syzkaller login: [ 214.133030][ T1832] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 214.167471][ T1832] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 222.556357][ T1832] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. Warning: Permanently added '[localhost]:12105' (ECDSA) to the list of known hosts. 1970/01/01 00:04:20 fuzzer started 1970/01/01 00:04:30 dialing manager at localhost:40927 [ 275.321968][ T1999] cgroup: Unknown subsys name 'net' [ 275.995315][ T1999] cgroup: Unknown subsys name 'rlimit' 1970/01/01 00:04:35 syscalls: 2796 1970/01/01 00:04:35 code coverage: enabled 1970/01/01 00:04:35 comparison tracing: enabled 1970/01/01 00:04:35 extra coverage: enabled 1970/01/01 00:04:35 setuid sandbox: enabled 1970/01/01 00:04:35 namespace sandbox: enabled 1970/01/01 00:04:35 Android sandbox: /sys/fs/selinux/policy does not exist 1970/01/01 00:04:35 fault injection: enabled 1970/01/01 00:04:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:04:35 net packet injection: enabled 1970/01/01 00:04:35 net device setup: enabled 1970/01/01 00:04:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:04:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:04:36 USB emulation: enabled 1970/01/01 00:04:36 hci packet injection: /dev/vhci does not exist 1970/01/01 00:04:36 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:04:36 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:04:40 fetching corpus: 50, signal 33120/34978 (executing program) 1970/01/01 00:04:44 fetching corpus: 100, signal 54277/57854 (executing program) 1970/01/01 00:04:45 fetching corpus: 150, signal 66663/71870 (executing program) 1970/01/01 00:04:47 fetching corpus: 200, signal 75505/82240 (executing program) 1970/01/01 00:04:49 fetching corpus: 250, signal 83797/92035 (executing program) 1970/01/01 00:04:51 fetching corpus: 300, signal 89745/99508 (executing program) 1970/01/01 00:04:54 fetching corpus: 350, signal 96185/107418 (executing program) 1970/01/01 00:04:56 fetching corpus: 400, signal 101508/114130 (executing program) 1970/01/01 00:04:59 fetching corpus: 450, signal 109474/123359 (executing program) 1970/01/01 00:05:01 fetching corpus: 500, signal 113461/128723 (executing program) 1970/01/01 00:05:03 fetching corpus: 550, signal 116985/133599 (executing program) 1970/01/01 00:05:05 fetching corpus: 600, signal 124332/142062 (executing program) 1970/01/01 00:05:07 fetching corpus: 650, signal 128628/147580 (executing program) 1970/01/01 00:05:08 fetching corpus: 700, signal 131217/151506 (executing program) 1970/01/01 00:05:10 fetching corpus: 750, signal 135394/156893 (executing program) 1970/01/01 00:05:11 fetching corpus: 800, signal 138261/161002 (executing program) 1970/01/01 00:05:13 fetching corpus: 850, signal 140615/164604 (executing program) 1970/01/01 00:05:15 fetching corpus: 900, signal 145989/170959 (executing program) 1970/01/01 00:05:18 fetching corpus: 950, signal 149518/175611 (executing program) 1970/01/01 00:05:21 fetching corpus: 1000, signal 152022/179227 (executing program) 1970/01/01 00:05:23 fetching corpus: 1050, signal 155008/183294 (executing program) 1970/01/01 00:05:26 fetching corpus: 1100, signal 160323/189434 (executing program) 1970/01/01 00:05:28 fetching corpus: 1150, signal 163572/193693 (executing program) 1970/01/01 00:05:29 fetching corpus: 1200, signal 165806/196994 (executing program) 1970/01/01 00:05:31 fetching corpus: 1250, signal 171227/203114 (executing program) 1970/01/01 00:05:32 fetching corpus: 1300, signal 173232/206174 (executing program) 1970/01/01 00:05:34 fetching corpus: 1350, signal 178245/211867 (executing program) 1970/01/01 00:05:40 fetching corpus: 1400, signal 181169/215711 (executing program) 1970/01/01 00:05:42 fetching corpus: 1450, signal 183120/218636 (executing program) 1970/01/01 00:05:44 fetching corpus: 1500, signal 185850/222204 (executing program) 1970/01/01 00:05:46 fetching corpus: 1550, signal 187934/225273 (executing program) 1970/01/01 00:05:48 fetching corpus: 1600, signal 191982/229958 (executing program) 1970/01/01 00:05:51 fetching corpus: 1650, signal 194717/233470 (executing program) 1970/01/01 00:05:53 fetching corpus: 1700, signal 197408/236939 (executing program) 1970/01/01 00:05:55 fetching corpus: 1750, signal 198910/239422 (executing program) 1970/01/01 00:05:57 fetching corpus: 1800, signal 200589/242007 (executing program) 1970/01/01 00:05:59 fetching corpus: 1850, signal 201837/244228 (executing program) 1970/01/01 00:06:00 fetching corpus: 1900, signal 204043/247242 (executing program) 1970/01/01 00:06:03 fetching corpus: 1950, signal 205809/249872 (executing program) 1970/01/01 00:06:05 fetching corpus: 2000, signal 207483/252371 (executing program) 1970/01/01 00:06:07 fetching corpus: 2050, signal 209206/254938 (executing program) 1970/01/01 00:06:09 fetching corpus: 2100, signal 211198/257676 (executing program) 1970/01/01 00:06:12 fetching corpus: 2150, signal 213089/260377 (executing program) 1970/01/01 00:06:16 fetching corpus: 2200, signal 215710/263616 (executing program) 1970/01/01 00:06:18 fetching corpus: 2250, signal 217515/266161 (executing program) 1970/01/01 00:06:20 fetching corpus: 2300, signal 218697/268189 (executing program) 1970/01/01 00:06:22 fetching corpus: 2350, signal 221278/271287 (executing program) 1970/01/01 00:06:24 fetching corpus: 2400, signal 222638/273443 (executing program) 1970/01/01 00:06:27 fetching corpus: 2450, signal 224670/276126 (executing program) 1970/01/01 00:06:29 fetching corpus: 2500, signal 226518/278651 (executing program) 1970/01/01 00:06:31 fetching corpus: 2550, signal 227760/280685 (executing program) 1970/01/01 00:06:35 fetching corpus: 2600, signal 230546/283832 (executing program) 1970/01/01 00:06:38 fetching corpus: 2650, signal 231743/285801 (executing program) 1970/01/01 00:06:40 fetching corpus: 2700, signal 233555/288227 (executing program) 1970/01/01 00:06:41 fetching corpus: 2750, signal 235879/291055 (executing program) 1970/01/01 00:06:44 fetching corpus: 2800, signal 236733/292709 (executing program) 1970/01/01 00:06:47 fetching corpus: 2850, signal 238611/295112 (executing program) 1970/01/01 00:06:48 fetching corpus: 2900, signal 239402/296700 (executing program) 1970/01/01 00:06:50 fetching corpus: 2950, signal 240698/298655 (executing program) 1970/01/01 00:06:53 fetching corpus: 3000, signal 242276/300855 (executing program) 1970/01/01 00:06:56 fetching corpus: 3050, signal 244057/303165 (executing program) 1970/01/01 00:06:57 fetching corpus: 3100, signal 245780/305385 (executing program) 1970/01/01 00:06:59 fetching corpus: 3150, signal 247003/307276 (executing program) 1970/01/01 00:07:01 fetching corpus: 3200, signal 247975/308897 (executing program) 1970/01/01 00:07:03 fetching corpus: 3250, signal 248909/310514 (executing program) 1970/01/01 00:07:05 fetching corpus: 3300, signal 250235/312403 (executing program) 1970/01/01 00:07:07 fetching corpus: 3350, signal 251053/313935 (executing program) 1970/01/01 00:07:09 fetching corpus: 3400, signal 252733/316081 (executing program) 1970/01/01 00:07:11 fetching corpus: 3450, signal 253900/317824 (executing program) 1970/01/01 00:07:12 fetching corpus: 3500, signal 255416/319754 (executing program) 1970/01/01 00:07:14 fetching corpus: 3550, signal 256717/321608 (executing program) 1970/01/01 00:07:16 fetching corpus: 3600, signal 258600/323806 (executing program) 1970/01/01 00:07:19 fetching corpus: 3650, signal 259683/325457 (executing program) 1970/01/01 00:07:22 fetching corpus: 3700, signal 261362/327477 (executing program) 1970/01/01 00:07:24 fetching corpus: 3750, signal 262492/329195 (executing program) 1970/01/01 00:07:26 fetching corpus: 3800, signal 263888/331072 (executing program) 1970/01/01 00:07:28 fetching