572] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 536.651622] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 536.651672] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 536.651722] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 536.653083] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 536.653128] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 536.653171] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 536.653222] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 [ 536.653271] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 536.653322] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 536.653350] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 536.653400] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 536.653451] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 536.653501] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 536.653551] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 536.653602] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 536.653652] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 536.653702] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 536.653768] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 536.653811] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 536.653882] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 12:29:37 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:37 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:37 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 536.653978] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 536.654020] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 536.654079] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 536.655396] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 12:29:37 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x0, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 536.655442] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 536.655494] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 12:29:37 executing program 4: futex(0x0, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 536.655541] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 536.655602] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 536.655654] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 536.655722] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 536.655774] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 536.655860] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 536.655903] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 536.655962] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 536.656021] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 ** 373 printk messages dropped ** [ 536.763800] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 536.763869] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 536.763919] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 [ 536.763968] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 536.764019] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 536.764085] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 12:29:38 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 536.764128] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 536.764179] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 536.764245] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 536.764290] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 536.764319] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 536.764369] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 536.764419] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 536.764469] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 ** 224 printk messages dropped ** [ 536.778569] [17411] 0 17411 17618 8235 25 3 0 1000 syz-executor4 ** 253 printk messages dropped ** [ 536.901472] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 536.901501] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 536.901551] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 536.901617] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 536.901660] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 ** 484 printk messages dropped ** [ 541.422741] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 541.422753] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 541.422764] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 541.422775] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 541.422785] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 541.422795] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 541.422805] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 541.422815] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 541.422826] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 [ 541.422838] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 [ 541.422849] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 12:29:38 executing program 4: futex(0x0, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 541.422860] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 541.422871] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 541.422882] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 ** 101 printk messages dropped ** [ 541.424270] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 ** 371 printk messages dropped ** [ 541.919362] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 541.919375] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 541.919387] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 ** 32 printk messages dropped ** [ 541.919951] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 ** 449 printk messages dropped ** [ 541.978244] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 541.978257] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 541.978270] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 541.978283] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 541.978295] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 541.978308] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 541.978320] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 541.978332] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 541.978344] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 541.978356] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 541.978368] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 541.978379] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 541.978391] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 541.978403] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 541.978426] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 541.978438] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 541.978451] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 [ 541.978463] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 [ 541.978475] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 [ 541.978486] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 541.978499] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 541.978511] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 541.978522] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 541.978534] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 12:29:39 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x0, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 541.978546] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 12:29:39 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 541.978558] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 541.978570] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 541.978583] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 [ 541.978595] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 541.978608] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 541.978620] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 12:29:39 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 541.978632] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 541.978644] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 541.978657] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 541.978669] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 541.978680] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 541.978692] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 541.978704] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 541.978716] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 541.978728] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 541.978740] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 541.978752] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 541.978764] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 [ 541.978777] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 [ 541.978788] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 [ 541.978800] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 541.978812] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 541.978824] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 541.978836] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 541.978848] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 541.978860] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 541.978873] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 541.978885] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 541.978897] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 541.978909] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 541.978922] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 541.978939] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 12:29:40 executing program 4: futex(0x0, 0x0, 0x4, 0x0, &(0x7f0000048000), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:40 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:40 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 541.978951] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 541.978963] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 12:29:40 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 541.978979] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 541.979124] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 541.979137] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 541.979149] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 541.979161] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 [ 541.979174] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 541.979186] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 541.979198] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 ** 424 printk messages dropped ** [ 542.242374] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 542.242385] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 ** 491 printk messages dropped ** [ 542.345414] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 542.345424] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 542.345435] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 542.345445] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 542.345455] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 542.345465] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 542.345475] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 12:29:40 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 542.345485] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 12:29:40 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 542.345495] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 [ 542.345510] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 542.345520] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 542.345530] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 542.345540] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 542.345550] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 [ 542.345561] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 [ 542.345571] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 542.345581] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 542.345591] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 12:29:41 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:41 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 542.345601] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 542.345611] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 542.345621] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 542.345632] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 ** 456 printk messages dropped ** [ 544.353162] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 ** 15 printk messages dropped ** [ 544.358007] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 544.358018] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 544.358029] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 544.358041] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 544.358052] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 [ 544.358063] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 [ 544.358074] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 544.358085] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 544.358097] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 12:29:41 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 544.358108] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 544.358119] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 544.358130] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 544.358141] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 544.358152] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 12:29:41 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 544.358163] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 544.358174] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 544.358186] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 544.358197] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 544.358207] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 544.358219] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 544.358240] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 ** 111 printk messages dropped ** [ 544.363071] [14723] 0 14723 17651 12714 30 3 0 1000 syz-executor3 ** 361 printk messages dropped ** [ 544.396085] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 544.396097] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 544.396109] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 544.396121] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 [ 544.396134] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 12:29:42 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 544.396146] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 544.396158] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 544.396170] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 [ 544.396182] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 544.396195] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 544.396207] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 544.396219] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 544.396238] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 544.396249] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 544.396261] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 12:29:42 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:42 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 544.396274] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 544.396286] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 544.396298] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 544.396310] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 544.396322] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 544.396334] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 544.396346] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 544.396358] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 [ 544.396370] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 [ 544.396382] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 [ 544.396394] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 544.396406] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 544.396418] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 544.396430] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 544.396442] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 12:29:43 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, 0x0, 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 544.396454] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 544.396466] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 544.396478] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 544.396490] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 544.396502] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 544.396514] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 544.396526] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 544.396538] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 544.396551] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 12:29:43 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 544.396563] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 544.396575] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 544.396587] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 ** 408 printk messages dropped ** [ 545.127125] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 ** 50 printk messages dropped ** [ 545.132342] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 545.132353] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 ** 493 printk messages dropped ** [ 545.725429] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 545.725440] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 545.725451] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 [ 545.725461] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 545.725471] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 545.725482] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 545.725492] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 545.725502] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 545.725512] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 545.725522] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 545.725533] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 545.725544] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 545.725554] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 545.725564] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 545.725574] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 545.725584] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 545.725594] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 545.725604] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 [ 545.725615] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 [ 545.725625] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 [ 545.725635] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 545.725652] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 545.725662] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 545.725672] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 545.725682] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 545.725693] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 545.725703] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 545.725713] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 545.725724] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 545.725734] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 545.725744] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 545.725755] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 545.725765] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 12:29:44 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 545.725775] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 [ 545.725785] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 545.725795] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 545.725805] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 545.725815] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 545.725825] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 12:29:44 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:44 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 545.725835] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 545.725846] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 545.725856] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 545.725866] [11756] 0 11756 5365 436 15 3 0 -1000 udevd [ 545.725876] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 545.725886] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 545.725896] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 545.725907] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 545.725917] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 545.725926] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 12:29:45 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:45 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 545.725937] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 545.725947] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 545.725957] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 545.725967] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 545.725977] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 [ 545.725988] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 545.725998] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 545.726008] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 545.726019] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 545.726029] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 545.726039] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 545.726050] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 545.726060] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 545.726070] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 545.726080] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 545.726092] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 545.726102] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 545.726112] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 545.726123] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 ** 65 printk messages dropped ** [ 545.730338] [14779] 0 14779 17651 12714 31 3 0 1000 syz-executor2 ** 52 printk messages dropped ** [ 545.734516] [17115] 0 17115 17651 12653 31 3 0 1000 syz-executor5 ** 63 printk messages dropped ** [ 545.739081] [17991] 0 17991 17651 11727 30 4 0 1000 syz-executor2 ** 102 printk messages dropped ** [ 547.146152] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 ** 11 printk messages dropped ** [ 547.146280] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 ** 73 printk messages dropped ** [ 547.147126] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 ** 60 printk messages dropped ** [ 547.147781] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 547.147791] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 547.147802] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 547.147813] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 547.147823] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 547.147835] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 547.147846] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 ** 45 printk messages dropped ** [ 547.148364] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 ** 163 printk messages dropped ** [ 547.174546] [17583] 0 17583 17585 8228 24 3 0 1000 syz-executor3 ** 220 printk messages dropped ** [ 547.234417] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 ** 67 printk messages dropped ** [ 547.235116] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 547.235126] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 547.235137] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 547.235147] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 [ 547.235157] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 [ 547.235168] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 [ 547.235178] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 547.235188] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 547.235198] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 12:29:46 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 547.235208] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 547.235218] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 547.235228] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 547.235238] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 547.235248] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 547.235258] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 547.235268] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 12:29:46 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, 0x0, 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 547.235277] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 547.235288] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 547.235298] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 547.235308] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 [ 547.235318] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 547.235328] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 547.235339] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 547.235349] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 12:29:47 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 547.235359] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 [ 547.235369] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 547.235379] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 547.235389] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 547.235400] [11756] 0 11756 5365 169 15 3 0 -1000 udevd [ 547.235410] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 547.235420] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 547.235430] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 547.235440] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 12:29:47 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 547.235450] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 547.235460] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 547.235470] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 547.235481] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 547.235491] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 547.235501] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 547.235511] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 [ 547.235521] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 547.235536] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 547.235546] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 547.235557] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 547.235567] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 547.235577] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 547.235587] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 12:29:48 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 547.235597] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 547.235607] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 547.235618] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 547.235628] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 547.235638] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 547.235648] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 547.235658] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 547.235668] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 547.235678] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 547.235688] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 [ 547.235699] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 12:29:48 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, 0x0, 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:29:48 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 547.235709] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 12:29:48 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 547.235719] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 547.235729] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 547.235739] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 547.235749] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 547.235759] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 547.235769] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 547.235779] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 547.235789] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 547.235799] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 547.235809] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 12:29:48 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) [ 547.235820] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 547.235830] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 547.235840] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 547.235850] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 547.235860] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 547.235871] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 547.235881] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 547.235891] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 547.235901] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 12:29:49 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 547.235911] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 547.235921] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 547.235931] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 547.235941] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 547.235951] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 547.235962] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 547.235972] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 547.235982] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 [ 547.235992] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 547.236002] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 12:29:49 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 547.236020] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 547.236030] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 547.236040] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 [ 547.236050] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 ** 413 printk messages dropped ** [ 549.439614] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 549.439675] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 549.439727] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 549.439794] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 549.439905] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 549.439957] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 ** 204 printk messages dropped ** [ 549.495633] [17767] 0 17767 17618 8232 25 3 0 1000 syz-executor2 ** 295 printk messages dropped ** [ 549.762813] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 549.762880] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 549.762921] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 ** 41 printk messages dropped ** [ 549.768452] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 ** 256 printk messages dropped ** [ 553.412863] 315641 pages reserved ** 187 printk messages dropped ** [ 553.414908] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 ** 15 printk messages dropped ** [ 553.415080] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 553.415091] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 553.415102] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 553.415113] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 553.415124] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 [ 553.415134] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 553.415144] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 553.415154] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 553.415165] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 553.415176] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 [ 553.415187] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 553.415198] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 12:29:50 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:50 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) [ 553.415208] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 553.415220] [11756] 0 11756 5365 169 15 3 0 -1000 udevd [ 553.415231] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 553.415241] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 553.415252] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 553.415263] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 12:29:50 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 553.415274] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 553.415285] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 553.415297] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 553.415308] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 553.415319] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 553.415329] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 553.415340] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 [ 553.415352] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 12:29:51 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 553.415362] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 553.415373] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 553.415384] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 553.415395] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 553.415406] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 12:29:51 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 553.415417] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 553.415428] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 553.415439] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 553.415449] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 553.415461] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 553.415472] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 553.415483] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 553.415493] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 553.415504] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 553.415515] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 553.415525] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 [ 553.415535] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 553.415562] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 12:29:51 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:51 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 553.415573] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 553.415584] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 553.415595] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 553.415606] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 553.415618] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 553.415628] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 553.415640] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 553.415650] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 12:29:52 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 553.415661] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 553.415672] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 553.415683] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 12:29:52 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 553.415693] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 553.415705] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 553.415716] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 553.415726] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 553.415737] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 553.415748] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 553.415758] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 553.415769] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 553.415779] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 553.415789] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 553.415800] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 553.415809] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 553.415819] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 553.415830] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 553.415840] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 12:29:52 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 553.415851] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 [ 553.415862] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 553.415873] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 12:29:52 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 553.415884] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 553.415894] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 553.415905] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 12:29:52 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) mlockall(0x3) [ 553.415916] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 553.415925] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 553.415936] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 [ 553.415947] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 12:29:53 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x0) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 553.415958] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 553.415969] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 