syzkaller login: [ 750.117882][ T1859] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 750.176548][ T1859] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 750.219630][ T1859] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 807.880204][ T1859] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. Warning: Permanently added '[localhost]:29275' (ECDSA) to the list of known hosts. 1970/01/01 00:14:05 fuzzer started 1970/01/01 00:14:22 dialing manager at localhost:39029 [ 871.410778][ T2040] cgroup: Unknown subsys name 'net' [ 872.961123][ T2040] cgroup: Unknown subsys name 'rlimit' 1970/01/01 00:14:32 syscalls: 2853 1970/01/01 00:14:32 code coverage: enabled 1970/01/01 00:14:32 comparison tracing: enabled 1970/01/01 00:14:32 extra coverage: enabled 1970/01/01 00:14:32 delay kcov mmap: mmap returned an invalid pointer 1970/01/01 00:14:32 setuid sandbox: enabled 1970/01/01 00:14:32 namespace sandbox: enabled 1970/01/01 00:14:32 Android sandbox: /sys/fs/selinux/policy does not exist 1970/01/01 00:14:32 fault injection: enabled 1970/01/01 00:14:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:14:32 net packet injection: enabled 1970/01/01 00:14:32 net device setup: enabled 1970/01/01 00:14:32 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:14:32 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:14:32 USB emulation: enabled 1970/01/01 00:14:32 hci packet injection: /dev/vhci does not exist 1970/01/01 00:14:32 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:14:32 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:14:32 fetching corpus: 0, signal 0/2000 (executing program) 1970/01/01 00:14:37 fetching corpus: 49, signal 25129/28869 (executing program) 1970/01/01 00:14:40 fetching corpus: 99, signal 39666/44994 (executing program) 1970/01/01 00:14:46 fetching corpus: 149, signal 59240/65903 (executing program) 1970/01/01 00:14:50 fetching corpus: 199, signal 72837/80767 (executing program) 1970/01/01 00:14:53 fetching corpus: 249, signal 80217/89423 (executing program) 1970/01/01 00:14:56 fetching corpus: 299, signal 91517/101789 (executing program) 1970/01/01 00:15:00 fetching corpus: 349, signal 97366/108795 (executing program) 1970/01/01 00:15:02 fetching corpus: 398, signal 105410/117788 (executing program) 1970/01/01 00:15:09 fetching corpus: 448, signal 111571/124936 (executing program) 1970/01/01 00:15:17 fetching corpus: 498, signal 115189/129599 (executing program) 1970/01/01 00:15:20 fetching corpus: 547, signal 119307/134716 (executing program) 1970/01/01 00:15:22 fetching corpus: 597, signal 123078/139487 (executing program) 1970/01/01 00:15:25 fetching corpus: 647, signal 128454/145699 (executing program) 1970/01/01 00:15:28 fetching corpus: 696, signal 132874/150890 (executing program) 1970/01/01 00:15:33 fetching corpus: 746, signal 136924/155746 (executing program) 1970/01/01 00:15:36 fetching corpus: 796, signal 140391/159992 (executing program) 1970/01/01 00:15:39 fetching corpus: 845, signal 143009/163492 (executing program) 1970/01/01 00:15:43 fetching corpus: 894, signal 148890/169839 (executing program) 1970/01/01 00:15:48 fetching corpus: 944, signal 155222/176528 (executing program) 1970/01/01 00:15:51 fetching corpus: 994, signal 157363/179479 (executing program) 1970/01/01 00:15:54 fetching corpus: 1044, signal 159103/182010 (executing program) 1970/01/01 00:15:56 fetching corpus: 1093, signal 161210/184843 (executing program) 1970/01/01 00:15:59 fetching corpus: 1143, signal 164020/188255 (executing program) 1970/01/01 00:16:03 fetching corpus: 1193, signal 166638/191532 (executing program) 1970/01/01 00:16:05 fetching corpus: 1241, signal 168443/194100 (executing program) 1970/01/01 00:16:09 fetching corpus: 1289, signal 171059/197247 (executing program) 1970/01/01 00:16:11 fetching corpus: 1339, signal 173514/200241 (executing program) 1970/01/01 00:16:14 fetching corpus: 1389, signal 176841/203945 (executing program) 1970/01/01 00:16:17 fetching corpus: 1438, signal 179433/207012 (executing program) 1970/01/01 00:16:20 fetching corpus: 1488, signal 182774/210623 (executing program) 1970/01/01 00:16:25 fetching corpus: 1538, signal 185119/213390 (executing program) 1970/01/01 00:16:29 fetching corpus: 1588, signal 189702/217909 (executing program) 1970/01/01 00:16:33 