corpus: 3850, signal 264996/332684 (executing program) 1970/01/01 00:07:32 fetching corpus: 3900, signal 265681/334039 (executing program) 1970/01/01 00:07:34 fetching corpus: 3950, signal 267595/336185 (executing program) 1970/01/01 00:07:37 fetching corpus: 4000, signal 268507/337644 (executing program) 1970/01/01 00:07:41 fetching corpus: 4050, signal 269467/339169 (executing program) 1970/01/01 00:07:45 fetching corpus: 4100, signal 270556/340790 (executing program) 1970/01/01 00:07:47 fetching corpus: 4150, signal 271499/342245 (executing program) 1970/01/01 00:07:49 fetching corpus: 4200, signal 272030/343431 (executing program) 1970/01/01 00:07:51 fetching corpus: 4250, signal 272734/344737 (executing program) 1970/01/01 00:07:53 fetching corpus: 4300, signal 274100/346415 (executing program) 1970/01/01 00:07:55 fetching corpus: 4350, signal 275004/347827 (executing program) 1970/01/01 00:07:57 fetching corpus: 4400, signal 276022/349310 (executing program) 1970/01/01 00:07:59 fetching corpus: 4450, signal 278692/351820 (executing program) 1970/01/01 00:08:02 fetching corpus: 4500, signal 280333/353701 (executing program) 1970/01/01 00:08:04 fetching corpus: 4550, signal 281064/355022 (executing program) 1970/01/01 00:08:06 fetching corpus: 4600, signal 282012/356443 (executing program) 1970/01/01 00:08:08 fetching corpus: 4650, signal 282815/357711 (executing program) 1970/01/01 00:08:09 fetching corpus: 4700, signal 283908/359184 (executing program) 1970/01/01 00:08:12 fetching corpus: 4750, signal 284751/360516 (executing program) 1970/01/01 00:08:13 fetching corpus: 4800, signal 285592/361836 (executing program) 1970/01/01 00:08:15 fetching corpus: 4850, signal 287145/363548 (executing program) 1970/01/01 00:08:17 fetching corpus: 4900, signal 288825/365307 (executing program) 1970/01/01 00:08:19 fetching corpus: 4950, signal 289953/366740 (executing program) 1970/01/01 00:08:22 fetching corpus: 5000, signal 291324/368350 (executing program) 1970/01/01 00:08:24 fetching corpus: 5050, signal 292053/369541 (executing program) 1970/01/01 00:08:26 fetching corpus: 5100, signal 293046/370852 (executing program) 1970/01/01 00:08:28 fetching corpus: 5150, signal 293971/372156 (executing program) 1970/01/01 00:08:30 fetching corpus: 5200, signal 294625/373284 (executing program) 1970/01/01 00:08:33 fetching corpus: 5250, signal 295636/374593 (executing program) 1970/01/01 00:08:36 fetching corpus: 5300, signal 297031/376108 (executing program) 1970/01/01 00:08:38 fetching corpus: 5350, signal 298696/377780 (executing program) 1970/01/01 00:08:40 fetching corpus: 5400, signal 299760/379121 (executing program) 1970/01/01 00:08:41 fetching corpus: 5450, signal 300282/380142 (executing program) 1970/01/01 00:08:43 fetching corpus: 5500, signal 300929/381211 (executing program) 1970/01/01 00:08:45 fetching corpus: 5550, signal 302113/382604 (executing program) 1970/01/01 00:08:47 fetching corpus: 5600, signal 302621/383576 (executing program) 1970/01/01 00:08:48 fetching corpus: 5650, signal 303111/384558 (executing program) 1970/01/01 00:08:50 fetching corpus: 5700, signal 303892/385692 (executing program) 1970/01/01 00:08:53 fetching corpus: 5750, signal 304546/386771 (executing program) 1970/01/01 00:08:54 fetching corpus: 5800, signal 305673/388042 (executing program) 1970/01/01 00:08:56 fetching corpus: 5850, signal 306294/389019 (executing program) 1970/01/01 00:08:57 fetching corpus: 5900, signal 306882/390014 (executing program) 1970/01/01 00:08:59 fetching corpus: 5950, signal 307614/391094 (executing program) 1970/01/01 00:09:00 fetching corpus: 6000, signal 308441/392222 (executing program) 1970/01/01 00:09:02 fetching corpus: 6050, signal 309168/393294 (executing program) 1970/01/01 00:09:04 fetching corpus: 6100, signal 309891/394338 (executing program) 1970/01/01 00:09:05 fetching corpus: 6150, signal 311256/395666 (executing program) 1970/01/01 00:09:07 fetching corpus: 6200, signal 311673/396565 (executing program) 1970/01/01 00:09:09 fetching corpus: 6250, signal 312268/397502 (executing program) 1970/01/01 00:09:11 fetching corpus: 6300, signal 312949/398483 (executing program) 1970/01/01 00:09:12 fetching corpus: 6350, signal 313767/399566 (executing program) 1970/01/01 00:09:14 fetching corpus: 6400, signal 314401/400564 (executing program) 1970/01/01 00:09:16 fetching corpus: 6450, signal 315099/401527 (executing program) 1970/01/01 00:09:19 fetching corpus: 6500, signal 315883/402521 (executing program) 1970/01/01 00:09:21 fetching corpus: 6550, signal 316294/403385 (executing program) 1970/01/01 00:09:22 fetching corpus: 6600, signal 316912/404300 (executing program) 1970/01/01 00:09:25 fetching corpus: 6650, signal 317782/405349 (executing program) 1970/01/01 00:09:27 fetching corpus: 6700, signal 318469/406282 (executing program) 1970/01/01 00:09:29 fetching corpus: 6750, signal 319257/407302 (executing program) 1970/01/01 00:09:31 fetching corpus: 6800, signal 319872/408214 (executing program) 1970/01/01 00:09:32 fetching corpus: 6850, signal 320418/409117 (executing program) 1970/01/01 00:09:33 fetching corpus: 6900, signal 321106/410034 (executing program) 1970/01/01 00:09:35 fetching corpus: 6950, signal 321529/410823 (executing program) 1970/01/01 00:09:37 fetching corpus: 7000, signal 322892/412045 (executing program) 1970/01/01 00:09:40 fetching corpus: 7050, signal 323668/412978 (executing program) 1970/01/01 00:09:43 fetching corpus: 7100, signal 323993/413740 (executing program) 1970/01/01 00:09:45 fetching corpus: 7150, signal 324806/414665 (executing program) 1970/01/01 00:09:47 fetching corpus: 7200, signal 325374/415455 (executing program) 1970/01/01 00:09:49 fetching corpus: 7250, signal 326393/416515 (executing program) 1970/01/01 00:09:52 fetching corpus: 7300, signal 326956/417376 (executing program) 1970/01/01 00:09:55 fetching corpus: 7350, signal 327548/418231 (executing program) 1970/01/01 00:09:57 fetching corpus: 7400, signal 328019/419021 (executing program) 1970/01/01 00:10:00 fetching corpus: 7450, signal 328628/419851 (executing program) 1970/01/01 00:10:01 fetching corpus: 7500, signal 329441/420762 (executing program) 1970/01/01 00:10:03 fetching corpus: 7550, signal 330251/421694 (executing program) 1970/01/01 00:10:05 fetching corpus: 7600, signal 330933/422520 (executing program) 1970/01/01 00:10:07 fetching corpus: 7650, signal 331679/423374 (executing program) 1970/01/01 00:10:10 fetching corpus: 7700, signal 333987/424806 (executing program) 1970/01/01 00:10:12 fetching corpus: 7750, signal 334434/425534 (executing program) 1970/01/01 00:10:15 fetching corpus: 7800, signal 335139/426373 (executing program) 1970/01/01 00:10:19 fetching corpus: 7850, signal 336402/427415 (executing program) 1970/01/01 00:10:22 fetching corpus: 7900, signal 336839/428115 (executing program) 1970/01/01 00:10:24 fetching corpus: 7950, signal 337222/428828 (executing program) 1970/01/01 00:10:26 fetching corpus: 8000, signal 337971/429635 (executing program) 1970/01/01 00:10:27 fetching corpus: 8050, signal 338445/430320 (executing program) 1970/01/01 00:10:29 fetching corpus: 8100, signal 339049/431086 (executing program) 1970/01/01 00:10:31 fetching corpus: 8150, signal 339523/431795 (executing program) 1970/01/01 00:10:33 fetching corpus: 8200, signal 340053/432520 (executing program) 1970/01/01 00:10:36 fetching corpus: 8250, signal 340558/433232 (executing program) 1970/01/01 00:10:38 fetching corpus: 8300, signal 340897/433896 (executing program) 1970/01/01 00:10:41 fetching corpus: 8350, signal 341410/434643 (executing program) 1970/01/01 00:10:43 fetching corpus: 8400, signal 342016/435382 (executing program) 1970/01/01 00:10:45 fetching corpus: 8450, signal 342655/436141 (executing program) 