553.415980] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 12:29:53 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 553.415991] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 553.416001] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 553.416011] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 553.416020] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 553.416031] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 [ 553.416041] [14590] 0 14590 17651 12714 31 3 0 1000 syz-executor2 ** 210 printk messages dropped ** [ 553.692986] 0 pages HighMem/MovableOnly ** 211 printk messages dropped ** [ 553.711268] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 553.711279] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 553.711291] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 [ 553.711302] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 553.711313] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 553.711324] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 553.711335] [11756] 0 11756 5365 169 15 3 0 -1000 udevd [ 553.711346] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 553.711358] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 ** 467 printk messages dropped ** [ 553.907333] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 ** 32 printk messages dropped ** [ 553.909358] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 ** 507 printk messages dropped ** [ 557.156513] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 ** 508 printk messages dropped ** [ 557.320700] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 557.320711] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 12:29:53 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:53 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) mlockall(0x3) [ 557.320722] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 557.320734] [11756] 0 11756 5365 169 15 3 0 -1000 udevd [ 557.320745] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 557.320761] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 557.320772] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 557.320784] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 557.320794] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 557.320805] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 ** 331 printk messages dropped ** [ 557.414176] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 ** 163 printk messages dropped ** [ 557.416017] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 557.416028] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 12:29:54 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 557.416039] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 557.416050] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 12:29:54 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 557.416061] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 557.416072] [11756] 0 11756 5365 169 15 3 0 -1000 udevd [ 557.416083] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 557.416094] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 557.416105] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 557.416116] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 557.416127] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 557.416138] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 557.416150] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 12:29:54 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:54 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 557.416161] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 557.416172] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 557.416182] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 557.416194] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 12:29:55 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) mlockall(0x3) 12:29:55 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 557.416205] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 557.416217] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 557.416227] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 557.416246] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 557.416256] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 557.416267] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 557.416278] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 557.416290] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 557.416300] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 557.416312] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 557.416323] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 ** 173 printk messages dropped ** [ 557.418267] [17858] 0 17858 17618 8232 25 3 0 1000 syz-executor2 ** 313 printk messages dropped ** [ 557.446438] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 557.446450] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 557.446462] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 557.446475] [11756] 0 11756 5365 169 15 3 0 -1000 udevd ** 120 printk messages dropped ** [ 557.447956] [16248] 0 16248 17618 8227 25 3 0 1000 syz-executor0 ** 387 printk messages dropped ** [ 557.997568] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 557.997579] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 557.997590] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 557.997600] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 557.997614] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 557.997695] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 557.997711] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 12:29:55 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 557.997719] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 [ 557.997728] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 557.997739] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 12:29:55 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 557.997812] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 557.997824] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 557.997835] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 557.997847] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 557.997858] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 557.997870] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 557.997881] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 12:29:56 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) mlockall(0x3) [ 557.997892] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 12:29:56 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 557.997903] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 557.997913] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 557.997923] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 557.997934] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 557.997944] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 557.997955] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 ** 492 printk messages dropped ** [ 559.212695] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 559.212710] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 559.214311] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 559.214322] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 559.214332] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 559.214346] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 559.214356] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 559.214366] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 559.214377] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 559.214388] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 559.214398] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 559.214408] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 559.214419] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 559.214429] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 559.214439] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 559.214450] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 [ 559.214460] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 559.214471] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 [ 559.214481] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 559.214492] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 559.214502] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 559.214515] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 559.214526] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 559.214536] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 559.214547] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 559.214557] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 559.214567] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 559.214577] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 559.214588] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 559.214598] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 559.214609] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 559.214624] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 559.214634] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 559.214644] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 559.214655] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 559.214665] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 559.214675] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 559.214685] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 559.214696] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 559.214706] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 559.214721] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 559.214731] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 559.214741] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 559.214751] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 559.214762] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 [ 559.214772] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 559.214782] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 [ 559.214792] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 559.214806] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 559.214816] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 [ 559.214826] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 559.214837] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 559.214847] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 [ 559.214857] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 [ 559.214868] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 559.214878] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 559.214888] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 [ 559.214898] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 559.214909] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 559.214919] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 559.214971] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 559.216212] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 [ 559.216222] [14590] 0 14590 17651 12714 31 3 0 1000 syz-executor2 [ 559.216233] [14595] 0 14595 17651 12714 31 3 0 1000 syz-executor5 [ 559.216243] [14599] 0 14599 17651 12714 31 3 0 1000 syz-executor1 [ 559.216253] [14600] 0 14600 17651 12714 30 3 0 1000 syz-executor3 [ 559.216268] [14651] 0 14651 17651 12714 31 3 0 1000 syz-executor2 [ 559.216278] [14656] 0 14656 17651 12714 32 3 0 1000 syz-executor0 [ 559.216288] [14659] 0 14659 17651 12714 31 3 0 1000 syz-executor1 [ 559.216299] [14660] 0 14660 17651 12714 30 3 0 1000 syz-executor3 [ 559.216309] [14663] 0 14663 17651 12714 31 3 0 1000 syz-executor5 [ 559.216320] [14723] 0 14723 17651 12714 30 3 0 1000 syz-executor3 [ 559.216330] [14725] 0 14725 17651 12714 31 3 0 1000 syz-executor5 [ 559.216341] [14727] 0 14727 17651 12714 31 3 0 1000 syz-executor2 [ 559.216351] [14729] 0 14729 17651 12714 31 3 0 1000 syz-executor1 [ 559.216361] [14731] 0 14731 17651 12714 32 3 0 1000 syz-executor0 [ 559.216371] [14771] 0 14771 17651 12714 30 3 0 1000 syz-executor3 [ 559.216382] [14773] 0 14773 17651 12714 32 3 0 1000 syz-executor0 [ 559.216392] [14779] 0 14779 17651 12714 31 3 0 1000 syz-executor2 [ 559.216402] [14782] 0 14782 17651 12714 31 3 0 1000 syz-executor1 [ 559.216413] [14787] 0 14787 17651 12714 31 3 0 1000 syz-executor5 [ 559.216423] [14842] 0 14842 17651 12714 31 3 0 1000 syz-executor1 [ 559.216433] [14845] 0 14845 17651 12714 30 3 0 1000 syz-executor3 [ 559.216443] [14846] 0 14846 17651 12714 32 3 0 1000 syz-executor0 [ 559.216453] [14848] 0 14848 17651 12714 31 3 0 1000 syz-executor2 ** 426 printk messages dropped ** [ 559.269376] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 559.269388] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 12:29:57 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:57 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mlockall(0x3) [ 559.269579] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 12:29:57 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:29:57 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 559.269589] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 12:29:57 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 559.269599] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 559.269616] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 559.269631] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 559.269791] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 559.269802] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 559.269813] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 559.269824] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 559.269834] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 559.269844] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 559.269854] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 559.269864] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 559.269874] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 [ 559.269884] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 559.269895] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 [ 559.269905] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 559.269915] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 559.269926] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 12:29:58 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:58 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mlockall(0x3) [ 559.269936] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 559.269946] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 559.269956] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 559.269966] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 559.269976] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 559.269987] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 559.269997] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 559.270047] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 559.270057] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 559.270068] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 559.270078] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 559.270097] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 559.270108] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 12:29:58 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 559.270118] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 559.270128] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 ** 368 printk messages dropped ** [ 560.190134] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 ** 115 printk messages dropped ** [ 560.191931] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 560.191944] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 560.191958] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 560.191972] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 560.191987] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 560.192001] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 ** 46 printk messages dropped ** [ 560.192792] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 ** 466 printk messages dropped ** [ 561.101469] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 561.101479] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 ** 75 printk messages dropped ** [ 561.102333] [14848] 0 14848 17651 12714 31 3 0 1000 syz-executor2 ** 435 printk messages dropped ** [ 562.629066] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 562.629077] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 562.629089] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 562.629100] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 562.629111] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 562.629123] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 12:29:59 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:29:59 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mlockall(0x3) [ 562.629134] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 [ 562.629145] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 562.629157] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 [ 562.629168] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 562.629179] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 562.629191] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 562.629202] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 562.629213] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 562.629229] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 562.633956] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 562.633968] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 562.633979] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 562.633990] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 562.634001] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 562.634012] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 562.634023] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 562.634034] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 562.634045] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 562.634056] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 ** 105 printk messages dropped ** [ 562.638746] [17269] 0 17269 17618 8232 24 3 0 1000 syz-executor3 ** 388 printk messages dropped ** [ 562.836169] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 ** 408 printk messages dropped ** [ 562.918754] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 ** 109 printk messages dropped ** [ 562.928933] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 562.928992] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 562.929052] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 12:30:00 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 562.929096] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 562.929162] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 