fetching corpus: 1637, signal 192026/220654 (executing program) 1970/01/01 00:16:36 fetching corpus: 1687, signal 195521/224193 (executing program) 1970/01/01 00:16:40 fetching corpus: 1736, signal 197545/226618 (executing program) 1970/01/01 00:16:42 fetching corpus: 1786, signal 199129/228694 (executing program) 1970/01/01 00:16:46 fetching corpus: 1836, signal 200849/230851 (executing program) 1970/01/01 00:16:50 fetching corpus: 1886, signal 201725/232301 (executing program) 1970/01/01 00:16:53 fetching corpus: 1936, signal 203556/234448 (executing program) 1970/01/01 00:16:55 fetching corpus: 1986, signal 205221/236493 (executing program) 1970/01/01 00:16:58 fetching corpus: 2036, signal 206428/238166 (executing program) 1970/01/01 00:17:01 fetching corpus: 2086, signal 207721/239902 (executing program) 1970/01/01 00:17:04 fetching corpus: 2135, signal 208601/241324 (executing program) 1970/01/01 00:17:07 fetching corpus: 2185, signal 210358/243385 (executing program) 1970/01/01 00:17:11 fetching corpus: 2235, signal 211306/244866 (executing program) 1970/01/01 00:17:13 fetching corpus: 2284, signal 212322/246337 (executing program) 1970/01/01 00:17:18 fetching corpus: 2334, signal 214226/248446 (executing program) 1970/01/01 00:17:22 fetching corpus: 2383, signal 216896/251078 (executing program) 1970/01/01 00:17:25 fetching corpus: 2433, signal 219014/253248 (executing program) 1970/01/01 00:17:27 fetching corpus: 2483, signal 222084/256066 (executing program) 1970/01/01 00:17:32 fetching corpus: 2533, signal 223693/257851 (executing program) 1970/01/01 00:17:34 fetching corpus: 2582, signal 224807/259248 (executing program) 1970/01/01 00:17:37 fetching corpus: 2632, signal 226545/261099 (executing program) 1970/01/01 00:17:39 fetching corpus: 2682, signal 227967/262708 (executing program) 1970/01/01 00:17:42 fetching corpus: 2731, signal 228931/264009 (executing program) 1970/01/01 00:17:44 fetching corpus: 2781, signal 231191/266106 (executing program) 1970/01/01 00:17:47 fetching corpus: 2831, signal 233191/268022 (executing program) 1970/01/01 00:17:51 fetching corpus: 2881, signal 234133/269212 (executing program) 1970/01/01 00:17:53 fetching corpus: 2931, signal 236162/271106 (executing program) 1970/01/01 00:17:57 fetching corpus: 2981, signal 237244/272376 (executing program) 1970/01/01 00:18:00 fetching corpus: 3029, signal 238468/273742 (executing program) 1970/01/01 00:18:03 fetching corpus: 3079, signal 240384/275519 (executing program) 1970/01/01 00:18:06 fetching corpus: 3128, signal 241805/276937 (executing program) 1970/01/01 00:18:09 fetching corpus: 3177, signal 243044/278256 (executing program) 1970/01/01 00:18:11 fetching corpus: 3227, signal 243836/279302 (executing program) 1970/01/01 00:18:13 fetching corpus: 3277, signal 244762/280392 (executing program) 1970/01/01 00:18:16 fetching corpus: 3327, signal 248225/282971 (executing program) 1970/01/01 00:18:18 fetching corpus: 3377, signal 249070/283961 (executing program) 1970/01/01 00:18:21 fetching corpus: 3426, signal 250472/285303 (executing program) 1970/01/01 00:18:24 fetching corpus: 3476, signal 252235/286788 (executing program) 1970/01/01 00:18:27 fetching corpus: 3526, signal 253005/287688 (executing program) 1970/01/01 00:18:29 fetching corpus: 3575, signal 254277/288869 (executing program) 1970/01/01 00:18:33 fetching corpus: 3624, signal 255947/290295 (executing program) 1970/01/01 00:18:35 fetching corpus: 3674, signal 257299/291489 (executing program) 1970/01/01 00:18:37 fetching corpus: 3724, signal 258534/292637 (executing program) 1970/01/01 00:18:39 fetching corpus: 3774, signal 259056/293378 (executing program) 1970/01/01 00:18:43 fetching corpus: 3824, signal 260896/294845 (executing program) 1970/01/01 00:18:45 fetching corpus: 3874, signal 262124/295964 (executing program) 1970/01/01 00:18:48 fetching corpus: 3923, signal 263654/297197 (executing program) 1970/01/01 00:18:51 fetching corpus: 3973, signal 264898/298272 (executing program) 1970/01/01 00:18:54 fetching corpus: 4023, signal 265602/299042 (executing program) 1970/01/01 00:18:56 fetching corpus: 4073, signal 266516/299916 (executing program) 1970/01/01 00:18:59 fetching corpus: 4123, signal 267408/300779 (executing program) 1970/01/01 00:19:01 fetching corpus: 