1970/01/01 00:10:46 fetching corpus: 8500, signal 343216/436828 (executing program) 1970/01/01 00:10:48 fetching corpus: 8550, signal 343686/437471 (executing program) 1970/01/01 00:10:50 fetching corpus: 8600, signal 344318/438151 (executing program) 1970/01/01 00:10:51 fetching corpus: 8650, signal 344802/438849 (executing program) 1970/01/01 00:10:53 fetching corpus: 8700, signal 345484/439558 (executing program) 1970/01/01 00:10:56 fetching corpus: 8750, signal 346598/440421 (executing program) 1970/01/01 00:10:58 fetching corpus: 8800, signal 347203/441091 (executing program) 1970/01/01 00:11:00 fetching corpus: 8850, signal 347681/441766 (executing program) 1970/01/01 00:11:02 fetching corpus: 8900, signal 348606/442569 (executing program) 1970/01/01 00:11:04 fetching corpus: 8950, signal 349102/443237 (executing program) 1970/01/01 00:11:06 fetching corpus: 9000, signal 349904/443928 (executing program) 1970/01/01 00:11:07 fetching corpus: 9050, signal 350550/444605 (executing program) 1970/01/01 00:11:08 fetching corpus: 9100, signal 351132/445230 (executing program) 1970/01/01 00:11:10 fetching corpus: 9150, signal 351775/445867 (executing program) 1970/01/01 00:11:12 fetching corpus: 9200, signal 352324/446496 (executing program) 1970/01/01 00:11:14 fetching corpus: 9250, signal 353025/447177 (executing program) 1970/01/01 00:11:16 fetching corpus: 9300, signal 353786/447851 (executing program) 1970/01/01 00:11:18 fetching corpus: 9350, signal 354436/448489 (executing program) 1970/01/01 00:11:20 fetching corpus: 9400, signal 354950/449106 (executing program) 1970/01/01 00:11:21 fetching corpus: 9450, signal 355702/449768 (executing program) 1970/01/01 00:11:23 fetching corpus: 9500, signal 356309/450391 (executing program) 1970/01/01 00:11:25 fetching corpus: 9550, signal 356732/450941 (executing program) 1970/01/01 00:11:27 fetching corpus: 9600, signal 357135/451515 (executing program) 1970/01/01 00:11:31 fetching corpus: 9650, signal 357574/452107 (executing program) 1970/01/01 00:11:33 fetching corpus: 9700, signal 358041/452703 (executing program) 1970/01/01 00:11:35 fetching corpus: 9750, signal 358549/453323 (executing program) 1970/01/01 00:11:37 fetching corpus: 9800, signal 359092/453883 (executing program) 1970/01/01 00:11:41 fetching corpus: 9850, signal 359601/454440 (executing program) 1970/01/01 00:11:42 fetching corpus: 9900, signal 359988/454944 (executing program) 1970/01/01 00:11:44 fetching corpus: 9950, signal 360652/455532 (executing program) 1970/01/01 00:11:46 fetching corpus: 10000, signal 360988/456057 (executing program) 1970/01/01 00:11:47 fetching corpus: 10050, signal 361393/456617 (executing program) 1970/01/01 00:11:49 fetching corpus: 10100, signal 361769/457134 (executing program) 1970/01/01 00:11:51 fetching corpus: 10150, signal 362302/457652 (executing program) 1970/01/01 00:11:52 fetching corpus: 10200, signal 362993/458215 (executing program) 1970/01/01 00:11:54 fetching corpus: 10250, signal 363385/458723 (executing program) 1970/01/01 00:11:58 fetching corpus: 10300, signal 363926/459242 (executing program) 1970/01/01 00:12:01 fetching corpus: 10350, signal 364341/459792 (executing program) 1970/01/01 00:12:04 fetching corpus: 10400, signal 364871/460308 (executing program) 1970/01/01 00:12:06 fetching corpus: 10450, signal 365262/460801 (executing program) 1970/01/01 00:12:08 fetching corpus: 10500, signal 365704/461297 (executing program) 1970/01/01 00:12:10 fetching corpus: 10550, signal 366215/461822 (executing program) 1970/01/01 00:12:12 fetching corpus: 10600, signal 366709/462361 (executing program) 1970/01/01 00:12:15 fetching corpus: 10650, signal 367042/462865 (executing program) 1970/01/01 00:12:16 fetching corpus: 10700, signal 367636/463345 (executing program) 1970/01/01 00:12:18 fetching corpus: 10750, signal 368495/463823 (executing program) 1970/01/01 00:12:19 fetching corpus: 10800, signal 368944/464371 (executing program) 1970/01/01 00:12:22 fetching corpus: 10850, signal 369337/464845 (executing program) 1970/01/01 00:12:24 fetching corpus: 10900, signal 370180/465348 (executing program) 1970/01/01 00:12:26 fetching corpus: 10950, signal 371194/465860 (executing program) 1970/01/01 00:12:28 fetching corpus: 11000, signal 371559/466339 (executing program) 1970/01/01 00:12:29 fetching corpus: 11050, signal 371991/466785 (executing program) 1970/01/01 00:12:32 fetching corpus: 11100, signal 372345/467260 (executing program) 1970/01/01 00:12:34 fetching corpus: 11150, signal 372754/467707 (executing program) 1970/01/01 00:12:37 fetching corpus: 11200, signal 373370/468186 (executing program) 1970/01/01 00:12:39 fetching corpus: 11250, signal 373912/468663 (executing program) 1970/01/01 00:12:40 fetching corpus: 11300, signal 374322/469103 (executing program) 1970/01/01 00:12:42 fetching corpus: 11350, signal 374916/469519 (executing program) 1970/01/01 00:12:44 fetching corpus: 11400, signal 375239/469957 (executing program) 1970/01/01 00:12:47 fetching corpus: 11450, signal 375774/470374 (executing program) 1970/01/01 00:12:49 fetching corpus: 11500, signal 376070/470804 (executing program) 1970/01/01 00:12:51 fetching corpus: 11550, signal 376576/471209 (executing program) 1970/01/01 00:12:52 fetching corpus: 11600, signal 376913/471636 (executing program) 1970/01/01 00:12:55 fetching corpus: 11650, signal 377644/472071 (executing program) 1970/01/01 00:12:57 fetching corpus: 11700, signal 378460/472514 (executing program) 1970/01/01 00:12:58 fetching corpus: 11750, signal 378806/472915 (executing program) 1970/01/01 00:13:00 fetching corpus: 11800, signal 379393/473335 (executing program) 1970/01/01 00:13:02 fetching corpus: 11850, signal 379856/473670 (executing program) 1970/01/01 00:13:04 fetching corpus: 11900, signal 380195/473670 (executing program) 1970/01/01 00:13:05 fetching corpus: 11950, signal 380525/473670 (executing program) 1970/01/01 00:13:07 fetching corpus: 12000, signal 380831/473671 (executing program) 1970/01/01 00:13:09 fetching corpus: 12050, signal 381248/473671 (executing program) 1970/01/01 00:13:12 fetching corpus: 12100, signal 381682/473671 (executing program) 1970/01/01 00:13:13 fetching corpus: 12150, signal 382467/473671 (executing program) 1970/01/01 00:13:15 fetching corpus: 12200, signal 383053/473671 (executing program) 1970/01/01 00:13:17 fetching corpus: 12250, signal 383527/473671 (executing program) 1970/01/01 00:13:18 fetching corpus: 12300, signal 383916/473671 (executing program) 1970/01/01 00:13:20 fetching corpus: 12350, signal 384463/473671 (executing program) 1970/01/01 00:13:22 fetching corpus: 12400, signal 385468/473671 (executing program) 1970/01/01 00:13:23 fetching corpus: 12450, signal 385835/473671 (executing program) 1970/01/01 00:13:25 fetching corpus: 12500, signal 386268/473671 (executing program) 1970/01/01 00:13:27 fetching corpus: 12550, signal 386921/473673 (executing program) 1970/01/01 00:13:29 fetching corpus: 12600, signal 387584/473673 (executing program) 1970/01/01 00:13:31 fetching corpus: 12650, signal 387960/473673 (executing program) 1970/01/01 00:13:33 fetching corpus: 12700, signal 388313/473673 (executing program) 1970/01/01 00:13:34 fetching corpus: 12750, signal 388630/473673 (executing program) 1970/01/01 00:13:36 fetching corpus: 12800, signal 389564/473673 (executing program) 1970/01/01 00:13:37 fetching corpus: 12850, signal 389874/473673 (executing program) 1970/01/01 00:13:39 fetching corpus: 12900, signal 390387/473673 (executing program) 1970/01/01 00:13:41 fetching corpus: 12950, signal 390975/473673 (executing program) 1970/01/01 00:13:44 fetching corpus: 13000, signal 391301/473673 (executing program) 1970/01/01 00:13:46 fetching corpus: 13050, signal 391721/473673 (executing program) 