12:30:00 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 562.929206] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 562.929272] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 [ 562.929316] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 12:30:00 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:30:00 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) mlockall(0x3) [ 562.929372] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 562.929416] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 562.929466] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 562.929516] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 562.929545] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 12:30:00 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 562.929596] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 562.929626] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 562.929676] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 562.929773] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 562.929914] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 562.929959] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 562.930002] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 12:30:01 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 562.930072] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 562.930124] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 562.932967] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 562.933012] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 562.933063] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 ** 498 printk messages dropped ** [ 563.909881] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 563.909891] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 563.909902] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 563.909912] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 563.909922] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 563.909932] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 ** 155 printk messages dropped ** [ 563.920006] [17806] 0 17806 17618 8232 25 3 0 1000 syz-executor2 ** 361 printk messages dropped ** [ 563.993738] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 563.993805] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 563.993865] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 563.993926] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 563.993978] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 563.994065] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 563.994169] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 563.994215] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 563.994296] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 563.994356] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 12:30:01 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:30:01 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 563.994450] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 563.994695] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 563.994746] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 563.994791] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 563.994851] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 563.994909] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 563.994954] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 12:30:01 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) mlockall(0x3) [ 563.995020] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 563.995064] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 563.995093] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 563.995182] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 563.995240] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 563.995291] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 563.995349] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 563.995393] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 12:30:02 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 563.995444] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 563.995530] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 [ 563.995590] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 ** 492 printk messages dropped ** [ 564.827317] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 ** 3 printk messages dropped ** [ 564.827357] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 564.827367] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 564.827377] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 564.827388] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 564.827398] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 564.827408] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 564.827418] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 564.827428] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 564.827438] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 564.827448] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 564.827458] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 564.827468] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 564.827478] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 564.827488] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 564.827498] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 564.827508] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 12:30:02 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 564.827518] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 564.827529] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 564.827539] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 564.827549] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 564.827560] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 564.827570] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 564.827580] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 12:30:02 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) mlockall(0x3) [ 564.827590] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 12:30:03 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 564.827600] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 [ 564.827610] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 564.827620] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 564.827630] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 [ 564.827640] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 564.827650] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 564.827660] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 ** 492 printk messages dropped ** [ 564.895713] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 564.895723] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 564.895733] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 ** 318 printk messages dropped ** [ 565.848097] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 ** 204 printk messages dropped ** [ 565.859551] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 565.859563] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 565.859575] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 ** 361 printk messages dropped ** [ 566.958270] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 ** 164 printk messages dropped ** [ 566.960837] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 566.960848] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 566.960860] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 566.960871] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 566.960882] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 566.960893] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 ** 14 printk messages dropped ** [ 566.961059] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 ** 288 printk messages dropped ** [ 567.024228] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 ** 212 printk messages dropped ** [ 567.038238] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 567.038249] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 ** 20 printk messages dropped ** [ 567.038465] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 ** 90 printk messages dropped ** [ 567.042705] [17345] 0 17345 17618 8235 25 3 0 1000 syz-executor4 ** 411 printk messages dropped ** [ 567.106897] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 567.106908] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 567.106919] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 567.106929] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 567.106939] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 567.106950] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 12:30:03 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:30:03 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 567.106961] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 567.106972] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 567.106983] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 12:30:03 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 567.106994] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 567.107005] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 12:30:04 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)='/', 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 567.107014] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 567.107025] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 12:30:04 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 567.107036] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 567.107047] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 567.107058] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 567.107070] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 567.107081] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 ** 85 printk messages dropped ** [ 567.111182] [17078] 0 17078 17618 8235 25 3 0 1000 syz-executor4 ** 417 printk messages dropped ** [ 567.198472] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 567.198490] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 567.198501] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 567.198511] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 567.198522] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 ** 524 printk messages dropped ** [ 567.313104] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 567.313134] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 567.313928] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 567.313976] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 567.314043] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 ** 1 printk messages dropped ** [ 567.314136] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 567.314187] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 567.314216] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 567.317124] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 567.317192] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 567.317234] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 567.317285] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 567.317352] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 567.317411] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 567.317455] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 12:30:04 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:30:04 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mlockall(0x3) 12:30:04 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:30:04 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) 12:30:04 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(0xffffffffffffffff, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 567.317542] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 567.317585] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 [ 567.317635] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 567.317701] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 567.317764] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 [ 567.317813] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 567.317882] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 567.317941] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 [ 567.318001] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 [ 567.318045] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 567.318095] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 567.318124] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 [ 567.318173] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 567.318231] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 567.318275] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 567.318304] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 567.318355] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 [ 567.318405] [14590] 0 14590 17651 12714 31 3 0 1000 syz-executor2 [ 567.318434] [14595] 0 14595 17651 12714 31 3 0 1000 syz-executor5 [ 567.318498] [14599] 0 14599 17651 12714 31 3 0 1000 syz-executor1 [ 567.318543] [14600] 0 14600 17651 12714 30 3 0 1000 syz-executor3 [ 567.318600] [14651] 0 14651 17651 12714 31 3 0 1000 syz-executor2 [ 567.318643] [14656] 0 14656 17651 12714 32 3 0 1000 syz-executor0 [ 567.318695] [14659] 0 14659 17651 12714 31 3 0 1000 syz-executor1 [ 567.318745] [14660] 0 14660 17651 12714 30 3 0 1000 syz-executor3 [ 567.318774] [14663] 0 14663 17651 12714 31 3 0 1000 syz-executor5 [ 567.318842] [14723] 0 14723 17651 12714 30 3 0 1000 syz-executor3 [ 567.318902] [14725] 0 14725 17651 12714 31 3 0 1000 syz-executor5 [ 567.318962] [14727] 0 14727 17651 12714 31 3 0 1000 syz-executor2 [ 567.320297] [14729] 0 14729 17651 12714 31 3 0 1000 syz-executor1 [ 567.320326] [14731] 0 14731 17651 12714 32 3 0 1000 syz-executor0 12:30:05 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x0, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 567.320396] [14771] 0 14771 17651 12714 30 3 0 1000 syz-executor3 [ 567.320463] [14773] 0 14773 17651 12714 32 3 0 1000 syz-executor0 [ 567.320537] [14779] 0 14779 17651 12714 31 3 0 1000 syz-executor2 [ 567.320567] [14782] 0 14782 17651 12714 31 3 0 1000 syz-executor1 [ 567.320612] [14787] 0 14787 17651 12714 31 3 0 1000 syz-executor5 [ 567.320656] [14842] 0 14842 17651 12714 31 3 0 1000 syz-executor1 [ 567.320726] [14845] 0 14845 17651 12714 30 3 0 1000 syz-executor3 [ 567.320775] [14846] 0 14846 17651 12714 32 3 0 1000 syz-executor0 [ 567.320853] [14848] 0 14848 17651 12714 31 3 0 1000 syz-executor2 [ 567.320896] [14907] 0 14907 17651 12624 31 3 0 1000 syz-executor2 12:30:05 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:30:05 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:30:05 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mlockall(0x3) [ 567.320985] [14919] 0 14919 5365 169 15 3 0 -1000 udevd [ 567.321035] [14928] 0 14928 17651 12714 32 3 0 1000 syz-executor0 [ 567.321086] [14930] 0 14930 17651 12714 31 3 0 1000 syz-executor1 [ 567.321154] [15136] 0 15136 2667 34 10 3 0 0 init [ 567.321206] [15138] 0 15138 2667 34 10 3 0 0 init [ 567.321255] [15141] 0 15141 2667 34 10 3 0 0 init [ 567.321323] [15142] 0 15142 2667 34 10 3 0 0 init [ 567.321366] [15143] 0 15143 2667 34 10 3 0 0 init [ 567.321485] [15144] 0 15144 2667 34 10 3 0 0 init [ 567.321585] [15150] 0 15150 5365 169 15 3 0 -1000 udevd [ 567.321635] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 ** 349 printk messages dropped ** [ 568.035721] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 ** 125 printk messages dropped ** [ 568.038036] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 [ 568.038047] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 568.038060] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 568.038144] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 [ 568.038155] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 568.038165] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 568.038177] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 568.038188] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 568.038199] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 [ 568.038210] [14590] 0 14590 17651 12714 31 3 0 1000 syz-executor2 [ 568.038221] [14595] 0 14595 17651 12714 31 3 0 1000 syz-executor5 [ 568.038233] [14599] 0 14599 17651 12714 31 3 0 1000 syz-executor1 ** 492 printk messages dropped ** [ 568.103180] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 ** 27 printk messages dropped ** [ 568.103356] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 568.103362] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 568.103368] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 [ 568.103374] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 [ 568.103381] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 568.103387] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 568.103394] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 [ 568.103400] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 568.103406] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 568.103412] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 568.103426] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 568.103433] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 [ 568.103441] [14590] 0 14590 17651 12714 31 3 0 1000 syz-executor2 12:30:06 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:30:06 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x0, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) [ 568.103447] [14595] 0 14595 17651 12714 31 3 0 1000 syz-executor5 [ 568.103453] [14599] 0 14599 17651 12714 31 3 0 1000 syz-executor1 [ 568.103460] [14600] 0 14600 17651 12714 30 3 0 1000 syz-executor3 [ 568.103466] [14651] 0 14651 17651 12714 31 3 0 1000 syz-executor2 [ 568.103472] [14656] 0 14656 17651 12714 32 3 0 1000 syz-executor0 [ 568.103479] [14659] 0 14659 17651 12714 31 3 0 1000 syz-executor1 [ 568.103485] [14660] 0 14660 17651 12714 30 3 0 1000 syz-executor3 [ 568.103491] [14663] 0 14663 17651 12714 31 3 0 1000 syz-executor5 [ 568.103497] [14723] 0 14723 17651 12714 30 3 0 1000 syz-executor3 [ 568.103504] [14725] 0 14725 17651 12714 31 3 0 1000 syz-executor5 [ 568.103510] [14727] 0 14727 17651 12714 31 3 0 1000 syz-executor2 [ 568.103516] [14729] 0 14729 17651 12714 31 3 0 1000 syz-executor1 [ 568.103522] [14731] 0 14731 17651 12714 32 3 0 1000 syz-executor0 [ 568.103528] [14771] 0 14771 17651 12714 30 3 0 1000 syz-executor3 [ 568.103535] [14773] 0 14773 17651 12714 32 3 0 1000 syz-executor0 [ 568.103541] [14779] 0 14779 17651 12714 31 3 0 1000 syz-executor2 ** 317 printk messages dropped ** [ 569.899154] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 ** 178 printk messages dropped ** [ 569.913339] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 569.913353] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 569.913366] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 