1970/01/01 00:13:48 fetching corpus: 13100, signal 392211/473676 (executing program) 1970/01/01 00:13:50 fetching corpus: 13150, signal 392585/473676 (executing program) 1970/01/01 00:13:52 fetching corpus: 13200, signal 393160/473676 (executing program) 1970/01/01 00:13:54 fetching corpus: 13250, signal 393528/473676 (executing program) 1970/01/01 00:13:55 fetching corpus: 13300, signal 394035/473676 (executing program) 1970/01/01 00:13:57 fetching corpus: 13350, signal 394424/473676 (executing program) 1970/01/01 00:13:59 fetching corpus: 13400, signal 395016/473676 (executing program) 1970/01/01 00:14:01 fetching corpus: 13450, signal 395802/473676 (executing program) 1970/01/01 00:14:03 fetching corpus: 13500, signal 396224/473679 (executing program) 1970/01/01 00:14:06 fetching corpus: 13550, signal 396825/473679 (executing program) 1970/01/01 00:14:08 fetching corpus: 13600, signal 397243/473679 (executing program) 1970/01/01 00:14:10 fetching corpus: 13650, signal 397520/473679 (executing program) 1970/01/01 00:14:11 fetching corpus: 13700, signal 397897/473679 (executing program) 1970/01/01 00:14:13 fetching corpus: 13750, signal 398597/473679 (executing program) 1970/01/01 00:14:15 fetching corpus: 13800, signal 398933/473679 (executing program) 1970/01/01 00:14:17 fetching corpus: 13850, signal 399779/473679 (executing program) 1970/01/01 00:14:19 fetching corpus: 13900, signal 400136/473679 (executing program) 1970/01/01 00:14:22 fetching corpus: 13950, signal 400624/473679 (executing program) 1970/01/01 00:14:24 fetching corpus: 14000, signal 400879/473679 (executing program) 1970/01/01 00:14:26 fetching corpus: 14050, signal 401267/473679 (executing program) 1970/01/01 00:14:27 fetching corpus: 14100, signal 401583/473679 (executing program) 1970/01/01 00:14:30 fetching corpus: 14150, signal 402071/473679 (executing program) 1970/01/01 00:14:32 fetching corpus: 14200, signal 402554/473679 (executing program) 1970/01/01 00:14:33 fetching corpus: 14250, signal 403445/473679 (executing program) 1970/01/01 00:14:35 fetching corpus: 14300, signal 403711/473679 (executing program) 1970/01/01 00:14:36 fetching corpus: 14350, signal 403983/473679 (executing program) 1970/01/01 00:14:38 fetching corpus: 14400, signal 404228/473679 (executing program) 1970/01/01 00:14:39 fetching corpus: 14450, signal 404539/473679 (executing program) 1970/01/01 00:14:41 fetching corpus: 14500, signal 405006/473679 (executing program) 1970/01/01 00:14:43 fetching corpus: 14550, signal 405403/473679 (executing program) 1970/01/01 00:14:45 fetching corpus: 14600, signal 406408/473679 (executing program) 1970/01/01 00:14:47 fetching corpus: 14650, signal 406720/473683 (executing program) 1970/01/01 00:14:49 fetching corpus: 14700, signal 407307/473683 (executing program) 1970/01/01 00:14:51 fetching corpus: 14750, signal 407722/473683 (executing program) 1970/01/01 00:14:52 fetching corpus: 14800, signal 407994/473683 (executing program) 1970/01/01 00:14:55 fetching corpus: 14850, signal 408263/473683 (executing program) 1970/01/01 00:14:56 fetching corpus: 14900, signal 408869/473683 (executing program) 1970/01/01 00:14:58 fetching corpus: 14950, signal 409376/473683 (executing program) 1970/01/01 00:15:00 fetching corpus: 15000, signal 409658/473683 (executing program) 1970/01/01 00:15:01 fetching corpus: 15050, signal 409900/473683 (executing program) 1970/01/01 00:15:02 fetching corpus: 15100, signal 410244/473683 (executing program) 1970/01/01 00:15:04 fetching corpus: 15150, signal 410740/473683 (executing program) 1970/01/01 00:15:06 fetching corpus: 15200, signal 411415/473683 (executing program) 1970/01/01 00:15:08 fetching corpus: 15250, signal 411735/473683 (executing program) 1970/01/01 00:15:10 fetching corpus: 15300, signal 412293/473683 (executing program) 1970/01/01 00:15:13 fetching corpus: 15350, signal 412689/473683 (executing program) 1970/01/01 00:15:15 fetching corpus: 15400, signal 413012/473683 (executing program) 1970/01/01 00:15:17 fetching corpus: 15450, signal 413409/473683 (executing program) 1970/01/01 00:15:19 fetching corpus: 15500, signal 413818/473683 (executing program) 1970/01/01 00:15:21 fetching corpus: 15550, signal 414132/473683 (executing program) 1970/01/01 00:15:22 fetching corpus: 15600, signal 414364/473692 (executing program) 1970/01/01 00:15:24 fetching corpus: 15650, signal 414572/473692 (executing program) 1970/01/01 00:15:25 fetching corpus: 15700, signal 414833/473692 (executing program) 1970/01/01 00:15:27 fetching corpus: 15750, signal 415031/473692 (executing program) 1970/01/01 00:15:29 fetching corpus: 15800, signal 415375/473692 (executing program) 1970/01/01 00:15:32 fetching corpus: 15850, signal 415689/473692 (executing program) 1970/01/01 00:15:33 fetching corpus: 15900, signal 415924/473692 (executing program) 1970/01/01 00:15:35 fetching corpus: 15950, signal 416190/473692 (executing program) 1970/01/01 00:15:37 fetching corpus: 16000, signal 416544/473692 (executing program) 1970/01/01 00:15:40 fetching corpus: 16050, signal 416819/473692 (executing program) 1970/01/01 00:15:41 fetching corpus: 16100, signal 417112/473692 (executing program) 1970/01/01 00:15:43 fetching corpus: 16150, signal 417346/473692 (executing program) 1970/01/01 00:15:45 fetching corpus: 16200, signal 417765/473692 (executing program) 1970/01/01 00:15:47 fetching corpus: 16250, signal 418135/473692 (executing program) 1970/01/01 00:15:49 fetching corpus: 16300, signal 418495/473692 (executing program) 1970/01/01 00:15:51 fetching corpus: 16350, signal 418874/473692 (executing program) 1970/01/01 00:15:53 fetching corpus: 16400, signal 419389/473692 (executing program) 1970/01/01 00:15:55 fetching corpus: 16450, signal 419756/473692 (executing program) 1970/01/01 00:15:56 fetching corpus: 16500, signal 420058/473692 (executing program) 1970/01/01 00:15:59 fetching corpus: 16550, signal 420479/473692 (executing program) 1970/01/01 00:16:01 fetching corpus: 16600, signal 420860/473692 (executing program) 1970/01/01 00:16:03 fetching corpus: 16650, signal 421287/473692 (executing program) 1970/01/01 00:16:05 fetching corpus: 16700, signal 421577/473692 (executing program) 1970/01/01 00:16:07 fetching corpus: 16750, signal 421955/473692 (executing program) 1970/01/01 00:16:10 fetching corpus: 16800, signal 422307/473692 (executing program) 1970/01/01 00:16:12 fetching corpus: 16850, signal 422590/473692 (executing program) 1970/01/01 00:16:14 fetching corpus: 16900, signal 422841/473692 (executing program) 1970/01/01 00:16:16 fetching corpus: 16950, signal 423203/473693 (executing program) 1970/01/01 00:16:19 fetching corpus: 17000, signal 423456/473693 (executing program) 1970/01/01 00:16:21 fetching corpus: 17050, signal 423872/473693 (executing program) 1970/01/01 00:16:23 fetching corpus: 17100, signal 424267/473693 (executing program) 1970/01/01 00:16:25 fetching corpus: 17150, signal 424611/473693 (executing program) 1970/01/01 00:16:27 fetching corpus: 17200, signal 424815/473693 (executing program) 1970/01/01 00:16:30 fetching corpus: 17250, signal 425278/473693 (executing program) 1970/01/01 00:16:31 fetching corpus: 17300, signal 425687/473693 (executing program) 1970/01/01 00:16:34 fetching corpus: 17350, signal 425984/473693 (executing program) 1970/01/01 00:16:38 fetching corpus: 17400, signal 426351/473696 (executing program) 1970/01/01 00:16:40 fetching corpus: 17450, signal 426764/473697 (executing program) 1970/01/01 00:16:43 fetching corpus: 17500, signal 427555/473697 (executing program) 1970/01/01 00:16:45 fetching corpus: 17550, signal 427791/473697 (executing program) 1970/01/01 00:16:47 fetching corpus: 17600, signal 428062/473697 (executing program) 1970/01/01 00:16:49 fetching corpus: 17650, signal 428560/473697 (executing program) 1970/01/01 00:16:52 fetching corpus: 17700, signal 428906/473697 (executing program) 1970/01/01 00:16:53 fetching corpus: 17750, signal 429254/473697 (executing program) 1970/01/01 00:16:55 fetching corpus: 17800, signal 429621/473697 (executing program) 1970/01/01 00:16:57 fetching corpus: 17850, signal 429849/473697 (executing program) 1970/01/01 00:16:59 fetching corpus: 17900, signal 430084/473697 (executing program) 1970/01/01 00:17:01 fetching corpus: 17950, signal 430412/473697 (executing program) 1970/01/01 00:17:03 fetching corpus: 18000, signal 430653/473697 (executing program) 1970/01/01 00:17:03 fetching corpus: 18014, signal 430922/473697 (executing program) 1970/01/01 00:17:04 fetching corpus: 18014, signal 430922/473697 (executing program) 1970/01/01 00:18:29 starting 2 fuzzer processes 00:18:44 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8ec01000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f0000007300)={'syztnl0\x00', &(0x7f0000007280)={'ip6gre0\x00', 0x0, 0x4, 0x81, 0xf9, 0x6, 0x2, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0xffffffff, 0x29dd9ef9}}) 00:19:02 executing program 1: recvmsg$unix(0xffffffffffffffff, &(0x7f00000031c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000003140)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/162, 0xa2}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000002140)=""/4096, 0x1000}], 0x4, &(0x7f0000003180)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}, 0x40012083) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000003200)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000033c0)={0x0, 0x0, &(0x7f0000003340)=[{&(0x7f0000003240)="f0af1ea33521110144f8400260b5f1fc3df711f718c8daa7820aa47abc82dd02ad8fb557af5dd5360c6343f4d64c100cdea0465a15943d531e4a5b2dcadedc983c4d512405218e8fb1bfcd57d6396fdb", 0x50}, {&(0x7f00000032c0)="d24b80e1c22204062e2b8618f1c77057c2f5dc2602c5a1625aa0fe6478f9f14b76c6c4d4e6c1d058352d9dce4f5b2ceee8447db5ff65032db82e13a27fcad1f2b74c589b47a54a5d720c1e2d343f0a479fe1a1", 0x53}], 0x2, &(0x7f0000003380), 0x0, 0x20004004}, 0x40080) recvfrom$unix(0xffffffffffffffff, &(0x7f0000003400)=""/154, 0x9a, 0x40, &(0x7f00000034c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000003540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003800)=[{&(0x7f00000035c0)="63a13020a9d73ebd594b726cc11ed20fd4aa7c3218d2bc17907b0f4be3833142738b2a24888229627775e9e776180132c5d61d2266442f956c540c5cb12f8c80a076bada319bfb5426d5962f8d9a523ec56e", 0x52}, {&(0x7f0000003640)="07451976e58cdce4cceff9cd3523b2a4d9c846cab21f62d175024fe8b1d8ad8f73c39a4e23b2e39b6cb0cfc435384ba596313daedf75c44819c438888cfead2e8976e051119b31c0272554e56360f1d91607ed8f02a1f79ea14a60a92780a8d0a83a804fc7232d79d48736f6205fc5ddca6584cf5705e0d765e10d502aef5436e042a65afe593e208d77196cd96a26ba3e73bd428f098d63d10b2fbefded19f7b364d1e363f4eb9e5775a0b467394e9f164e7afd37a90c95db82dc97", 0xbc}, {&(0x7f0000003700)="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", 0xfc}], 0x3, 0x0, 0x0, 0x40400c0}, 0x2) r2 = syz_open_procfs(r0, &(0x7f0000003880)='ns\x00') recvfrom$unix(r2, &(0x7f00000038c0)=""/203, 0xcb, 0x10140, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r2, &(0x7f0000003b00)={&(0x7f00000039c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000003ac0)={&(0x7f0000003a00)={0xb0, 0x464, 0x0, 0x70bd26, 0x25dfdbfe, "2a6f58c466d59c505afe20ead0dd9d4e3d90c97ebe19ce15c029637709f0bef440e7223294222eb5195025a09dd0f577aff12863e9d25f145c174e0c217385745ef666bfe3afd1817a5ea99b14c0df1e85ebc5616fb44ed11f18874da098942b828d907ec68d16726da6c922af488ce6795e70115c5c450953a2a3d63d23518275cbc8c8045514cda0d65434bb86eea04284079a09f48d40c126142f26", ["", "", "", "", "", "", "", "", "", ""]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x4048981) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000003b40)={0x0, 0x1, 0x200}, 0x8) recvmmsg$unix(r2, &(0x7f0000004f40)=[{{&(0x7f0000003b80)=@abs, 0x6e, &(0x7f0000004e80)=[{&(0x7f0000003c00)=""/119, 0x77}, {&(0x7f0000003c80)=""/226, 0xe2}, {&(0x7f0000003d80)=""/4096, 0x1000}, {&(0x7f0000004d80)=""/197, 0xc5}], 0x4, &(0x7f0000004ec0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}], 0x1, 0x24, &(0x7f0000004f80)={0x77359400}) newfstatat(0xffffffffffffff9c, &(0x7f0000005040)='./file0\x00', &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) syz_mount_image$fuse(&(0x7f0000004fc0), &(0x7f0000005000)='./file0\x00', 0x0, 0x0, 0x0, 0x2010880, &(0x7f0000005100)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1e00}}], [{@smackfshat={'smackfshat', 0x3d, 'ns\x00'}}]}}) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f00000051c0)={r6, 0x3, 0x2, 0x5}) bind$unix(r9, &(0x7f0000005200)=@abs={0x1, 0x0, 0x4e21}, 0x6e) recvmsg$can_j1939(r4, &(0x7f0000006900)={&(0x7f0000005280)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000006840)=[{&(0x7f0000005300)=""/2, 0x2}, {&(0x7f0000005340)=""/193, 0xc1}, {&(0x7f0000005440)=""/4096, 0x1000}, {&(0x7f0000006440)=""/146, 0x92}, {&(0x7f0000006500)=""/44, 0x2c}, {&(0x7f0000006540)=""/63, 0x3f}, {&(0x7f0000006580)=""/225, 0xe1}, {&(0x7f0000006680)=""/109, 0x6d}, {&(0x7f0000006700)=""/248, 0xf8}, {&(0x7f0000006800)=""/11, 0xb}], 0xa}, 0x0) r10 = accept$inet(r7, &(0x7f0000006940)={0x2, 0x0, @multicast1}, &(0x7f0000006980)=0x10) ioctl$BTRFS_IOC_QGROUP_CREATE(r10, 0x4010942a, &(0x7f00000069c0)={0x1, 0x3}) r11 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x110, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r11, &(0x7f0000006a00)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000006a40)={{0x1, 0x1, 0x18, r4, {0x10000}}, './file0\x00'}) [ 1152.430787][ T2023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1152.576086][ T2023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1160.767942][ T2023] device hsr_slave_0 entered promiscuous mode [ 1160.827715][ T2023] device hsr_slave_1 entered promiscuous mode [ 1165.391741][ T2023] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1165.544715][ T2023] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1165.677201][ T2023] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1165.752352][ T2023] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1175.300848][ T2023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1175.619070][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1175.676660][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1178.155507][ T2237] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1178.228801][ T2237] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1182.344694][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1182.446244][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1182.804986][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1182.893784][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1183.352122][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1183.745967][ T2103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1184.703329][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1184.783136][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1185.018787][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1185.064950][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1185.674685][ T2023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1187.008179][ T2466] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1187.054993][ T2466] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1193.566984][ T2237] device hsr_slave_0 entered promiscuous mode [ 1193.752978][ T2237] device hsr_slave_1 entered promiscuous mode [ 1193.833538][ T2237] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1193.838207][ T2237] Cannot create hsr debugfs directory [ 1201.236308][ T2237] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1201.435890][ T2237] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1201.674957][ T2237] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1201.877296][ T2237] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1206.887604][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1206.908959][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1215.354889][ T2237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1215.795939][ T2466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1215.866215][ T2466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1216.912941][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1216.996718][ T2054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1217.245390][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1217.306878][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1217.533869][ T2023] device veth0_vlan entered promiscuous mode [ 1218.343145][ T2023] device veth1_vlan entered promiscuous mode [ 1220.250779][ T2023] device veth0_macvtap entered promiscuous mode [ 1220.486698][ T2023] device veth1_macvtap entered promiscuous mode [ 1220.542944][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1220.575230][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1220.604484][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1220.631159][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1221.352923][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1221.414659][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1221.855725][ T2023] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.861904][ T2023] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.863939][ T2023] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.865717][ T2023] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1222.195659][ T2466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1222.215823][ T2466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1224.580640][ T2023] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 1225.677776][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1225.694762][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1225.726156][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1225.749225][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1226.036135][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1226.327320][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1227.032465][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1227.067635][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1227.244547][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1227.284815][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1227.528558][ T2237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1228.301829][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1228.305678][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 00:20:32 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8ec01000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f0000007300)={'syztnl0\x00', &(0x7f0000007280)={'ip6gre0\x00', 0x0, 0x4, 0x81, 0xf9, 0x6, 0x2, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0xffffffff, 0x29dd9ef9}}) 00:20:37 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8ec01000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f0000007300)={'syztnl0\x00', &(0x7f0000007280)={'ip6gre0\x00', 0x0, 0x4, 0x81, 0xf9, 0x6, 0x2, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0xffffffff, 0x29dd9ef9}}) 00:20:43 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8ec01000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f0000007300)={'syztnl0\x00', &(0x7f0000007280)={'ip6gre0\x00', 0x0, 0x4, 0x81, 0xf9, 0x6, 0x2, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0xffffffff, 0x29dd9ef9}}) [ 1244.846468][ T2103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1244.912119][ T2103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1251.843354][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1251.874797][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1251.923970][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1251.946419][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1252.035983][ T2237] device veth0_vlan entered promiscuous mode [ 1252.309269][ T2237] device veth1_vlan entered promiscuous mode [ 1253.163042][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1253.198162][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1253.476885][ T2237] device veth0_macvtap entered promiscuous mode [ 1253.748820][ T2237] device veth1_macvtap entered promiscuous mode [ 1253.893295][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1253.943963][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1254.328349][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1254.384000][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1254.604105][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1254.643324][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1254.813949][ T2237] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1254.815534][ T2237] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1254.816791][ T2237] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1254.818233][ T2237] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1258.917730][ T2713] fuse: Bad value for 'fd' [ 1259.287416][ T2713] fuse: Bad value for 'fd' 00:21:00 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8ec01000) 00:21:00 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8ec01000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f0000007300)={'syztnl0\x00', &(0x7f0000007280)={'ip6gre0\x00', 0x0, 0x4, 0x81, 0xf9, 0x6, 0x2, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0xffffffff, 0x29dd9ef9}}) 00:21:08 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 00:21:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x4040001, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) r1 = socket(0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r2, 0x540f, 0xea007) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000001540)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0xc) sendto$inet(r0, &(0x7f0000000100)='4', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200)="fd", 0x1036f, 0x0, 0x0, 0x0) 00:21:15 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) 00:21:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x4040001, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) r1 = socket(0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r2, 0x540f, 0xea007) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000001540)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0xc) sendto$inet(r0, &(0x7f0000000100)='4', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200)="fd", 0x1036f, 0x0, 0x0, 0x0) 00:21:21 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x4040001, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) r1 = socket(0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r2, 0x540f, 0xea007) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000001540)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0xc) sendto$inet(r0, &(0x7f0000000100)='4', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200)="fd", 0x1036f, 0x0, 0x0, 0x0) 00:21:28 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:32 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:34 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:40 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:41 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:48 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:49 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:58 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:21:59 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:05 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:06 