569.913379] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 569.913392] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 569.913405] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 569.913419] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 569.913432] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 569.913481] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 569.919227] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 569.919241] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 [ 569.919255] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 569.919270] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 [ 569.919294] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 569.919307] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 569.919321] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 [ 569.919334] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 569.919349] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 569.919363] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 [ 569.919377] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 [ 569.919390] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 569.919404] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 569.919418] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 [ 569.919431] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 569.919445] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 569.919459] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 569.919472] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 569.919485] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 ** 497 printk messages dropped ** [ 570.056465] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 570.056475] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 570.056485] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 570.056495] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 570.056506] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 570.056516] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 570.056526] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 570.056536] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 570.056546] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 570.056556] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 570.056566] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 12:30:07 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mlockall(0x3) 12:30:07 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e682308000000c03a9c631064eea98b4363ad899c6bdec5e9aa9bc314d2d1791f9e8536dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce28ab4eaec9bdd36740e127730e90f2cd72b828b8d9a3c470f45c3e411155998da386b71d877ad3c4df132f9759798b7b1d668d2f90d33cf818a488cf0438b4befaa5b7d6a526293b1b72d261f28ba715be95eb1b42ac6f7950bb1cb9532de06f4bac003b538a01d2ca3c04af049a9d84a5944a3e46c556c6fa8e0be1820360f8caf4890d5e5a343491ebf424f31dd5bdb65a5ad8fd530d98062f9a256dcfab2075a64677deb43f0dbd4bfbf213b3fa00aa50c9747f27ba12", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) 12:30:07 executing program 4: futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 12:30:07 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000740), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000007c0)=""/175, 0xaf) [ 570.056576] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 570.056587] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 [ 570.056597] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 570.056607] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 570.056617] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 ** 165 printk messages dropped ** [ 570.058332] [18248] 0 18248 17651 12739 31 3 0 1000 syz-executor1 [ 570.058342] [18261] 0 18261 17585 8228 24 3 0 1000 syz-executor3 [ 570.058352] [18273] 0 18273 17585 8228 24 3 0 1000 syz-executor3 [ 570.058362] [18283] 0 18283 17585 8227 23 3 0 1000 syz-executor0 [ 570.058372] [18286] 0 18286 17618 8232 25 3 0 1000 syz-executor2 [ 570.058381] [18288] 0 18288 17618 12739 31 3 0 1000 syz-executor1 [ 570.058391] [18298] 0 18298 17585 8228 24 3 0 1000 syz-executor3 [ 570.058401] [18329] 0 18329 17618 8229 24 3 0 1000 syz-executor0 [ 570.058411] [18341] 0 18341 17618 12739 31 3 0 1000 syz-executor5 [ 570.058420] [18349] 0 18349 17618 12739 31 3 0 1000 syz-executor1 [ 570.058430] [18374] 0 18374 17585 8227 23 3 0 1000 syz-executor0 [ 570.058440] [18383] 0 18383 17651 11005 30 4 0 1000 syz-executor2 [ 570.058450] [18388] 0 18388 17618 8232 25 3 0 1000 syz-executor2 [ 570.058460] [18399] 0 18399 17618 10808 29 4 0 1000 syz-executor0 [ 570.058470] [18406] 0 18406 17585 8227 23 3 0 1000 syz-executor0 [ 570.058481] [18412] 0 18411 17618 6463 35 4 0 1000 syz-executor1 [ 570.058491] [18415] 0 18415 17585 13491 34 4 0 1000 syz-executor4 [ 570.058501] [18416] 0 18416 17618 13521 32 4 0 1000 syz-executor5 [ 570.058511] [18420] 0 18420 17585 12994 31 4 0 1000 syz-executor3 [ 570.058521] [18422] 0 18422 17585 8227 23 3 0 1000 syz-executor3 [ 570.058527] Out of memory: Kill process 18416 (syz-executor5) score 1007 or sacrifice child [ 570.058547] Killed process 18416 (syz-executor5) total-vm:70472kB, anon-rss:17772kB, file-rss:36312kB, shmem-rss:0kB [ 570.076048] oom_reaper: reaped process 18416 (syz-executor5), now anon-rss:17828kB, file-rss:4256kB, shmem-rss:0kB [ 570.841091] syz-executor5 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 570.841108] CPU: 0 PID: 18428 Comm: syz-executor5 Not tainted 4.14.88+ #23 [ 570.841112] Call Trace: [ 570.841127] dump_stack+0xb9/0x11b [ 570.841142] dump_header+0x17d/0x7a8 [ 570.841151] ? trace_hardirqs_on_caller+0x381/0x520 [ 570.841161] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 570.841169] ? ___ratelimit+0x4f/0x3f0 [ 570.841184] oom_kill_process.cold.8+0x10/0xc88 [ 570.841194] ? lock_downgrade+0x560/0x560 [ 570.841219] ? check_preemption_disabled+0x34/0x1e0 [ 570.841241] out_of_memory+0x669/0xa60 [ 570.841255] ? oom_killer_disable+0x1f0/0x1f0 [ 570.841279] __alloc_pages_nodemask+0x182f/0x2180 [ 570.841311] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 570.841322] ? trace_hardirqs_on+0x10/0x10 [ 570.841330] ? check_preemption_disabled+0x34/0x1e0 [ 570.841376] ? rcu_read_lock_sched_held+0x102/0x120 [ 570.841393] copy_process.part.6+0x267/0x6530 [ 570.841408] ? __handle_mm_fault+0xdab/0x25f0 [ 570.841418] ? lock_downgrade+0x560/0x560 [ 570.841429] ? __lru_cache_add+0x174/0x250 [ 570.841459] ? __cleanup_sighand+0x40/0x40 [ 570.841466] ? vm_insert_page+0x6d0/0x6d0 [ 570.841472] ? HARDIRQ_verbose+0x10/0x10 [ 570.841504] _do_fork+0x1c2/0xd50 [ 570.841521] ? fork_idle+0x250/0x250 [ 570.841533] ? up_read+0x17/0x30 [ 570.841541] ? __do_page_fault+0x64c/0xb60 [ 570.841556] ? do_syscall_64+0x43/0x4b0 [ 570.841569] ? sys_vfork+0x20/0x20 [ 570.841574] do_syscall_64+0x19b/0x4b0 [ 570.841592] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 570.841598] RIP: 0033:0x45a029 [ 570.841602] RSP: 002b:00007fff8fbebb98 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 570.841611] RAX: ffffffffffffffda RBX: 00007f2eebe9c700 RCX: 000000000045a029 [ 570.841615] RDX: 00007f2eebe9c9d0 RSI: 00007f2eebe9bdb0 RDI: 00000000003d0f00 [ 570.841620] RBP: 00007fff8fbebda0 R08: 00007f2eebe9c700 R09: 00007f2eebe9c700 [ 570.841624] R10: 00007f2eebe9c9d0 R11: 0000000000000202 R12: 0000000000000000 [ 570.841629] R13: 00007fff8fbebc4f R14: 00007f2eebe9c9c0 R15: 000000000072c04c [ 570.841656] Mem-Info: [ 570.841671] active_anon:100197 inactive_anon:1340981 isolated_anon:0 [ 570.841671] active_file:71 inactive_file:93 isolated_file:3 [ 570.841671] unevictable:27495 dirty:0 writeback:0 unstable:0 [ 570.841671] slab_reclaimable:8108 slab_unreclaimable:70029 [ 570.841671] mapped:59502 shmem:401 pagetables:13398 bounce:0 [ 570.841671] free:6613 free_pcp:48 free_cma:0 [ 570.841683] Node 0 active_anon:400788kB inactive_anon:5363924kB active_file:284kB inactive_file:372kB unevictable:109980kB isolated(anon):0kB isolated(file):12kB mapped:238008kB dirty:0kB writeback:0kB shmem:1604kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 570.841701] DMA32 free:20888kB min:4684kB low:7692kB high:10700kB active_anon:7048kB inactive_anon:2742972kB active_file:548kB inactive_file:500kB unevictable:43276kB writepending:0kB present:3145324kB managed:3012120kB mlocked:43304kB kernel_stack:7200kB pagetables:22232kB bounce:0kB free_pcp:192kB local_pcp:0kB free_cma:0kB [ 570.841703] lowmem_reserve[]: 0 3505 3505 [ 570.841727] Normal free:5564kB min:5588kB low:9176kB high:12764kB active_anon:393944kB inactive_anon:2621148kB active_file:616kB inactive_file:460kB unevictable:66116kB writepending:0kB present:4718592kB managed:3589232kB mlocked:65952kB kernel_stack:9696kB pagetables:31360kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 570.841730] lowmem_reserve[]: 0 0 0 [ 570.841740] DMA32: 9*4kB (UH) 17*8kB (UH) 7*16kB (H) 106*32kB (UH) 257*64kB (UH) 4*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 20636kB [ 570.841790] Normal: 100*4kB (UMH) 37*8kB (UMH) 8*16kB (MH) 28*32kB (MH) 50*64kB (UMEH) 6*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5688kB [ 570.841840] 10821 total pagecache pages [ 570.841849] 0 pages in swap cache [ 570.841853] Swap cache stats: add 0, delete 0, find 0/0 [ 570.841856] Free swap = 0kB [ 570.841859] Total swap = 0kB [ 570.841862] 1965979 pages RAM [ 570.841865] 0 pages HighMem/MovableOnly [ 570.841867] 315641 pages reserved [ 570.841871] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 570.841889] [ 190] 0 190 5366 232 15 3 0 -1000 udevd [ 570.841900] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 570.841911] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 570.841922] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 570.841959] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 570.842005] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 570.842016] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 570.842027] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 570.842038] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 570.842049] [ 1776] 0 1776 124934 91906 206 5 0 0 syz-fuzzer [ 570.842061] [ 1832] 0 1832 17553 20 22 3 0 0 syz-executor0 [ 570.842072] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 570.842084] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 570.842095] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 570.842106] [ 1837] 0 1837 17552 8309 23 4 0 0 syz-executor0 [ 570.842117] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 570.842128] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 570.842139] [ 1843] 0 1843 17552 8306 23 4 0 0 syz-executor1 [ 570.842149] [ 1846] 0 1846 17552 8255 23 4 0 0 syz-executor5 [ 570.842160] [ 1847] 0 1847 17552 8311 22 4 0 0 syz-executor3 [ 570.842172] [ 1848] 0 1848 17552 8294 23 4 0 0 syz-executor4 [ 570.842182] [ 1849] 0 1849 17552 8266 23 4 0 0 syz-executor2 [ 570.842194] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 570.842215] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 570.842232] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 570.842243] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 570.842254] [ 4768] 0 4768 5365 258 15 3 0 -1000 udevd [ 570.842266] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 570.842277] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 [ 570.842291] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 570.842302] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 570.842313] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 570.842325] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 570.842336] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 570.842347] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 570.842358] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 570.842369] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 570.842379] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 [ 570.842389] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 570.842400] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 [ 570.842411] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 570.842421] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 570.842432] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 570.842443] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 570.842454] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 570.842464] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 [ 570.842475] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 570.842486] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 570.842497] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 570.842507] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 570.842519] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 570.842530] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 570.842541] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 570.842552] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 570.842563] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 570.842574] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 570.842585] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 570.842596] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 570.842608] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 570.842619] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 570.842630] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 570.842641] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 570.842653] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 570.842664] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 570.842675] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 [ 570.842685] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 [ 570.842696] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 [ 570.842707] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 [ 570.842718] [ 7028] 0 7028 17651 12714 31 3 0 1000 syz-executor1 [ 570.842728] [ 7062] 0 7062 17651 12714 32 3 0 1000 syz-executor0 [ 570.842739] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 [ 570.842750] [ 7097] 0 7097 17651 12714 31 3 0 1000 syz-executor1 [ 570.842761] [ 7099] 0 7099 17651 12714 30 3 0 1000 syz-executor3 [ 570.842772] [ 7134] 0 7134 17651 12714 32 3 0 1000 syz-executor0 [ 570.842784] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 [ 570.842795] [ 7203] 0 7203 17618 12682 32 3 0 1000 syz-executor0 [ 570.842806] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 [ 570.842817] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 570.842828] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 570.842839] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 570.842849] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 570.842860] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 [ 570.842871] [ 7336] 0 7336 17618 12682 32 3 0 1000 syz-executor0 [ 570.842881] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 [ 570.842892] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 [ 570.842902] [ 7379] 0 7379 17651 12714 30 3 0 1000 syz-executor3 [ 570.842911] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 [ 570.842921] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 [ 570.842932] [ 7457] 0 7457 17651 12714 31 3 0 1000 syz-executor1 [ 570.842944] [ 7460] 0 7460 17651 12714 31 3 0 1000 syz-executor4 [ 570.842954] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 570.842965] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 [ 570.842976] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 570.842987] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 570.842997] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 570.843008] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 570.843019] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 [ 570.843030] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 570.843046] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 570.843106] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 570.843117] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 570.843128] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 570.843139] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 570.843150] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 570.843161] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 570.843171] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 570.843182] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 570.843193] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 570.843204] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 [ 570.843229] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 570.843240] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 [ 570.843251] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 570.843262] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 570.843273] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 570.843284] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 [ 570.843295] [ 8228] 0 8228 17651 12714 31 3 0 1000 syz-executor1 [ 570.843305] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 [ 570.843316] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 [ 570.843327] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 [ 570.843338] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 [ 570.843349] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 570.843359] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 570.843371] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 570.843382] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 [ 570.843392] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 570.843403] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 570.843414] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 570.843425] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 570.843435] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 570.843446] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 [ 570.843456] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 570.843467] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 [ 570.843478] [ 8978] 0 8978 17651 12714 32 3 0 1000 syz-executor0 [ 570.843489] [ 9016] 0 9016 17618 8206 26 3 0 1000 syz-executor0 [ 570.843500] [ 9040] 0 9040 17651 12714 31 3 0 1000 syz-executor4 [ 570.843511] [ 9105] 0 9105 17651 12714 32 3 0 1000 syz-executor0 [ 570.843522] [ 9118] 0 9118 17618 8256 25 4 0 1000 syz-executor4 [ 570.843533] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 [ 570.843543] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 570.843554] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 [ 570.843564] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 570.843575] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 570.843586] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 570.843596] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 [ 570.843608] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 570.843619] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 570.843629] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 [ 570.843640] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 570.843652] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 570.843663] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 570.843673] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 570.843684] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 570.843695] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 570.843706] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 570.843717] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 570.843728] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 570.843739] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 570.843750] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 570.843760] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 570.843771] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 570.843782] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 570.843793] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 570.843804] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 570.843814] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 570.843825] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 [ 570.843836] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 [ 570.843847] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 [ 570.843858] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 570.843869] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 570.843879] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 570.843890] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 570.843903] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 [ 570.843914] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 [ 570.843925] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 570.843936] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 570.843947] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 [ 570.843957] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 570.843969] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 570.843980] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 570.843990] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 570.844001] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 570.844011] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 570.844022] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 570.844032] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 570.844041] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 570.844052] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 570.844063] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 570.844074] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 570.844086] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 570.844097] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 570.844108] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 [ 570.844120] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 [ 570.844131] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 [ 570.844147] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 570.845348] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 570.845360] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 570.845371] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 570.845382] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 570.845394] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 570.845405] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 570.845416] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 570.845427] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 570.845438] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 570.845450] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 570.845461] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 570.845472] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 570.845483] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 [ 570.845494] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 570.845505] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 570.845516] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 570.845528] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 570.845539] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 [ 570.845550] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 570.845562] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 570.845574] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 570.845586] [11756] 0 11756 5365 239 15 3 0 -1000 udevd [ 570.845598] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 570.845609] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 570.845621] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 570.845632] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 570.845644] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 570.845655] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 570.845666] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 570.845678] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 570.845689] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 570.845700] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 570.845711] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 [ 570.845722] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 570.845733] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 570.845744] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 570.845754] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 570.845765] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 570.845776] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 570.845787] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 570.845798] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 570.845809] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 570.845820] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 570.845831] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 570.845842] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 570.845853] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 570.845864] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 570.845875] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 570.845886] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 570.845897] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 [ 570.845908] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 570.845918] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 [ 570.845929] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 570.845940] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 570.845951] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 570.845962] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 570.845973] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 570.845985] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 570.845996] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 570.846007] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 570.846017] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 570.846029] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 570.846040] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 570.846052] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 570.846063] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 570.846074] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 570.846085] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 570.846097] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 570.846108] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 570.846120] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 570.846132] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 570.846143] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 570.846154] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 570.846166] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 570.846177] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 570.846188] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 570.846199] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 570.846219] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 570.846235] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 [ 570.846245] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 570.846256] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 [ 570.846267] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 570.846276] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 570.846286] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 [ 570.846297] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 570.846308] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 570.846318] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 [ 570.846329] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 [ 570.846340] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 570.846351] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 570.846366] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 [ 570.860397] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 570.860410] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 570.860421] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 570.860433] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 570.860444] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 [ 570.860455] [14590] 0 14590 17651 12714 31 3 0 1000 syz-executor2 [ 570.860466] [14595] 0 14595 17651 12714 31 3 0 1000 syz-executor5 [ 570.860477] [14599] 0 14599 17651 12714 31 3 0 1000 syz-executor1 [ 570.860489] [14600] 0 14600 17651 12714 30 3 0 1000 syz-executor3 [ 570.860500] [14651] 0 14651 17651 12714 31 3 0 1000 syz-executor2 [ 570.860511] [14656] 0 14656 17651 12714 32 3 0 1000 syz-executor0 [ 570.860521] [14659] 0 14659 17651 12714 31 3 0 1000 syz-executor1 [ 570.860533] [14660] 0 14660 17651 12714 30 3 0 1000 syz-executor3 [ 570.860544] [14663] 0 14663 17651 12714 31 3 0 1000 syz-executor5 [ 570.860555] [14723] 0 14723 17651 12714 30 3 0 1000 syz-executor3 [ 570.860566] [14725] 0 14725 17651 12714 31 3 0 1000 syz-executor5 [ 570.860577] [14727] 0 14727 17651 12714 31 3 0 1000 syz-executor2 [ 570.860589] [14729] 0 14729 17651 12714 31 3 0 1000 syz-executor1 [ 570.860600] [14731] 0 14731 17651 12714 32 3 0 1000 syz-executor0 [ 570.860611] [14771] 0 14771 17651 12714 30 3 0 1000 syz-executor3 [ 570.860622] [14773] 0 14773 17651 12714 32 3 0 1000 syz-executor0 [ 570.860633] [14779] 0 14779 17651 12714 31 3 0 1000 syz-executor2 [ 570.860644] [14782] 0 14782 17651 12714 31 3 0 1000 syz-executor1 [ 570.860655] [14787] 0 14787 17651 12714 31 3 0 1000 syz-executor5 [ 570.860666] [14842] 0 14842 17651 12714 31 3 0 1000 syz-executor1 [ 570.860677] [14845] 0 14845 17651 12714 30 3 0 1000 syz-executor3 [ 570.860688] [14846] 0 14846 17651 12714 32 3 0 1000 syz-executor0 [ 570.860699] [14848] 0 14848 17651 12714 31 3 0 1000 syz-executor2 [ 570.860710] [14907] 0 14907 17651 12624 31 3 0 1000 syz-executor2 [ 570.860721] [14919] 0 14919 5365 169 15 3 0 -1000 udevd [ 570.860732] [14928] 0 14928 17651 12714 32 3 0 1000 syz-executor0 [ 570.860743] [14930] 0 14930 17651 12714 31 3 0 1000 syz-executor1 [ 570.860754] [15136] 0 15136 2667 34 10 3 0 0 init [ 570.860765] [15138] 0 15138 2667 34 10 3 0 0 init [ 570.860775] [15141] 0 15141 2667 34 10 3 0 0 init [ 570.860786] [15142] 0 15142 2667 34 10 3 0 0 init [ 570.860797] [15143] 0 15143 2667 34 10 3 0 0 init [ 570.860808] [15144] 0 15144 2667 34 10 3 0 0 init [ 570.860819] [15150] 0 15150 5365 169 15 3 0 -1000 udevd [ 570.860830] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 [ 570.860841] [15328] 0 15328 17651 12626 30 3 0 1000 syz-executor3 [ 570.860852] [15429] 0 15429 17651 12627 31 3 0 1000 syz-executor1 [ 570.860863] [15596] 0 15596 5365 169 15 3 0 -1000 udevd [ 570.860874] [15782] 0 15782 17618 8229 25 3 0 1000 syz-executor1 [ 570.860885] [15853] 0 15853 17618 8229 25 3 0 1000 syz-executor1 [ 570.860896] [15904] 0 15904 17651 12648 31 3 0 1000 syz-executor5 [ 570.860907] [15926] 0 15926 17618 8229 25 3 0 1000 syz-executor1 [ 570.860919] [16005] 0 16005 17618 8228 26 3 0 1000 syz-executor0 [ 570.860929] [16063] 0 16063 17618 8228 26 3 0 1000 syz-executor0 [ 570.860941] [16116] 0 16116 17618 8227 25 3 0 1000 syz-executor0 [ 570.860952] [16167] 0 16167 17618 8227 25 3 0 1000 syz-executor0 [ 570.860964] [16248] 0 16248 17618 8227 25 3 0 1000 syz-executor0 [ 570.860975] [16255] 0 16255 17618 8230 25 3 0 1000 syz-executor5 [ 570.860987] [16291] 0 16291 17618 8228 26 3 0 1000 syz-executor0 [ 570.860998] [16295] 0 16295 17618 8230 25 3 0 1000 syz-executor5 [ 570.861009] [16335] 0 16335 17618 8228 26 3 0 1000 syz-executor0 [ 570.861019] [16339] 0 16339 17618 8230 25 3 0 1000 syz-executor5 [ 570.861030] [16404] 0 16404 17618 8228 26 3 0 1000 syz-executor0 [ 570.861040] [16447] 0 16447 17618 8228 26 3 0 1000 syz-executor0 [ 570.861051] [16511] 0 16511 17618 8228 26 3 0 1000 syz-executor0 [ 570.861062] [16577] 0 16577 17618 8228 26 3 0 1000 syz-executor0 [ 570.861073] [16623] 0 16623 17618 8228 26 3 0 1000 syz-executor0 [ 570.861082] [16653] 0 16653 17618 8228 26 3 0 1000 syz-executor0 [ 570.861092] [16687] 0 16687 17618 8227 25 3 0 1000 syz-executor2 [ 570.861103] [16779] 0 16779 17618 8227 25 3 0 1000 syz-executor2 [ 570.861114] [16780] 0 16780 17618 8230 25 3 0 1000 syz-executor4 [ 570.861125] [16839] 0 16839 17618 8230 25 3 0 1000 syz-executor4 [ 570.861136] [16916] 0 16916 17618 8228 26 3 0 1000 syz-executor0 [ 570.861147] [16998] 0 16998 17651 12651 31 3 0 1000 syz-executor2 [ 570.861158] [17010] 0 17010 17618 8235 25 3 0 1000 syz-executor4 [ 570.861168] [17026] 0 17026 17618 8233 26 3 0 1000 syz-executor0 [ 570.861179] [17046] 0 17046 17618 8232 24 3 0 1000 syz-executor3 [ 570.861189] [17078] 0 17078 17618 8235 25 3 0 1000 syz-executor4 [ 570.861200] [17079] 0 17079 17618 8232 25 3 0 1000 syz-executor2 [ 570.861227] [17115] 0 17115 17651 12653 31 3 0 1000 syz-executor5 [ 570.861238] [17142] 0 17142 17651 8237 25 3 0 1000 syz-executor4 [ 570.861249] [17207] 0 17207 17618 8235 25 3 0 1000 syz-executor4 [ 570.861260] [17219] 0 17219 17618 8232 24 3 0 1000 syz-executor3 [ 570.861272] [17233] 0 17233 17618 8232 25 3 0 1000 syz-executor2 [ 570.861282] [17238] 0 17238 17618 12651 31 3 0 1000 syz-executor5 [ 570.861293] [17248] 0 17248 17585 8229 25 3 0 1000 syz-executor0 [ 570.861305] [17260] 0 17260 17618 8235 25 3 0 1000 syz-executor4 [ 570.861316] [17269] 0 17269 17618 8232 24 3 0 1000 syz-executor3 [ 570.861327] [17296] 0 17296 17585 8229 25 3 0 1000 syz-executor0 [ 570.861338] [17305] 0 17305 17618 8235 25 3 0 1000 syz-executor4 [ 570.861349] [17320] 0 17320 17618 8232 24 3 0 1000 syz-executor3 [ 570.861360] [17331] 0 17331 17585 8229 25 3 0 1000 syz-executor0 [ 570.861371] [17335] 0 17335 17618 12651 31 3 0 1000 syz-executor5 [ 570.861382] [17345] 0 17345 17618 8235 25 3 0 1000 syz-executor4 [ 570.861394] [17364] 0 17364 17585 8229 25 3 0 1000 syz-executor0 [ 570.861409] [17370] 0 17370 17585 8228 24 3 0 1000 syz-executor3 [ 570.862599] [17375] 0 17375 17618 8235 25 3 0 1000 syz-executor4 [ 570.862611] [17386] 0 17386 17618 8235 25 3 0 1000 syz-executor4 [ 570.862622] [17405] 0 17405 17585 8228 24 3 0 1000 syz-executor3 [ 570.862634] [17411] 0 17411 17618 8235 25 3 0 1000 syz-executor4 [ 570.862644] [17412] 0 17412 17585 8229 25 3 0 1000 syz-executor0 [ 570.862655] [17434] 0 17434 17618 8235 25 3 0 1000 syz-executor4 [ 570.862667] [17443] 0 17443 17618 8235 25 3 0 1000 syz-executor4 [ 570.862679] [17459] 0 17459 17585 8229 25 3 0 1000 syz-executor0 [ 570.862690] [17468] 0 17468 17618 8235 25 3 0 1000 syz-executor4 [ 570.862701] [17480] 0 17480 17618 8232 25 3 0 1000 syz-executor2 [ 570.862713] [17493] 0 17493 17618 8235 25 3 0 1000 syz-executor4 [ 570.862724] [17502] 0 17502 17618 8235 25 3 0 1000 syz-executor4 [ 570.862735] [17505] 0 17505 17585 8229 25 3 0 1000 syz-executor0 [ 570.862746] [17517] 0 17517 17618 8232 25 3 0 1000 syz-executor2 [ 570.862758] [17528] 0 17528 17618 8235 25 3 0 1000 syz-executor4 [ 570.862769] [17538] 0 17538 17618 8232 24 3 0 1000 syz-executor3 [ 570.862781] [17543] 0 17543 17618 8235 25 3 0 1000 syz-executor4 [ 570.862792] [17570] 0 17570 17618 8235 25 3 0 1000 syz-executor4 [ 570.862803] [17571] 0 17571 17618 8232 25 3 0 1000 syz-executor2 [ 570.862814] [17572] 0 17572 17618 8232 24 3 0 1000 syz-executor3 [ 570.862825] [17583] 0 17583 17585 8228 24 3 0 1000 syz-executor3 [ 570.862837] [17595] 0 17595 17618 8232 25 3 0 1000 syz-executor2 [ 570.862848] [17610] 0 17610 17585 8229 25 3 0 1000 syz-executor0 [ 570.862859] [17619] 0 17619 17618 12650 31 3 0 1000 syz-executor1 [ 570.862871] [17629] 0 17629 17585 8228 24 3 0 1000 syz-executor3 [ 570.862882] [17707] 0 17707 17618 8405 24 4 0 1000 syz-executor3 [ 570.862894] [17713] 0 17713 17618 8232 25 3 0 1000 syz-executor2 [ 570.862905] [17733] 0 17733 17585 8229 25 3 0 1000 syz-executor0 [ 570.862916] [17753] 0 17753 17618 12709 31 3 0 1000 syz-executor5 [ 570.862927] [17767] 0 17767 17618 8232 25 3 0 1000 syz-executor2 [ 570.862938] [17781] 0 17781 17585 8229 25 3 0 1000 syz-executor0 [ 570.862949] [17806] 0 17806 17618 8232 25 3 0 1000 syz-executor2 [ 570.862961] [17819] 0 17819 17585 8229 25 3 0 1000 syz-executor0 [ 570.862972] [17852] 0 17852 17585 8229 25 3 0 1000 syz-executor0 [ 570.862983] [17858] 0 17858 17618 8232 25 3 0 1000 syz-executor2 [ 570.862994] [17896] 0 17896 17585 8229 25 3 0 1000 syz-executor0 [ 570.863006] [17899] 0 17899 17618 8232 25 3 0 1000 syz-executor2 [ 570.863017] [17903] 0 17903 17618 12739 31 3 0 1000 syz-executor5 [ 570.863028] [17918] 0 17918 17585 8229 25 3 0 1000 syz-executor0 [ 570.863039] [17934] 0 17934 17618 12739 31 3 0 1000 syz-executor1 [ 570.863050] [17936] 0 17936 17618 12739 31 3 0 1000 syz-executor5 [ 570.863061] [17945] 0 17945 17585 8229 25 3 0 1000 syz-executor0 [ 570.863072] [17968] 0 17968 17618 12739 31 3 0 1000 syz-executor1 [ 570.863084] [17976] 0 17976 17585 8229 25 3 0 1000 syz-executor0 [ 570.863095] [17981] 0 17981 17585 8228 24 3 0 1000 syz-executor3 [ 570.863106] [17986] 0 17986 17618 12739 31 3 0 1000 syz-executor5 [ 570.863117] [17998] 0 17998 17618 8232 25 3 0 1000 syz-executor2 [ 570.863128] [18019] 0 18019 17618 8230 24 3 0 1000 syz-executor3 [ 570.863140] [18024] 0 18024 17585 8228 24 3 0 1000 syz-executor0 [ 570.863151] [18037] 0 18037 17618 12739 31 3 0 1000 syz-executor5 [ 570.863162] [18045] 0 18045 17618 8232 25 3 0 1000 syz-executor2 [ 570.863174] [18069] 0 18069 17585 8228 24 3 0 1000 syz-executor3 [ 570.863184] [18082] 0 18082 17618 8232 25 3 0 1000 syz-executor2 [ 570.863196] [18094] 0 18094 17585 8228 24 3 0 1000 syz-executor3 [ 570.863216] [18099] 0 18099 17618 12651 31 3 0 1000 syz-executor5 [ 570.863233] [18107] 0 18107 17618 8232 25 3 0 1000 syz-executor2 [ 570.863244] [18124] 0 18124 17585 8228 24 3 0 1000 