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:11 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:12 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) pidfd_getfd(0xffffffffffffffff, r3, 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:17 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:18 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:23 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:23 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:28 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) pidfd_getfd(0xffffffffffffffff, r3, 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:29 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:34 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:34 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:37 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:40 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:41 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:45 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:46 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:50 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:51 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:56 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:22:56 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:01 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:01 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:05 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:06 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:09 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:14 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:21 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:29 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:36 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:43 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:48 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:23:55 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x82, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:05 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x82, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:24:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x82, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:14 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:24:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:24:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:47 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:24:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:24:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:24:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:25:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:25:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x4b}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4b}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:26:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:26:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:27:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) 00:27:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:27:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) 00:27:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x4b}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:27:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00', '\x00', '\x00']}, 0x378) 00:27:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4b}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:27:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00', '\x00']}, 0x278) 00:27:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:27:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00', '\x00']}, 0x278) 00:27:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x574) 00:27:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00', '\x00']}, 0x278) 00:27:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00', '\x00']}, 0x278) 00:27:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) 00:27:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:27:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00']}, 0x378) 00:27:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:27:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) [ 1668.620206][ C1] hrtimer: interrupt took 1975000 ns 00:27:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:27:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:27:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 00:27:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:28:00 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r1, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:28:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:28:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:28:12 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:28:18 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "3adfd5e620bbf364542580f2641f5bf788f3bdbbb265ba411d0d3743857eae6c0d5de2adc4373084be8a78fcd670b025cda3dfea9b7dc53539fc11ff03f9c96abd8e6c04959a68ef3c0d6eab2589211337f27e582e68d734ebfbb6020bc78ff531966f5b8dbf5f5dab0bd8d1bc719c25f103db4d4d67bee19a396f26d1603eff5a9a172b5cb2b2e924ecaab30b320f40caa8e10054633e39f42635260fe7b11bdf1f50296055a3ff612136e52446823c63128be5272ca8d2b2e82fa7afa3573806b4d281a4f560deb3f88fe685fc221dd8a9c2e033f1c0780807ae14c48dea3993e86cf17012e5ca6b52f255169a55a12d822ba0762601716a42038a", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) 00:28:19 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 00:28:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) (fail_nth: 1) 00:28:24 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x100, 0x761616a, 0x61a, 0xc12], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x5d, 0x1, 0x8) fallocate(r0, 0xa, 0x2, 0x7) r1 = accept(r0, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x40003, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) r4 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000200)) ftruncate(r4, 0xfff) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x69a9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x80000001}, @ldst={0x1, 0x0, 0x6, 0x0, 0x7, 0x2, 0x28}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0xfffffffffffffffe, 0x4}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000380)=""/212, 0x40f00, 0x2, '\x00', 0x0, 0x17, r5, 0x8, &(0x7f0000000480)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0xffffff7f, 0x8}, 0x10, 0x2f091}, 0x78) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f00000005c0)={{r6}, r7, 0x4, @unused=[0x8, 0x3, 0x8, 0x7], @subvolid=0x7}) write$binfmt_elf64(r3, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x6, 0x3, 0x3, 0x3, 0x3, 0x2, 0xdf, 0x40, 0x90, 0xa15, 0x80, 0x38, 0x1, 0x6, 0x7, 0x4}, [{0x3, 0x3, 0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x4b}, {0x70000000, 0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffff9, 0x10000}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x5ac) r8 = syz_open_dev$vcsu(&(0x7f0000001b80), 0x9, 0x20200) ioctl$UFFDIO_WRITEPROTECT(r8, 0xc018aa06, &(0x7f0000001bc0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) [ 1706.390695][ T3074] FAULT_INJECTION: forcing a failure. [ 1706.390695][ T3074] name failslab, interval 1, probability 0, space 0, times 1 [ 1706.395770][ T3074] CPU: 0 PID: 3074 Comm: syz-executor.1 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 [ 1706.396972][ T3074] Hardware name: riscv-virtio,qemu (DT) [ 1706.398023][ T3074] Call Trace: [ 1706.398707][ T3074] [] dump_backtrace+0x2e/0x3c 00:28:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) (fail_nth: 2) [ 1710.466732][ T3077] FAULT_INJECTION: forcing a failure. [ 1710.466732][ T3077] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1710.474864][ T3077] CPU: 1 PID: 3077 Comm: syz-executor.1 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 [ 1710.476729][ T3077] Hardware name: riscv-virtio,qemu (DT) [ 1710.478527][ T3077] Call Trace: [ 1710.479895][ T3077] [] dump_backtrace+0x2e/0x3c 00:28:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) (fail_nth: 1) 00:28:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) (fail_nth: 3) [ 1713.427748][ T3080] FAULT_INJECTION: forcing a failure. [ 1713.427748][ T3080] name failslab, interval 1, probability 0, space 0, times 0 [ 1713.435610][ T3080] CPU: 0 PID: 3080 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 [ 1713.437460][ T3080] Hardware name: riscv-virtio,qemu (DT) [ 1713.438158][ T3080] Call Trace: [ 1713.438750][ T3080] [] dump_backtrace+0x2e/0x3c [ 1714.732012][ T3082] FAULT_INJECTION: forcing a failure. [ 1714.732012][ T3082] name failslab, interval 1, probability 0, space 0, times 0 [ 1714.735271][ T3082] [ 1714.735432][ T3082] ====================================================== [ 1714.735551][ T3082] WARNING: possible circular locking dependency detected [ 1714.735696][ T3082] 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 Not tainted [ 1714.735898][ T3082] ------------------------------------------------------ [ 1714.736015][ T3082] syz-executor.1/3082 is trying to acquire lock: [ 1714.736338][ T3082] ffffffff83c49da8 (console_owner){-...}-{0:0}, at: console_unlock+0x238/0x8d2 [ 1714.737561][ T3082] [ 1714.737561][ T3082] but task is already holding lock: [ 1714.737657][ T3082] ffffffe008199958 (&port->lock){-.-.}-{2:2}, at: pty_write+0xaa/0x114 [ 1714.738400][ T3082] [ 1714.738400][ T3082] which lock already depends on the new lock. [ 1714.738400][ T3082] [ 1714.738534][ T3082] [ 1714.738534][ T3082] the existing dependency chain (in reverse order) is: [ 1714.738688][ T3082] [ 1714.738688][ T3082] -> #2 (&port->lock){-.-.}-{2:2}: [ 1714.739324][ T3082] [ 1714.739324][ T3082] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 1714.739834][ T3082] [ 1714.739834][ T3082] -> #0 (console_owner){-...}-{0:0}: [ 1714.740337][ T3082] [ 1714.740337][ T3082] other info that might help us debug this: [ 1714.740337][ T3082] [ 1714.740463][ T3082] Chain exists of: [ 1714.740463][ T3082] console_owner --> &port_lock_key --> &port->lock [ 1714.740463][ T3082] [ 1714.741017][ T3082] Possible unsafe locking scenario: [ 1714.741017][ T3082] [ 1714.741101][ T3082] CPU0 CPU1 [ 1714.741181][ T3082] ---- ---- [ 1714.741260][ T3082] lock(&port->lock); [ 1714.741487][ T3082] lock(&port_lock_key); [ 1714.741732][ T3082] lock(&port->lock); [ 1714.741972][ T3082] lock(console_owner); [ 1714.742194][ T3082] [ 1714.742194][ T3082] *** DEADLOCK *** [ 1714.742194][ T3082] [ 1714.742321][ T3082] 6 locks held by syz-executor.1/3082: [ 1714.742559][ T3082] #0: ffffffe00dd73098 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x48 [ 1714.743659][ T3082] #1: ffffffe00dd73130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: file_tty_write.constprop.0+0x17e/0x5ac [ 1714.744579][ T3082] #2: ffffffe00dd732e8 (&tty->termios_rwsem){++++}-{3:3}, at: n_tty_write+0xf0/0xa36 [ 1714.745446][ T3082] #3: ffffffd016655378 (&ldata->output_lock){+.+.}-{3:3}, at: n_tty_write+0x818/0xa36 [ 1714.746324][ T3082] #4: ffffffe008199958 (&port->lock){-.-.}-{2:2}, at: pty_write+0xaa/0x114 [ 1714.747181][ T3082] #5: ffffffff83c49c28 (console_lock){+.+.}-{0:0}, at: vprintk_default+0x22/0x2e [ 1714.748114][ T3082] [ 1714.748114][ T3082] stack backtrace: [ 1714.748218][ T3082] CPU: 1 PID: 3082 Comm: syz-executor.1 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 [ 1714.748608][ T3082] Hardware name: riscv-virtio,qemu (DT) [ 1714.748748][ T3082] Call Trace: [ 1714.748856][ T3082] [] dump_backtrace+0x2e/0x3c [ 1714.788940][ T3082] CPU: 1 PID: 3082 Comm: syz-executor.1 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 [ 1714.791319][ T3082] Hardware name: riscv-virtio,qemu (DT) [ 1714.792131][ T3082] Call Trace: [ 1714.792741][ T3082] [] dump_backtrace+0x2e/0x3c 00:28:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) (fail_nth: 2) [ 1716.267667][ T3084] FAULT_INJECTION: forcing a failure. [ 1716.267667][ T3084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1716.275596][ T3084] CPU: 1 PID: 3084 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 [ 1716.276679][ T3084] Hardware name: riscv-virtio,qemu (DT) [ 1716.277361][ T3084] Call Trace: [ 1716.277783][ T3084] [] dump_backtrace+0x2e/0x3c 00:28:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) (fail_nth: 3) [ 1717.935766][ T3087] FAULT_INJECTION: forcing a failure. [ 1717.935766][ T3087] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.938473][ T3087] CPU: 1 PID: 3087 Comm: syz-executor.0 Not tainted 5.15.0-rc1-syzkaller-00001-g64a19591a293 #0 [ 1717.941128][ T3087] Hardware name: riscv-virtio,qemu (DT) [ 1717.942702][ T3087] Call Trace: [ 1717.943407][ T3087] [] dump_backtrace+0x2e/0x3c 00:28:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:28:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:28:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:29:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:29:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:29:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) 00:29:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:29:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x82, 0x0) write$binfmt_elf64(r0, &(0x7f00000015c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{}], "", ['\x00']}, 0x178) VM DIAGNOSIS: 10:55:45 Registers: info registers vcpu 0 pc ffffffff800c7a0a mhartid 0000000000000000 mstatus 00000000000001a0 mip 00000000000000a0 mie 000000000000020a mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff80005050 mepc ffffffff803f184e sepc ffffffff82474168 mcause 8000000000000007 scause 8000000000000005 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff800c7a0a x2/sp ffffffe00678f590 x3/gp ffffffff83f9a558 x4/tp ffffffe00ee6af80 x5/t0 0000000000046000 x6/t1 ffffffc40b5bb321 x7/t2 ffffffff946905f7 x8/s0 ffffffe00678f620 x9/s1 ffffffe007ed1880 x10/a0 ffffffe007ed1a30 x11/a1 0000000000000007 x12/a2 1ffffffc00fda346 x13/a3 ffffffff800c7a0a x14/a4 0000000000000000 x15/a5 ffffffe007ed1a30 x16/a6 ffffffff800ccec8 x17/a7 ffffffe05add990b x18/s2 00000000000000b0 x19/s3 000000000000037a x20/s4 000000000000b78d x21/s5 0000000000000000 x22/s6 0000000000000000 x23/s7 000000000000058f x24/s8 0000000000000002 x25/s9 0000000000000000 x26/s10 00000000f5257d14 x27/s11 00000000007e8c95 x28/t3 0000000000000063 x29/t4 ffffffc40b5bb321 x30/t5 ffffffe0d7fa1000 x31/t6 ffffffe02901c026 f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000 info registers vcpu 1 pc ffffffff803f174e mhartid 0000000000000001 mstatus 00000000000000a0 mip 00000000000000a0 mie 000000000000022a mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff80005050 mepc ffffffff800d4e3c sepc ffffffff8008a758 mcause 8000000000000007 scause 8000000000000005 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff80c987b8 x2/sp ffffffe00db27540 x3/gp ffffffff83f9a558 x4/tp ffffffe00a5f5f00 x5/t0 ffffffff852b6bd7 x6/t1 ffffffc7f0a56d7a x7/t2 0000000000000000 x8/s0 ffffffe00db27570 x9/s1 ffffffff855344d0 x10/a0 ffffffe00a5f5f20 x11/a1 ffffffd00066c000 x12/a2 1ffffffff0aa68a3 x13/a3 ffffffff80c987a2 x14/a4 0000000000000000 x15/a5 ffffffff85534518 x16/a6 0000000000f00000 x17/a7 ffffffff852b6bd6 x18/s2 ffffffe00a5f5f00 x19/s3 0000000000000038 x20/s4 0000000000000064 x21/s5 ffffffff80c97ad8 x22/s6 ffffffff855344d0 x23/s7 ffffffff85534528 x24/s8 0000000000000001 x25/s9 ffffffff83f9e0d0 x26/s10 ffffffff85534758 x27/s11 ffffffff85534520 x28/t3 0000000066666666 x29/t4 ffffffc7f0a56d78 x30/t5 ffffffc7f0a56d7b x31/t6 ffffffff852b6bd7 f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000