syz-executor3 [ 570.863254] [18131] 0 18131 17585 8227 23 3 0 1000 syz-executor0 [ 570.863266] [18144] 0 18144 17585 8228 24 3 0 1000 syz-executor3 [ 570.863277] [18159] 0 18159 17585 8227 23 3 0 1000 syz-executor0 [ 570.863288] [18162] 0 18162 17618 12739 31 3 0 1000 syz-executor5 [ 570.863298] [18174] 0 18174 17585 8228 24 3 0 1000 syz-executor3 [ 570.863307] [18183] 0 18183 17618 12651 31 3 0 1000 syz-executor5 [ 570.863318] [18205] 0 18205 17585 8227 23 3 0 1000 syz-executor0 [ 570.863329] [18214] 0 18214 17618 12739 31 3 0 1000 syz-executor5 [ 570.863340] [18217] 0 18217 17585 8228 24 3 0 1000 syz-executor3 [ 570.863352] [18240] 0 18240 17585 8228 24 3 0 1000 syz-executor3 [ 570.863363] [18248] 0 18248 17651 12739 31 3 0 1000 syz-executor1 [ 570.863374] [18261] 0 18261 17585 8228 24 3 0 1000 syz-executor3 [ 570.863386] [18273] 0 18273 17585 8228 24 3 0 1000 syz-executor3 [ 570.863397] [18283] 0 18283 17585 8227 23 3 0 1000 syz-executor0 [ 570.863408] [18286] 0 18286 17618 8232 25 3 0 1000 syz-executor2 [ 570.863419] [18288] 0 18288 17618 12739 31 3 0 1000 syz-executor1 [ 570.863430] [18298] 0 18298 17585 8228 24 3 0 1000 syz-executor3 [ 570.863442] [18329] 0 18329 17618 8229 24 3 0 1000 syz-executor0 [ 570.863453] [18341] 0 18341 17618 12739 31 3 0 1000 syz-executor5 [ 570.863464] [18349] 0 18349 17618 12739 31 3 0 1000 syz-executor1 [ 570.863475] [18374] 0 18374 17585 8227 23 3 0 1000 syz-executor0 [ 570.863485] [18383] 0 18383 17684 13565 33 4 0 1000 syz-executor2 [ 570.863496] [18388] 0 18388 17618 8232 25 3 0 1000 syz-executor2 [ 570.863507] [18399] 0 18399 17618 12854 32 4 0 1000 syz-executor0 [ 570.863517] [18406] 0 18406 17585 8227 23 3 0 1000 syz-executor0 [ 570.863528] [18422] 0 18422 17585 8227 23 3 0 1000 syz-executor3 [ 570.863539] [18427] 0 18427 17618 16641 39 4 0 1000 syz-executor1 [ 570.863549] [18428] 0 18428 17651 17612 40 4 0 1000 syz-executor5 [ 570.863560] [18433] 0 18433 17618 12651 31 3 0 1000 syz-executor5 [ 570.864874] Out of memory: Kill process 18428 (syz-executor5) score 1010 or sacrifice child [ 570.864919] Killed process 18433 (syz-executor5) total-vm:70472kB, anon-rss:17836kB, file-rss:32768kB, shmem-rss:0kB [ 570.898579] oom_reaper: reaped process 18433 (syz-executor5), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 571.137710] syz-executor1 invoked oom-killer: gfp_mask=0x14201ca(GFP_HIGHUSER_MOVABLE|__GFP_COLD), nodemask=(null), order=0, oom_score_adj=1000 [ 571.137729] CPU: 1 PID: 18430 Comm: syz-executor1 Not tainted 4.14.88+ #23 [ 571.137733] Call Trace: [ 571.137750] dump_stack+0xb9/0x11b [ 571.137766] dump_header+0x17d/0x7a8 [ 571.137776] ? trace_hardirqs_on_caller+0x381/0x520 [ 571.137787] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 571.137796] ? ___ratelimit+0x4f/0x3f0 [ 571.137812] oom_kill_process.cold.8+0x10/0xc88 [ 571.137824] ? lock_downgrade+0x560/0x560 [ 571.137839] ? check_preemption_disabled+0x34/0x1e0 [ 571.137857] out_of_memory+0x669/0xa60 [ 571.137871] ? oom_killer_disable+0x1f0/0x1f0 [ 571.137897] __alloc_pages_nodemask+0x182f/0x2180 [ 571.137922] ? check_preemption_disabled+0x34/0x1e0 [ 571.137936] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 571.137949] ? find_get_entry+0x118/0x550 [ 571.137964] ? check_preemption_disabled+0x34/0x1e0 [ 571.137974] ? check_preemption_disabled+0x34/0x1e0 [ 571.137991] ? find_get_entry+0x13f/0x550 [ 571.138011] ? pagecache_get_page+0x129/0x770 [ 571.138028] filemap_fault+0xcdd/0x14a0 [ 571.138059] ext4_filemap_fault+0x7d/0xb0 [ 571.138070] __do_fault+0x80/0x210 [ 571.138083] __handle_mm_fault+0x991/0x25f0 [ 571.138100] ? vm_insert_page+0x6d0/0x6d0 [ 571.138114] ? follow_p4d_mask.isra.5+0x76f/0x1000 [ 571.138143] ? check_preemption_disabled+0x34/0x1e0 [ 571.138161] handle_mm_fault+0x3d5/0x6eb [ 571.138174] __get_user_pages+0x35d/0xe20 [ 571.138208] populate_vma_page_range+0x17a/0x210 [ 571.138225] __mm_populate+0x1bf/0x300 [ 571.138241] ? populate_vma_page_range+0x210/0x210 [ 571.138248] ? do_mlock+0x5c0/0x5c0 [ 571.138260] ? security_capable+0x8e/0xc0 [ 571.138279] SyS_mlockall+0x3e2/0x510 [ 571.138288] ? SyS_munlock+0xf0/0xf0 [ 571.138297] do_syscall_64+0x19b/0x4b0 [ 571.138319] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.138326] RIP: 0033:0x457659 [ 571.138330] RSP: 002b:00007f989f1bcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 571.138339] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457659 [ 571.138344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 571.138350] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 571.138355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f989f1bd6d4 [ 571.138360] R13: 00000000004c2d35 R14: 00000000004d5060 R15: 00000000ffffffff [ 571.138541] Mem-Info: [ 571.138560] active_anon:100201 inactive_anon:1340951 isolated_anon:0 [ 571.138560] active_file:18 inactive_file:10 isolated_file:0 [ 571.138560] unevictable:28279 dirty:0 writeback:0 unstable:0 [ 571.138560] slab_reclaimable:8108 slab_unreclaimable:70053 [ 571.138560] mapped:60043 shmem:400 pagetables:13352 bounce:0 [ 571.138560] free:6062 free_pcp:31 free_cma:0 [ 571.138576] Node 0 active_anon:400804kB inactive_anon:5363804kB active_file:72kB inactive_file:40kB unevictable:113116kB isolated(anon):0kB isolated(file):0kB mapped:240172kB dirty:0kB writeback:0kB shmem:1600kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 571.138595] DMA32 free:18680kB min:4684kB low:7692kB high:10700kB active_anon:7020kB inactive_anon:2742900kB active_file:36kB inactive_file:12kB unevictable:46232kB writepending:0kB present:3145324kB managed:3012120kB mlocked:46232kB kernel_stack:7232kB pagetables:22240kB bounce:0kB free_pcp:120kB local_pcp:120kB free_cma:0kB [ 571.138598] lowmem_reserve[]: 0 3505 3505 [ 571.138626] Normal free:5568kB min:5588kB low:9176kB high:12764kB active_anon:393784kB inactive_anon:2620904kB active_file:36kB inactive_file:12kB unevictable:66884kB writepending:0kB present:4718592kB managed:3589232kB mlocked:66888kB kernel_stack:9632kB pagetables:31168kB bounce:0kB free_pcp:4kB local_pcp:4kB free_cma:0kB [ 571.138628] lowmem_reserve[]: 0 0 0 [ 571.138641] DMA32: 69*4kB (UMH) 24*8kB (UH) 18*16kB (UMH) 41*32kB (UMH) 252*64kB (UH) 4*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18708kB [ 571.138706] Normal: 86*4kB (UMH) 37*8kB (UMH) 8*16kB (UMH) 27*32kB (UH) 50*64kB (UMEH) 6*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5600kB [ 571.138765] 11330 total pagecache pages [ 571.138776] 0 pages in swap cache [ 571.138781] Swap cache stats: add 0, delete 0, find 0/0 [ 571.138784] Free swap = 0kB [ 571.138787] Total swap = 0kB [ 571.138790] 1965979 pages RAM [ 571.138793] 0 pages HighMem/MovableOnly [ 571.138796] 315641 pages reserved [ 571.138800] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 571.138819] [ 190] 0 190 5366 167 15 3 0 -1000 udevd [ 571.138832] [ 1496] 0 1496 2493 573 8 3 0 0 dhclient [ 571.138845] [ 1627] 0 1627 14298 183 23 3 0 0 rsyslogd [ 571.138856] [ 1679] 0 1679 4725 50 15 3 0 0 cron [ 571.138870] [ 1700] 0 1700 3767 69 11 3 0 0 mcstransd [ 571.138882] [ 1702] 0 1702 12927 1231 27 3 0 0 restorecond [ 571.138894] [ 1728] 0 1728 12490 152 27 3 0 -1000 sshd [ 571.138906] [ 1758] 0 1758 3649 41 13 3 0 0 getty [ 571.138918] [ 1774] 0 1774 17821 212 40 3 0 0 sshd [ 571.138931] [ 1776] 0 1776 124934 91906 206 5 0 0 syz-fuzzer [ 571.138943] [ 1832] 0 1832 17553 20 22 3 0 0 syz-executor0 [ 571.138956] [ 1833] 0 1833 17553 25 22 3 0 0 syz-executor1 [ 571.138968] [ 1834] 0 1834 17553 26 22 3 0 0 syz-executor5 [ 571.138980] [ 1835] 0 1835 17553 25 21 3 0 0 syz-executor3 [ 571.138993] [ 1837] 0 1837 17552 8309 23 4 0 0 syz-executor0 [ 571.139005] [ 1838] 0 1838 17553 25 22 3 0 0 syz-executor4 [ 571.139018] [ 1839] 0 1839 17553 24 22 3 0 0 syz-executor2 [ 571.139029] [ 1843] 0 1843 17552 8306 23 4 0 0 syz-executor1 [ 571.139041] [ 1846] 0 1846 17552 8255 23 4 0 0 syz-executor5 [ 571.139055] [ 1847] 0 1847 17552 8311 22 4 0 0 syz-executor3 [ 571.139067] [ 1848] 0 1848 17552 8294 23 4 0 0 syz-executor4 [ 571.139079] [ 1849] 0 1849 17552 8266 23 4 0 0 syz-executor2 [ 571.139093] [ 4631] 0 4631 17585 8200 24 3 0 1000 syz-executor2 [ 571.139105] [ 4668] 0 4668 17717 8210 27 3 0 1000 syz-executor2 [ 571.139117] [ 4694] 0 4694 17585 8200 24 3 0 1000 syz-executor2 [ 571.139129] [ 4717] 0 4717 17585 8201 24 3 0 1000 syz-executor4 [ 571.139142] [ 4768] 0 4768 5365 169 15 3 0 -1000 udevd [ 571.139155] [ 4782] 0 4782 17585 8200 24 3 0 1000 syz-executor2 [ 571.139167] [ 4829] 0 4829 17620 8256 25 4 0 1000 syz-executor3 [ 571.139181] [ 5072] 0 5072 17651 12714 31 3 0 1000 syz-executor4 [ 571.139202] [ 5075] 0 5075 17717 9226 25 3 0 1000 syz-executor4 [ 571.139214] [ 5149] 0 5149 17651 12714 31 3 0 1000 syz-executor4 [ 571.139226] [ 5224] 0 5224 17651 12714 31 3 0 1000 syz-executor4 [ 571.139238] [ 5284] 0 5284 17651 12714 31 3 0 1000 syz-executor4 [ 571.139250] [ 5342] 0 5342 17651 12714 31 3 0 1000 syz-executor4 [ 571.139263] [ 6045] 0 6045 17651 12714 32 3 0 1000 syz-executor0 [ 571.139276] [ 6113] 0 6113 17651 12714 32 3 0 1000 syz-executor0 [ 571.139288] [ 6163] 0 6163 17651 12714 32 3 0 1000 syz-executor0 [ 571.139300] [ 6212] 0 6212 17651 12714 32 3 0 1000 syz-executor0 [ 571.139313] [ 6274] 0 6274 17651 12714 32 3 0 1000 syz-executor0 [ 571.139326] [ 6276] 0 6276 17651 12714 31 3 0 1000 syz-executor1 [ 571.139339] [ 6300] 0 6300 17651 12714 32 3 0 1000 syz-executor0 [ 571.139351] [ 6372] 0 6372 17651 12714 32 3 0 1000 syz-executor0 [ 571.139363] [ 6375] 0 6375 17651 12714 31 3 0 1000 syz-executor5 [ 571.139376] [ 6420] 0 6420 17651 12714 31 3 0 1000 syz-executor1 [ 571.139389] [ 6422] 0 6422 17651 12714 32 3 0 1000 syz-executor0 [ 571.139401] [ 6474] 0 6474 17651 12714 32 3 0 1000 syz-executor0 [ 571.139413] [ 6531] 0 6531 17651 12714 32 3 0 1000 syz-executor0 [ 571.139425] [ 6573] 0 6573 17618 8206 26 3 0 1000 syz-executor0 [ 571.139443] [ 6593] 0 6593 17651 12714 31 3 0 1000 syz-executor5 [ 571.139455] [ 6596] 0 6596 17651 12714 30 3 0 1000 syz-executor3 [ 571.139467] [ 6617] 0 6617 17651 12714 31 3 0 1000 syz-executor5 [ 571.139479] [ 6653] 0 6653 17651 12714 32 3 0 1000 syz-executor0 [ 571.139496] [ 6655] 0 6655 17651 12714 30 3 0 1000 syz-executor3 [ 571.139660] [ 6742] 0 6742 17651 12714 32 3 0 1000 syz-executor0 [ 571.139672] [ 6759] 0 6759 17651 12714 31 3 0 1000 syz-executor4 [ 571.139684] [ 6766] 0 6766 17651 12714 31 3 0 1000 syz-executor5 [ 571.139697] [ 6849] 0 6849 17651 12714 31 3 0 1000 syz-executor5 [ 571.139715] [ 6854] 0 6854 17651 12714 32 3 0 1000 syz-executor0 [ 571.139727] [ 6869] 0 6869 17651 12714 31 3 0 1000 syz-executor1 [ 571.139740] [ 6871] 0 6871 17651 12714 31 3 0 1000 syz-executor4 [ 571.139752] [ 6930] 0 6930 17651 12714 32 3 0 1000 syz-executor0 [ 571.139764] [ 6934] 0 6934 17651 12714 31 3 0 1000 syz-executor1 [ 571.139776] [ 6937] 0 6937 17651 12714 30 3 0 1000 syz-executor3 [ 571.139789] [ 6944] 0 6944 17651 12714 31 3 0 1000 syz-executor5 [ 571.139801] [ 6948] 0 6948 17651 12714 31 3 0 1000 syz-executor4 [ 571.139813] [ 6989] 0 6989 17651 12714 32 3 0 1000 syz-executor0 [ 571.139825] [ 7017] 0 7017 17651 12714 30 3 0 1000 syz-executor3 [ 571.139838] [ 7028] 0 7028 17651 12714 31 3 0 1000 syz-executor1 [ 571.139850] [ 7062] 0 7062 17651 12714 32 3 0 1000 syz-executor0 [ 571.139862] [ 7096] 0 7096 17651 12714 31 3 0 1000 syz-executor5 [ 571.139875] [ 7097] 0 7097 17651 12714 31 3 0 1000 syz-executor1 [ 571.139886] [ 7099] 0 7099 17651 12714 30 3 0 1000 syz-executor3 [ 571.139899] [ 7134] 0 7134 17651 12714 32 3 0 1000 syz-executor0 [ 571.139911] [ 7166] 0 7166 17651 12714 31 3 0 1000 syz-executor5 [ 571.139923] [ 7203] 0 7203 17618 12682 32 3 0 1000 syz-executor0 [ 571.139936] [ 7206] 0 7206 17651 12714 30 3 0 1000 syz-executor3 [ 571.139948] [ 7234] 0 7234 17651 12714 31 3 0 1000 syz-executor1 [ 571.139961] [ 7236] 0 7236 17651 12714 31 3 0 1000 syz-executor5 [ 571.139973] [ 7257] 0 7257 17618 12682 32 3 0 1000 syz-executor0 [ 571.139985] [ 7261] 0 7261 17651 12714 31 3 0 1000 syz-executor4 [ 571.139997] [ 7286] 0 7286 17651 12714 30 3 0 1000 syz-executor3 [ 571.140038] [ 7336] 0 7336 17618 12682 32 3 0 1000 syz-executor0 [ 571.140050] [ 7339] 0 7339 17618 12682 31 3 0 1000 syz-executor4 [ 571.140063] [ 7369] 0 7369 17618 12682 31 3 0 1000 syz-executor5 [ 571.140075] [ 7379] 0 7379 17651 12714 30 3 0 1000 syz-executor3 [ 571.140087] [ 7404] 0 7404 17651 12714 32 3 0 1000 syz-executor0 [ 571.140099] [ 7446] 0 7446 17618 12682 31 3 0 1000 syz-executor5 [ 571.140112] [ 7457] 0 7457 17651 12714 31 3 0 1000 syz-executor1 [ 571.140124] [ 7460] 0 7460 17651 12714 31 3 0 1000 syz-executor4 [ 571.140137] [ 7489] 0 7489 17618 12682 32 3 0 1000 syz-executor0 [ 571.140150] [ 7503] 0 7503 17651 12714 30 3 0 1000 syz-executor3 [ 571.140162] [ 7529] 0 7529 17651 12714 31 3 0 1000 syz-executor5 [ 571.140175] [ 7539] 0 7539 17651 12714 31 3 0 1000 syz-executor1 [ 571.140195] [ 7582] 0 7582 17618 12682 32 3 0 1000 syz-executor0 [ 571.140206] [ 7585] 0 7585 17618 12682 31 3 0 1000 syz-executor4 [ 571.140218] [ 7623] 0 7623 17651 12714 31 3 0 1000 syz-executor5 [ 571.140230] [ 7625] 0 7625 17651 12714 30 3 0 1000 syz-executor3 [ 571.140242] [ 7651] 0 7651 17651 12714 32 3 0 1000 syz-executor0 [ 571.140255] [ 7655] 0 7655 17651 12714 31 3 0 1000 syz-executor1 [ 571.140267] [ 7699] 0 7699 17651 12714 31 3 0 1000 syz-executor4 [ 571.140280] [ 7708] 0 7708 17651 12714 31 3 0 1000 syz-executor5 [ 571.140292] [ 7720] 0 7720 17651 12714 32 3 0 1000 syz-executor0 [ 571.140304] [ 7756] 0 7756 17651 12714 31 3 0 1000 syz-executor1 [ 571.140317] [ 7800] 0 7800 17651 12714 32 3 0 1000 syz-executor0 [ 571.140329] [ 7920] 0 7920 17651 12714 32 3 0 1000 syz-executor0 [ 571.140341] [ 7924] 0 7924 17651 12714 31 3 0 1000 syz-executor5 [ 571.140353] [ 7926] 0 7926 17651 12714 31 3 0 1000 syz-executor1 [ 571.140366] [ 7967] 0 7967 17651 12714 31 3 0 1000 syz-executor4 [ 571.140378] [ 7986] 0 7986 17651 12714 32 3 0 1000 syz-executor0 [ 571.140390] [ 8052] 0 8052 17651 12714 32 3 0 1000 syz-executor0 [ 571.140402] [ 8054] 0 8054 17651 12714 31 3 0 1000 syz-executor4 [ 571.140414] [ 8122] 0 8122 17651 12714 32 3 0 1000 syz-executor0 [ 571.140427] [ 8224] 0 8224 17651 12714 32 3 0 1000 syz-executor0 [ 571.140439] [ 8226] 0 8226 17651 12714 31 3 0 1000 syz-executor4 [ 571.140452] [ 8228] 0 8228 17651 12714 31 3 0 1000 syz-executor1 [ 571.140464] [ 8294] 0 8294 17651 12714 32 3 0 1000 syz-executor0 [ 571.140476] [ 8350] 0 8350 17651 12714 32 3 0 1000 syz-executor0 [ 571.140489] [ 8352] 0 8352 17651 12714 31 3 0 1000 syz-executor1 [ 571.140502] [ 8354] 0 8354 17651 12714 31 3 0 1000 syz-executor4 [ 571.140514] [ 8420] 0 8420 17651 12714 32 3 0 1000 syz-executor0 [ 571.140525] [ 8422] 0 8422 17651 12714 31 3 0 1000 syz-executor4 [ 571.140537] [ 8479] 0 8479 17651 12714 32 3 0 1000 syz-executor0 [ 571.140550] [ 8485] 0 8485 17651 12714 31 3 0 1000 syz-executor4 [ 571.140563] [ 8551] 0 8551 17651 12714 32 3 0 1000 syz-executor0 [ 571.140575] [ 8621] 0 8621 17651 12714 32 3 0 1000 syz-executor0 [ 571.140587] [ 8688] 0 8688 17651 12714 32 3 0 1000 syz-executor0 [ 571.140603] [ 8770] 0 8770 17651 12714 31 3 0 1000 syz-executor4 [ 571.140768] [ 8773] 0 8773 17651 12714 32 3 0 1000 syz-executor0 [ 571.140781] [ 8839] 0 8839 17651 12714 32 3 0 1000 syz-executor0 [ 571.140793] [ 8841] 0 8841 17651 12714 31 3 0 1000 syz-executor4 [ 571.140806] [ 8912] 0 8912 17651 12714 32 3 0 1000 syz-executor0 [ 571.140818] [ 8978] 0 8978 17651 12714 32 3 0 1000 syz-executor0 [ 571.140831] [ 9016] 0 9016 17618 8206 26 3 0 1000 syz-executor0 [ 571.140843] [ 9040] 0 9040 17651 12714 31 3 0 1000 syz-executor4 [ 571.140855] [ 9105] 0 9105 17651 12714 32 3 0 1000 syz-executor0 [ 571.140867] [ 9118] 0 9118 17618 8256 25 4 0 1000 syz-executor4 [ 571.140879] [ 9120] 0 9120 17585 8203 24 3 0 1000 syz-executor4 [ 571.140892] [ 9124] 0 9124 17618 8256 25 4 0 1000 syz-executor4 [ 571.140904] [ 9125] 0 9125 17618 8205 24 3 0 1000 syz-executor4 [ 571.140916] [ 9194] 0 9194 17651 12714 32 3 0 1000 syz-executor0 [ 571.140929] [ 9218] 0 9218 17618 8255 25 4 0 1000 syz-executor1 [ 571.140941] [ 9222] 0 9222 17585 8202 24 3 0 1000 syz-executor1 [ 571.140953] [ 9230] 0 9230 17618 8255 25 4 0 1000 syz-executor1 [ 571.140966] [ 9233] 0 9233 17618 8204 24 3 0 1000 syz-executor1 [ 571.140978] [ 9254] 0 9254 17651 12714 32 3 0 1000 syz-executor0 [ 571.140991] [ 9256] 0 9256 17651 12714 31 3 0 1000 syz-executor4 [ 571.141003] [ 9315] 0 9315 17651 12714 31 3 0 1000 syz-executor4 [ 571.141015] [ 9318] 0 9318 17651 12714 31 3 0 1000 syz-executor1 [ 571.141027] [ 9319] 0 9319 17651 12714 32 3 0 1000 syz-executor0 [ 571.141039] [ 9385] 0 9385 17651 12714 32 3 0 1000 syz-executor0 [ 571.141051] [ 9452] 0 9452 17651 12714 32 3 0 1000 syz-executor0 [ 571.141064] [ 9512] 0 9512 17651 12714 32 3 0 1000 syz-executor0 [ 571.141076] [ 9565] 0 9565 17651 12714 32 3 0 1000 syz-executor0 [ 571.141089] [ 9624] 0 9624 17651 12714 32 3 0 1000 syz-executor0 [ 571.141101] [ 9626] 0 9626 17651 12714 31 3 0 1000 syz-executor1 [ 571.141113] [ 9657] 0 9657 17651 12714 32 3 0 1000 syz-executor0 [ 571.141125] [ 9767] 0 9767 17651 12714 32 3 0 1000 syz-executor0 [ 571.141137] [ 9769] 0 9769 17651 12714 31 3 0 1000 syz-executor1 [ 571.141149] [ 9803] 0 9803 17651 12714 32 3 0 1000 syz-executor0 [ 571.141161] [ 9891] 0 9891 17651 12714 32 3 0 1000 syz-executor0 [ 571.141173] [ 9966] 0 9966 17651 12714 32 3 0 1000 syz-executor0 [ 571.141193] [10030] 0 10030 17651 12714 32 3 0 1000 syz-executor0 [ 571.141205] [10083] 0 10083 17651 12714 32 3 0 1000 syz-executor0 [ 571.141218] [10085] 0 10085 17651 12714 30 3 0 1000 syz-executor3 [ 571.141230] [10148] 0 10148 17651 12714 32 3 0 1000 syz-executor0 [ 571.141242] [10209] 0 10209 17651 12714 32 3 0 1000 syz-executor0 [ 571.141254] [10212] 0 10212 17651 12714 31 3 0 1000 syz-executor1 [ 571.141267] [10214] 0 10214 17651 12714 31 3 0 1000 syz-executor5 [ 571.141284] [10277] 0 10277 17651 12714 31 3 0 1000 syz-executor1 [ 571.141297] [10279] 0 10279 17651 12714 32 3 0 1000 syz-executor0 [ 571.141309] [10338] 0 10338 17651 12714 31 3 0 1000 syz-executor1 [ 571.141321] [10341] 0 10341 17651 12714 31 3 0 1000 syz-executor5 [ 571.141333] [10342] 0 10342 17651 12714 32 3 0 1000 syz-executor0 [ 571.141345] [10380] 0 10380 17651 12714 32 3 0 1000 syz-executor0 [ 571.141359] [10389] 0 10389 17618 8208 25 3 0 1000 syz-executor5 [ 571.141372] [10407] 0 10407 17651 12714 31 3 0 1000 syz-executor1 [ 571.141385] [10432] 0 10432 17651 12714 32 3 0 1000 syz-executor0 [ 571.141396] [10524] 0 10524 17651 12714 32 3 0 1000 syz-executor0 [ 571.141408] [10582] 0 10582 17651 12714 32 3 0 1000 syz-executor0 [ 571.141421] [10636] 0 10636 17651 12714 32 3 0 1000 syz-executor0 [ 571.141433] [10637] 0 10637 17651 12714 31 3 0 1000 syz-executor5 [ 571.141446] [10687] 0 10687 17651 12714 32 3 0 1000 syz-executor0 [ 571.141458] [10689] 0 10689 17651 12714 31 3 0 1000 syz-executor5 [ 571.141470] [10691] 0 10691 17651 12714 31 3 0 1000 syz-executor2 [ 571.141483] [10741] 0 10741 17651 12714 32 3 0 1000 syz-executor0 [ 571.141495] [10746] 0 10746 17651 12714 30 3 0 1000 syz-executor3 [ 571.141508] [10799] 0 10799 17651 12714 31 3 0 1000 syz-executor5 [ 571.141520] [10803] 0 10803 17651 12714 32 3 0 1000 syz-executor0 [ 571.141532] [10806] 0 10806 17651 12714 30 3 0 1000 syz-executor3 [ 571.141544] [10840] 0 10840 17651 12714 32 3 0 1000 syz-executor0 [ 571.141557] [10858] 0 10858 17651 12714 31 3 0 1000 syz-executor5 [ 571.141569] [10866] 0 10866 17651 12714 32 3 0 1000 syz-executor0 [ 571.141581] [10906] 0 10906 17651 12714 31 3 0 1000 syz-executor5 [ 571.141594] [10914] 0 10914 17651 12714 32 3 0 1000 syz-executor0 [ 571.141606] [10997] 0 10997 17651 12714 31 3 0 1000 syz-executor5 [ 571.141618] [10999] 0 10999 17651 12714 31 3 0 1000 syz-executor2 [ 571.141630] [11001] 0 11001 17651 12714 32 3 0 1000 syz-executor0 [ 571.141643] [11023] 0 11023 17651 12714 32 3 0 1000 syz-executor0 [ 571.141655] [11103] 0 11103 17651 12714 31 3 0 1000 syz-executor2 [ 571.141668] [11106] 0 11106 17651 12714 31 3 0 1000 syz-executor5 [ 571.141681] [11107] 0 11107 17651 12714 32 3 0 1000 syz-executor0 [ 571.141693] [11109] 0 11109 17651 12714 30 3 0 1000 syz-executor3 [ 571.141713] [11132] 0 11132 17651 12714 32 3 0 1000 syz-executor0 [ 571.141872] [11170] 0 11170 17651 12714 31 3 0 1000 syz-executor5 [ 571.141885] [11190] 0 11190 17651 12714 32 3 0 1000 syz-executor0 [ 571.141898] [11225] 0 11225 17651 12714 31 3 0 1000 syz-executor2 [ 571.141910] [11250] 0 11250 17651 12714 32 3 0 1000 syz-executor0 [ 571.141932] [11334] 0 11334 17651 12714 32 3 0 1000 syz-executor0 [ 571.141944] [11393] 0 11393 17651 12714 32 3 0 1000 syz-executor0 [ 571.141956] [11447] 0 11447 17651 12714 32 3 0 1000 syz-executor0 [ 571.141969] [11513] 0 11513 17651 12714 32 3 0 1000 syz-executor0 [ 571.141980] [11575] 0 11575 17651 12714 32 3 0 1000 syz-executor0 [ 571.141993] [11631] 0 11631 17651 12714 32 3 0 1000 syz-executor0 [ 571.142005] [11698] 0 11698 17651 12714 32 3 0 1000 syz-executor0 [ 571.142017] [11756] 0 11756 5365 169 15 3 0 -1000 udevd [ 571.142030] [11763] 0 11763 17651 12714 32 3 0 1000 syz-executor0 [ 571.142042] [11818] 0 11818 17651 12714 32 3 0 1000 syz-executor0 [ 571.142054] [11873] 0 11873 17651 12714 32 3 0 1000 syz-executor0 [ 571.142067] [11928] 0 11928 17651 12714 32 3 0 1000 syz-executor0 [ 571.142079] [11984] 0 11984 17651 12714 32 3 0 1000 syz-executor0 [ 571.142092] [12037] 0 12037 17651 12714 32 3 0 1000 syz-executor0 [ 571.142106] [12054] 0 12054 17585 8204 24 3 0 1000 syz-executor5 [ 571.142120] [12058] 0 12058 17618 8207 25 3 0 1000 syz-executor5 [ 571.142132] [12091] 0 12091 17651 12714 32 3 0 1000 syz-executor0 [ 571.142144] [12153] 0 12153 17651 12714 32 3 0 1000 syz-executor0 [ 571.142156] [12211] 0 12211 17651 12714 32 3 0 1000 syz-executor0 [ 571.142169] [12273] 0 12273 17651 12714 32 3 0 1000 syz-executor0 [ 571.142181] [12338] 0 12338 17651 12714 32 3 0 1000 syz-executor0 [ 571.142201] [12400] 0 12400 17651 12714 32 3 0 1000 syz-executor0 [ 571.142213] [12458] 0 12458 17651 12714 32 3 0 1000 syz-executor0 [ 571.142225] [12521] 0 12521 17651 12714 32 3 0 1000 syz-executor0 [ 571.142238] [12575] 0 12575 17651 12714 32 3 0 1000 syz-executor0 [ 571.142250] [12633] 0 12633 17651 12714 32 3 0 1000 syz-executor0 [ 571.142263] [12689] 0 12689 17651 12714 32 3 0 1000 syz-executor0 [ 571.142275] [12757] 0 12757 17651 12714 32 3 0 1000 syz-executor0 [ 571.142288] [12818] 0 12818 17651 12714 32 3 0 1000 syz-executor0 [ 571.142301] [12901] 0 12901 17651 12714 32 3 0 1000 syz-executor0 [ 571.142314] [12951] 0 12951 17651 12714 32 3 0 1000 syz-executor0 [ 571.142327] [13003] 0 13003 17651 12714 32 3 0 1000 syz-executor0 [ 571.142339] [13062] 0 13062 17651 12714 32 3 0 1000 syz-executor0 [ 571.142356] [13115] 0 13115 17651 8255 25 4 0 1000 syz-executor2 [ 571.142368] [13122] 0 13122 17651 12714 32 3 0 1000 syz-executor0 [ 571.142381] [13179] 0 13179 17651 12714 32 3 0 1000 syz-executor0 [ 571.142393] [13231] 0 13231 17651 12714 32 3 0 1000 syz-executor0 [ 571.142406] [13284] 0 13284 17651 12714 32 3 0 1000 syz-executor0 [ 571.142419] [13360] 0 13360 17651 12714 32 3 0 1000 syz-executor0 [ 571.142430] [13426] 0 13426 17651 12714 32 3 0 1000 syz-executor0 [ 571.142443] [13501] 0 13501 17651 12714 32 3 0 1000 syz-executor0 [ 571.142455] [13556] 0 13556 17651 12714 32 3 0 1000 syz-executor0 [ 571.142467] [13560] 0 13560 17651 12714 30 3 0 1000 syz-executor3 [ 571.142480] [13587] 0 13587 17651 12714 32 3 0 1000 syz-executor0 [ 571.142492] [13612] 0 13612 17651 12714 31 3 0 1000 syz-executor1 [ 571.142504] [13657] 0 13657 17651 12714 32 3 0 1000 syz-executor0 [ 571.142517] [13679] 0 13679 17651 12714 31 3 0 1000 syz-executor1 [ 571.142529] [13713] 0 13713 17651 12714 32 3 0 1000 syz-executor0 [ 571.142542] [13730] 0 13730 17651 12714 31 3 0 1000 syz-executor1 [ 571.142554] [13763] 0 13763 17651 12714 32 3 0 1000 syz-executor0 [ 571.142566] [13784] 0 13784 17651 12714 31 3 0 1000 syz-executor1 [ 571.142579] [13819] 0 13819 17651 12714 32 3 0 1000 syz-executor0 [ 571.142591] [13839] 0 13839 17651 12714 31 3 0 1000 syz-executor1 [ 571.142603] [13877] 0 13877 17651 12714 32 3 0 1000 syz-executor0 [ 571.142615] [13896] 0 13896 17651 12714 31 3 0 1000 syz-executor1 [ 571.142629] [13935] 0 13935 17651 12714 32 3 0 1000 syz-executor0 [ 571.142641] [13952] 0 13952 17651 12714 31 3 0 1000 syz-executor1 [ 571.142653] [13989] 0 13989 17651 12714 32 3 0 1000 syz-executor0 [ 571.142666] [14008] 0 14008 17651 12714 31 3 0 1000 syz-executor1 [ 571.142678] [14043] 0 14043 17651 12714 32 3 0 1000 syz-executor0 [ 571.142690] [14060] 0 14060 17651 12714 31 3 0 1000 syz-executor1 [ 571.142708] [14094] 0 14094 17651 12714 32 3 0 1000 syz-executor0 [ 571.142721] [14112] 0 14112 17651 12714 31 3 0 1000 syz-executor1 [ 571.142734] [14146] 0 14146 17651 12714 32 3 0 1000 syz-executor0 [ 571.142746] [14162] 0 14162 17651 12714 31 3 0 1000 syz-executor1 [ 571.142760] [14196] 0 14196 17651 12714 32 3 0 1000 syz-executor0 [ 571.142772] [14212] 0 14212 17651 12714 31 3 0 1000 syz-executor1 [ 571.142785] [14243] 0 14243 17651 12714 32 3 0 1000 syz-executor0 [ 571.142797] [14273] 0 14273 17651 12714 31 3 0 1000 syz-executor1 [ 571.142815] [14295] 0 14295 17651 12714 32 3 0 1000 syz-executor0 [ 571.142974] [14322] 0 14322 17651 12714 31 3 0 1000 syz-executor1 [ 571.142987] [14344] 0 14344 17651 12714 32 3 0 1000 syz-executor0 [ 571.142999] [14374] 0 14374 17651 12714 31 3 0 1000 syz-executor1 [ 571.143013] [14397] 0 14397 17651 12714 32 3 0 1000 syz-executor0 [ 571.143026] [14425] 0 14425 17651 12714 31 3 0 1000 syz-executor1 [ 571.143038] [14449] 0 14449 17651 12714 32 3 0 1000 syz-executor0 [ 571.143051] [14474] 0 14474 17651 12714 31 3 0 1000 syz-executor1 [ 571.143063] [14497] 0 14497 17651 12714 32 3 0 1000 syz-executor0 [ 571.143076] [14537] 0 14537 17651 12714 31 3 0 1000 syz-executor5 [ 571.143088] [14538] 0 14538 17651 12714 31 3 0 1000 syz-executor1 [ 571.143100] [14540] 0 14540 17651 12714 30 3 0 1000 syz-executor3 [ 571.143112] [14586] 0 14586 17651 12714 32 3 0 1000 syz-executor0 [ 571.143125] [14590] 0 14590 17651 12714 31 3 0 1000 syz-executor2 [ 571.143137] [14595] 0 14595 17651 12714 31 3 0 1000 syz-executor5 [ 571.143150] [14599] 0 14599 17651 12714 31 3 0 1000 syz-executor1 [ 571.143162] [14600] 0 14600 17651 12714 30 3 0 1000 syz-executor3 [ 571.143174] [14651] 0 14651 17651 12714 31 3 0 1000 syz-executor2 [ 571.143196] [14656] 0 14656 17651 12714 32 3 0 1000 syz-executor0 [ 571.143208] [14659] 0 14659 17651 12714 31 3 0 1000 syz-executor1 [ 571.143220] [14660] 0 14660 17651 12714 30 3 0 1000 syz-executor3 [ 571.143232] [14663] 0 14663 17651 12714 31 3 0 1000 syz-executor5 [ 571.143244] [14723] 0 14723 17651 12714 30 3 0 1000 syz-executor3 [ 571.143257] [14725] 0 14725 17651 12714 31 3 0 1000 syz-executor5 [ 571.143270] [14727] 0 14727 17651 12714 31 3 0 1000 syz-executor2 [ 571.143282] [14729] 0 14729 17651 12714 31 3 0 1000 syz-executor1 [ 571.143294] [14731] 0 14731 17651 12714 32 3 0 1000 syz-executor0 [ 571.143307] [14771] 0 14771 17651 12714 30 3 0 1000 syz-executor3 [ 571.143319] [14773] 0 14773 17651 12714 32 3 0 1000 syz-executor0 [ 571.143333] [14779] 0 14779 17651 12714 31 3 0 1000 syz-executor2 [ 571.143347] [14782] 0 14782 17651 12714 31 3 0 1000 syz-executor1 [ 571.143359] [14787] 0 14787 17651 12714 31 3 0 1000 syz-executor5 [ 571.143371] [14842] 0 14842 17651 12714 31 3 0 1000 syz-executor1 [ 571.143383] [14845] 0 14845 17651 12714 30 3 0 1000 syz-executor3 [ 571.143397] [14846] 0 14846 17651 12714 32 3 0 1000 syz-executor0 [ 571.143410] [14848] 0 14848 17651 12714 31 3 0 1000 syz-executor2 [ 571.143421] [14907] 0 14907 17651 12624 31 3 0 1000 syz-executor2 [ 571.143434] [14919] 0 14919 5365 169 15 3 0 -1000 udevd [ 571.143446] [14928] 0 14928 17651 12714 32 3 0 1000 syz-executor0 [ 571.143458] [14930] 0 14930 17651 12714 31 3 0 1000 syz-executor1 [ 571.143470] [15136] 0 15136 2667 34 10 3 0 0 init [ 571.143482] [15138] 0 15138 2667 34 10 3 0 0 init [ 571.143495] [15141] 0 15141 2667 34 10 3 0 0 init [ 571.143507] [15142] 0 15142 2667 34 10 3 0 0 init [ 571.143520] [15143] 0 15143 2667 34 10 3 0 0 init [ 571.143532] [15144] 0 15144 2667 34 10 3 0 0 init [ 571.143544] [15150] 0 15150 5365 169 15 3 0 -1000 udevd [ 571.143556] [15179] 0 15179 17651 12627 31 3 0 1000 syz-executor1 [ 571.143568] [15328] 0 15328 17651 12626 30 3 0 1000 syz-executor3 [ 571.143581] [15429] 0 15429 17651 12627 31 3 0 1000 syz-executor1 [ 571.143593] [15596] 0 15596 5365 169 15 3 0 -1000 udevd [ 571.143605] [15782] 0 15782 17618 8229 25 3 0 1000 syz-executor1 [ 571.143618] [15853] 0 15853 17618 8229 25 3 0 1000 syz-executor1 [ 571.143630] [15904] 0 15904 17651 12648 31 3 0 1000 syz-executor5 [ 571.143643] [15926] 0 15926 17618 8229 25 3 0 1000 syz-executor1 [ 571.143655] [16005] 0 16005 17618 8228 26 3 0 1000 syz-executor0 [ 571.143667] [16063] 0 16063 17618 8228 26 3 0 1000 syz-executor0 [ 571.143680] [16116] 0 16116 17618 8227 25 3 0 1000 syz-executor0 [ 571.143692] [16167] 0 16167 17618 8227 25 3 0 1000 syz-executor0 [ 571.143711] [16248] 0 16248 17618 8227 25 3 0 1000 syz-executor0 [ 571.143723] [16255] 0 16255 17618 8230 25 3 0 1000 syz-executor5 [ 571.143736] [16291] 0 16291 17618 8228 26 3 0 1000 syz-executor0 [ 571.143748] [16295] 0 16295 17618 8230 25 3 0 1000 syz-executor5 [ 571.143760] [16335] 0 16335 17618 8228 26 3 0 1000 syz-executor0 [ 571.143772] [16339] 0 16339 17618 8230 25 3 0 1000 syz-executor5 [ 571.143785] [16404] 0 16404 17618 8228 26 3 0 1000 syz-executor0 [ 571.143797] [16447] 0 16447 17618 8228 26 3 0 1000 syz-executor0 [ 571.143809] [16511] 0 16511 17618 8228 26 3 0 1000 syz-executor0 [ 571.143822] [16577] 0 16577 17618 8228 26 3 0 1000 syz-executor0 [ 571.143834] [16623] 0 16623 17618 8228 26 3 0 1000 syz-executor0 [ 571.143846] [16653] 0 16653 17618 8228 26 3 0 1000 syz-executor0 [ 571.143858] [16687] 0 16687 17618 8227 25 3 0 1000 syz-executor2 [ 571.143870] [16779] 0 16779 17618 8227 25 3 0 1000 syz-executor2 [ 571.143882] [16780] 0 16780 17618 8230 25 3 0 1000 syz-executor4 [ 571.143895] [16839] 0 16839 17618 8230 25 3 0 1000 syz-executor4 [ 571.143908] [16916] 0 16916 17618 8228 26 3 0 1000 syz-executor0 [ 571.144070] [16998] 0 16998 17651 12651 31 3 0 1000 syz-executor2 [ 571.144082] [17010] 0 17010 17618 8235 25 3 0 1000 syz-executor4 [ 571.144095] [17026] 0 17026 17618 8233 26 3 0 1000 syz-executor0 [ 571.144108] [17046] 0 17046 17618 8232 24 3 0 1000 syz-executor3 [ 571.144121] [17078] 0 17078 17618 8235 25 3 0 1000 syz-executor4 [ 571.144133] [17079] 0 17079 17618 8232 25 3 0 1000 syz-executor2 [ 571.144146] [17115] 0 17115 17651 12653 31 3 0 1000 syz-executor5 [ 571.144159] [17142] 0 17142 17651 8237 25 3 0 1000 syz-executor4 [ 571.144171] [17207] 0 17207 17618 8235 25 3 0 1000 syz-executor4 [ 571.144192] [17219] 0 17219 17618 8232 24 3 0 1000 syz-executor3 [ 571.144204] [17233] 0 17233 17618 8232 25 3 0 1000 syz-executor2 [ 571.144216] [17238] 0 17238 17618 12651 31 3 0 1000 syz-executor5 [ 571.144229] [17248] 0 17248 17585 8229 25 3 0 1000 syz-executor0 [ 571.144241] [17260] 0 17260 17618 8235 25 3 0 1000 syz-executor4 [ 571.144253] [17269] 0 17269 17618 8232 24 3 0 1000 syz-executor3 [ 571.144267] [17296] 0 17296 17585 8229 25 3 0 1000 syz-executor0 [ 571.144279] [17305] 0 17305 17618 8235 25 3 0 1000 syz-executor4 [ 571.144291] [17320] 0 17320 17618 8232 24 3 0 1000 syz-executor3 [ 571.144304] [17331] 0 17331 17585 8229 25 3 0 1000 syz-executor0 [ 571.144316] [17335] 0 17335 17618 12651 31 3 0 1000 syz-executor5 [ 571.144328] [17345] 0 17345 17618 8235 25 3 0 1000 syz-executor4 [ 571.144341] [17364] 0 17364 17585 8229 25 3 0 1000 syz-executor0 [ 571.144353] [17370] 0 17370 17585 8228 24 3 0 1000 syz-executor3 [ 571.144367] [17375] 0 17375 17618 8235 25 3 0 1000 syz-executor4 [ 571.144380] [17386] 0 17386 17618 8235 25 3 0 1000 syz-executor4 [ 571.144393] [17405] 0 17405 17585 8228 24 3 0 1000 syz-executor3 [ 571.144405] [17411] 0 17411 17618 8235 25 3 0 1000 syz-executor4 [ 571.144417] [17412] 0 17412 17585 8229 25 3 0 1000 syz-executor0 [ 571.144430] [17434] 0 17434 17618 8235 25 3 0 1000 syz-executor4 [ 571.144443] [17443] 0 17443 17618 8235 25 3 0 1000 syz-executor4 [ 571.144455] [17459] 0 17459 17585 8229 25 3 0 1000 syz-executor0 [ 571.144467] [17468] 0 17468 17618 8235 25 3 0 1000 syz-executor4 [ 571.144479] [17480] 0 17480 17618 8232 25 3 0 1000 syz-executor2 [ 571.144492] [17493] 0 17493 17618 8235 25 3 0 1000 syz-executor4 [ 571.144505] [17502] 0 17502 17618 8235 25 3 0 1000 syz-executor4 [ 571.144519] [17505] 0 17505 17585 8229 25 3 0 1000 syz-executor0 [ 571.144531] [17517] 0 17517 17618 8232 25 3 0 1000 syz-executor2 [ 571.144544] [17528] 0 17528 17618 8235 25 3 0 1000 syz-executor4 [ 571.144556] [17538] 0 17538 17618 8232 24 3 0 1000 syz-executor3 [ 571.144568] [17543] 0 17543 17618 8235 25 3 0 1000 syz-executor4 [ 571.144581] [17570] 0 17570 17618 8235 25 3 0 1000 syz-executor4 [ 571.144593] [17571] 0 17571 17618 8232 25 3 0 1000 syz-executor2 [ 571.144605] [17572] 0 17572 17618 8232 24 3 0 1000 syz-executor3 [ 571.144618] [17583] 0 17583 17585 8228 24 3 0 1000 syz-executor3 [ 571.144631] [17595] 0 17595 17618 8232 25 3 0 1000 syz-executor2 [ 571.144643] [17610] 0 17610 17585 8229 25 3 0 1000 syz-executor0 [ 571.144655] [17619] 0 17619 17618 12650 31 3 0 1000 syz-executor1 [ 571.144669] [17629] 0 17629 17585 8228 24 3 0 1000 syz-executor3 [ 571.144681] [17707] 0 17707 17618 8405 24 4 0 1000 syz-executor3 [ 571.144695] [17713] 0 17713 17618 8232 25 3 0 1000 syz-executor2 [ 571.144712] [17733] 0 17733 17585 8229 25 3 0 1000 syz-executor0 [ 571.144725] [17753] 0 17753 17618 12709 31 3 0 1000 syz-executor5 [ 571.144737] [17767] 0 17767 17618 8232 25 3 0 1000 syz-executor2 [ 571.144749] [17781] 0 17781 17585 8229 25 3 0 1000 syz-executor0 [ 571.144762] [17806] 0 17806 17618 8232 25 3 0 1000 syz-executor2 [ 571.144774] [17819] 0 17819 17585 8229 25 3 0 1000 syz-executor0 [ 571.144786] [17852] 0 17852 17585 8229 25 3 0 1000 syz-executor0 [ 571.144798] [17858] 0 17858 17618 8232 25 3 0 1000 syz-executor2 [ 571.144811] [17896] 0 17896 17585 8229 25 3 0 1000 syz-executor0 [ 571.144823] [17899] 0 17899 17618 8232 25 3 0 1000 syz-executor2 [ 571.144836] [17903] 0 17903 17618 12739 31 3 0 1000 syz-executor5 [ 571.144849] [17918] 0 17918 17585 8229 25 3 0 1000 syz-executor0 [ 571.144861] [17934] 0 17934 17618 12739 31 3 0 1000 syz-executor1 [ 571.144874] [17936] 0 17936 17618 12739 31 3 0 1000 syz-executor5 [ 571.144887] [17945] 0 17945 17585 8229 25 3 0 1000 syz-executor0 [ 571.144899] [17968] 0 17968 17618 12739 31 3 0 1000 syz-executor1 [ 571.144912] [17976] 0 17976 17585 8229 25 3 0 1000 syz-executor0 [ 571.144924] [17981] 0 17981 17585 8228 24 3 0 1000 syz-executor3 [ 571.144937] [17986] 0 17986 17618 12739 31 3 0 1000 syz-executor5 [ 571.144949] [17998] 0 17998 17618 8232 25 3 0 1000 syz-executor2 [ 571.144961] [18019] 0 18019 17618 8230 24 3 0 1000 syz-executor3 [ 571.144974] [18024] 0 18024 17585 8228 24 3 0 1000 syz-executor0 [ 571.144986] [18037] 0 18037 17618 12739 31 3 0 1000 syz-executor5 [ 571.144999] [18045] 0 18045 17618 8232 25 3 0 1000 syz-executor2 [ 571.145015] [18069] 0 18069 17585 8228 24 3 0 1000 syz-executor3 [ 571.145172] [18082] 0 18082 17618 8232 25 3 0 1000 syz-executor2 [ 571.145193] [18094] 0 18094 17585 8228 24 3 0 1000 syz-executor3 [ 571.145205] [18099] 0 18099 17618 12651 31 3 0 1000 syz-executor5 [ 571.145218] [18107] 0 18107 17618 8232 25 3 0 1000 syz-executor2 [ 571.145230] [18124] 0 18124 17585 8228 24 3 0 1000 syz-executor3 [ 571.145242] [18131] 0 18131 17585 8227 23 3 0 1000 syz-executor0 [ 571.145255] [18144] 0 18144 17585 8228 24 3 0 1000 syz-executor3 [ 571.145268] [18159] 0 18159 17585 8227 23 3 0 1000 syz-executor0 [ 571.145280] [18162] 0 18162 17618 12739 31 3 0 1000 syz-executor5 [ 571.145292] [18174] 0 18174 17585 8228 24 3 0 1000 syz-executor3 [ 571.145304] [18183] 0 18183 17618 12651 31 3 0 1000 syz-executor5 [ 571.145316] [18205] 0 18205 17585 8227 23 3 0 1000 syz-executor0 [ 571.145329] [18214] 0 18214 17618 12739 31 3 0 1000 syz-executor5 [ 571.145341] [18217] 0 18217 17585 8228 24 3 0 1000 syz-executor3 [ 571.145354] [18240] 0 18240 17585 8228 24 3 0 1000 syz-executor3 [ 571.145366] [18248] 0 18248 17651 12739 31 3 0 1000 syz-executor1 [ 571.145378] [18261] 0 18261 17585 8228 24 3 0 1000 syz-executor3 [ 571.145391] [18273] 0 18273 17585 8228 24 3 0 1000 syz-executor3 [ 571.145403] [18283] 0 18283 17585 8227 23 3 0 1000 syz-executor0 [ 571.145415] [18286] 0 18286 17618 8232 25 3 0 1000 syz-executor2 [ 571.145427] [18288] 0 18288 17618 12739 31 3 0 1000 syz-executor1 [ 571.145440] [18298] 0 18298 17585 8228 24 3 0 1000 syz-executor3 [ 571.145452] [18329] 0 18329 17618 8229 24 3 0 1000 syz-executor0 [ 571.145464] [18341] 0 18341 17618 12739 31 3 0 1000 syz-executor5 [ 571.145477] [18349] 0 18349 17618 12739 31 3 0 1000 syz-executor1 [ 571.145489] [18374] 0 18374 17585 8227 23 3 0 1000 syz-executor0 [ 571.145503] [18386] 0 18383 17684 14068 33 4 0 1000 syz-executor2 [ 571.145515] [18388] 0 18388 17618 8232 25 3 0 1000 syz-executor2 [ 571.145527] [18399] 0 18399 17618 12920 33 4 0 1000 syz-executor0 [ 571.145540] [18406] 0 18406 17585 8227 23 3 0 1000 syz-executor0 [ 571.145552] [18422] 0 18422 17585 8227 23 3 0 1000 syz-executor3 [ 571.145564] [18427] 0 18427 17618 16641 40 4 0 1000 syz-executor1 [ 571.145576] [18428] 0 18428 17651 17612 40 4 0 1000 syz-executor5 [ 571.145586] Out of memory: Kill process 18428 (syz-executor5) score 1010 or sacrifice child [ 571.145625] Killed process 18428 (syz-executor5) total-vm:70604kB, anon-rss:18192kB, file-rss:52256kB, shmem-rss:0kB [ 571.166775] oom_reaper: reaped process 18428 (syz-executor5), now anon-rss:18060kB, file-rss:19488kB, shmem-rss:0kB [ 571.195921] oom_reaper: reaped process 18436 (syz-executor2), now anon-rss:17968kB, file-rss:5536kB, shmem-rss:0kB