4171, signal 267966/301461 (executing program) 1970/01/01 00:19:04 fetching corpus: 4221, signal 268888/302329 (executing program) 1970/01/01 00:19:07 fetching corpus: 4271, signal 270135/303340 (executing program) 1970/01/01 00:19:10 fetching corpus: 4321, signal 271051/304192 (executing program) 1970/01/01 00:19:11 fetching corpus: 4371, signal 271829/304928 (executing program) 1970/01/01 00:19:13 fetching corpus: 4421, signal 272545/305652 (executing program) 1970/01/01 00:19:17 fetching corpus: 4471, signal 273368/306402 (executing program) 1970/01/01 00:19:19 fetching corpus: 4521, signal 274215/307197 (executing program) 1970/01/01 00:19:22 fetching corpus: 4571, signal 274697/307748 (executing program) 1970/01/01 00:19:24 fetching corpus: 4620, signal 275433/308423 (executing program) 1970/01/01 00:19:26 fetching corpus: 4670, signal 276161/309073 (executing program) 1970/01/01 00:19:29 fetching corpus: 4720, signal 276906/309723 (executing program) 1970/01/01 00:19:32 fetching corpus: 4770, signal 277872/310436 (executing program) 1970/01/01 00:19:35 fetching corpus: 4819, signal 278888/311179 (executing program) 1970/01/01 00:19:36 fetching corpus: 4869, signal 279923/311931 (executing program) 1970/01/01 00:19:39 fetching corpus: 4919, signal 280680/312575 (executing program) 1970/01/01 00:19:42 fetching corpus: 4968, signal 281562/313236 (executing program) 1970/01/01 00:19:45 fetching corpus: 5018, signal 282191/313851 (executing program) 1970/01/01 00:19:47 fetching corpus: 5068, signal 282746/314356 (executing program) 1970/01/01 00:19:49 fetching corpus: 5118, signal 283522/314990 (executing program) 1970/01/01 00:19:51 fetching corpus: 5168, signal 284069/315500 (executing program) 1970/01/01 00:19:54 fetching corpus: 5217, signal 284986/316154 (executing program) 1970/01/01 00:19:57 fetching corpus: 5267, signal 285855/316731 (executing program) 1970/01/01 00:19:59 fetching corpus: 5316, signal 286625/317286 (executing program) 1970/01/01 00:20:02 fetching corpus: 5366, signal 288295/318146 (executing program) 1970/01/01 00:20:04 fetching corpus: 5416, signal 288971/318679 (executing program) 1970/01/01 00:20:07 fetching corpus: 5466, signal 289840/319282 (executing program) 1970/01/01 00:20:13 fetching corpus: 5516, signal 291041/319920 (executing program) 1970/01/01 00:20:17 fetching corpus: 5563, signal 291550/320341 (executing program) 1970/01/01 00:20:21 fetching corpus: 5613, signal 293859/321333 (executing program) 1970/01/01 00:20:23 fetching corpus: 5663, signal 294842/321884 (executing program) 1970/01/01 00:20:25 fetching corpus: 5713, signal 295741/322375 (executing program) 1970/01/01 00:20:29 fetching corpus: 5763, signal 296328/322803 (executing program) 1970/01/01 00:20:33 fetching corpus: 5813, signal 297112/323288 (executing program) 1970/01/01 00:20:35 fetching corpus: 5861, signal 297538/323636 (executing program) 1970/01/01 00:20:38 fetching corpus: 5911, signal 298584/324165 (executing program) 1970/01/01 00:20:41 fetching corpus: 5961, signal 299268/324586 (executing program) 1970/01/01 00:20:43 fetching corpus: 6011, signal 299724/324874 (executing program) 1970/01/01 00:20:46 fetching corpus: 6061, signal 300620/325324 (executing program) 1970/01/01 00:20:49 fetching corpus: 6111, signal 301739/325829 (executing program) 1970/01/01 00:20:51 fetching corpus: 6161, signal 302645/326245 (executing program) 1970/01/01 00:20:53 fetching corpus: 6211, signal 303956/326787 (executing program) 1970/01/01 00:20:55 fetching corpus: 6261, signal 305366/327303 (executing program) 1970/01/01 00:20:57 fetching corpus: 6311, signal 305990/327613 (executing program) 1970/01/01 00:21:01 fetching corpus: 6361, signal 306555/327907 (executing program) 1970/01/01 00:21:03 fetching corpus: 6411, signal 307031/328234 (executing program) 1970/01/01 00:21:06 fetching corpus: 6461, signal 307545/328530 (executing program) 1970/01/01 00:21:09 fetching corpus: 6511, signal 308634/328934 (executing program) 1970/01/01 00:21:13 fetching corpus: 6561, signal 309741/329317 (executing program) 1970/01/01 00:21:16 fetching corpus: 6611, signal 310501/329643 (executing program) 1970/01/01 00:21:18 fetching corpus: 6661, signal 310865/329852 (executing program) 1970/01/01 00:21:21 fetching corpus: 6711, signal 311669/330145 (executing program) 1970/01/01 00:21:24 fetching corpus: 6761, signal 312609/330449 (executing program) 1970/01/01 00:21:26 fetching corpus: 6811, signal 313037/330671 (executing program) 1970/01/01 00:21:28 fetching corpus: 6861, signal 313536/330895 (executing program) 1970/01/01 00:21:31 fetching corpus: 6911, signal 314290/331163 (executing program) 1970/01/01 00:21:34 fetching corpus: 6961, signal 315452/331477 (executing program) 1970/01/01 00:21:37 fetching corpus: 7011, signal 316106/331693 (executing program) 1970/01/01 00:21:40 fetching corpus: 7061, signal 316573/331841 (executing program) 1970/01/01 00:21:42 fetching corpus: 7111, signal 317152/332034 (executing program) 1970/01/01 00:21:44 fetching corpus: 7161, signal 317819/332249 (executing program) 1970/01/01 00:21:47 fetching corpus: 7211, signal 318509/332446 (executing program) 1970/01/01 00:21:49 fetching corpus: 7261, signal 319062/332609 (executing program) 1970/01/01 00:21:52 fetching corpus: 7310, signal 319709/332790 (executing program) 1970/01/01 00:21:54 fetching corpus: 7359, signal 320646/332967 (executing program) 1970/01/01 00:21:56 fetching corpus: 7408, signal 321136/333097 (executing program) 1970/01/01 00:21:59 fetching corpus: 7458, signal 321762/333249 (executing program) 1970/01/01 00:22:02 fetching corpus: 7508, signal 322494/333388 (executing program) 1970/01/01 00:22:06 fetching corpus: 7558, signal 323033/333499 (executing program) 1970/01/01 00:22:10 fetching corpus: 7608, signal 324383/333682 (executing program) 1970/01/01 00:22:12 fetching corpus: 7658, signal 325493/333836 (executing program) 1970/01/01 00:22:15 fetching corpus: 7708, signal 326535/333962 (executing program) 1970/01/01 00:22:17 fetching corpus: 7757, signal 327235/334075 (executing program) 1970/01/01 00:22:19 fetching corpus: 7807, signal 327663/334151 (executing program) 1970/01/01 00:22:23 fetching corpus: 7857, signal 328298/334221 (executing program) 1970/01/01 00:22:29 fetching corpus: 7907, signal 328887/334283 (executing program) 1970/01/01 00:22:34 fetching corpus: 7957, signal 329557/334364 (executing program) 1970/01/01 00:22:38 fetching corpus: 8006, signal 330246/334417 (executing program) 1970/01/01 00:22:42 fetching corpus: 8056, signal 330990/334466 (executing program) 1970/01/01 00:22:44 fetching corpus: 8106, signal 331471/334511 (executing program) 1970/01/01 00:22:45 fetching corpus: 8117, signal 331641/334534 (executing program) 1970/01/01 00:22:46 fetching corpus: 8118, signal 331646/334546 (executing program) 1970/01/01 00:22:46 fetching corpus: 8118, signal 331646/334559 (executing program) 1970/01/01 00:22:46 fetching corpus: 8118, signal 331646/334578 (executing program) 1970/01/01 00:22:46 fetching corpus: 8118, signal 331646/334578 (executing program) 1970/01/01 00:24:52 starting 2 fuzzer processes 00:24:53 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:24:53 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r1, 0x18000) [ 1526.459287][ T2057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1527.421386][ T2057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1528.200937][ T2058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1528.998478][ T2058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1543.236801][ T2057] device hsr_slave_0 entered promiscuous mode [ 1543.291618][ T2057] device hsr_slave_1 entered promiscuous mode [ 1544.166279][ T2058] device hsr_slave_0 entered promiscuous mode [ 1544.242182][ T2058] device hsr_slave_1 entered promiscuous mode [ 1544.268166][ T2058] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1544.278702][ T2058] Cannot create hsr debugfs directory [ 1555.990991][ T2057] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1556.451473][ T2057] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1556.719141][ T2057] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1557.338377][ T2057] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1559.797079][ T2058] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1560.042032][ T2058] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1560.352288][ T2058] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1560.601761][ T2058] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1580.606264][ T2057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1581.899401][ T2041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1582.216183][ T2041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1585.861122][ T2058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1587.061775][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1587.119687][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1598.796973][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1598.921463][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1599.461595][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1599.537576][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1600.196810][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1600.778351][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1602.264724][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1602.330091][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1603.098090][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1603.215050][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1604.316351][ T2041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1604.390150][ T2041] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1604.799368][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1604.887479][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1605.950866][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1606.072740][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1606.190241][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1606.221663][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1607.876361][ T2058] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1607.877646][ T2058] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1608.167654][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1608.238304][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1608.295004][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1608.331310][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1608.577174][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1609.306994][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1609.309934][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1635.362488][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1635.462673][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1637.659715][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1637.736807][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1647.542398][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1647.632013][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1647.899346][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1647.978933][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1648.082393][ T2057] device veth0_vlan entered promiscuous mode [ 1649.160650][ T2057] device veth1_vlan entered promiscuous mode [ 1649.725257][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1649.771310][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1649.895565][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1649.935835][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1650.278928][ T2058] device veth0_vlan entered promiscuous mode [ 1651.112031][ T2058] device veth1_vlan entered promiscuous mode [ 1652.062762][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1652.109456][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1652.434581][ T2057] device veth0_macvtap entered promiscuous mode [ 1652.926649][ T2057] device veth1_macvtap entered promiscuous mode [ 1653.228416][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1654.180446][ T2058] device veth0_macvtap entered promiscuous mode [ 1654.352782][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1654.381678][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1654.492321][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1655.102122][ T2058] device veth1_macvtap entered promiscuous mode [ 1655.642599][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1655.717197][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1655.752406][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1655.796828][ T2472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1656.197822][ T2057] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1656.201981][ T2057] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1656.208579][ T2057] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1656.210436][ T2057] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1657.821781][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1657.891155][ T2698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1658.122136][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1658.168796][ T1313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1658.617869][ T2058] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1658.619539][ T2058] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1658.621012][ T2058] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1658.622421][ T2058] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1669.128856][ T2754] sctp: failed to load transform for md5: -4 00:27:49 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:27:51 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r1, 0x18000) 00:27:57 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:27:58 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r1, 0x18000) 00:28:03 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:28:05 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r1, 0x18000) 00:28:12 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:28:16 executing program 1: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:28:16 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:28:18 executing program 1: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:28:20 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:28:22 executing program 1: r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x22000894) inotify_rm_watch(r0, r1) read(r0, 0x0, 0x22) 00:28:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_deladdr={0x34, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x34}}, 0x0) 00:28:28 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x97, 0xc2, 0xf4, 0x8, 0x988, 0x578, 0x4d2f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x20, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0x82, 0xa4}}]}}]}}, 0x0) 00:28:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_deladdr={0x34, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x34}}, 0x0) [ 1712.600884][ T2680] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 1712.927113][ T2680] usb 2-1: Using ep0 maxpacket: 8 [ 1713.311974][ T2680] usb 2-1: New USB device found, idVendor=0988, idProduct=0578, bcdDevice=4d.2f [ 1713.340031][ T2680] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1713.928633][ T2680] cp210x 2-1:32.0: cp210x converter detected [ 1714.419636][ T2680] cp210x 2-1:32.0: failed to get vendor val 0x370b size 1: -71 [ 1714.436327][ T2680] cp210x 2-1:32.0: querying part number failed 00:28:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_deladdr={0x34, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x34}}, 0x0) [ 1714.809702][ T2680] usb 2-1: cp210x converter now attached to ttyUSB0 [ 1715.029976][ T2680] usb 2-1: USB disconnect, device number 2 [ 1715.239054][ T2680] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1715.339598][ T2680] cp210x 2-1:32.0: device disconnected 00:28:36 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x97, 0xc2, 0xf4, 0x8, 0x988, 0x578, 0x4d2f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x20, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0x82, 0xa4}}]}}]}}, 0x0) 00:28:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_deladdr={0x34, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x34}}, 0x0) [ 1721.516058][ T1313] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 1721.788639][ T1313] usb 2-1: Using ep0 maxpacket: 8 [ 1721.938524][ T1313] usb 2-1: New USB device found, idVendor=0988, idProduct=0578, bcdDevice=4d.2f [ 1721.940561][ T1313] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1722.311951][ T1313] cp210x 2-1:32.0: cp210x converter detected [ 1722.656741][ T1313] cp210x 2-1:32.0: failed to get vendor val 0x370b size 1: -71 [ 1722.658103][ T1313] cp210x 2-1:32.0: querying part number failed [ 1723.045172][ T1313] usb 2-1: cp210x converter now attached to ttyUSB0 [ 1723.227506][ T1313] usb 2-1: USB disconnect, device number 3 [ 1723.670929][ T1313] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1723.759355][ T1313] cp210x 2-1:32.0: device disconnected 00:28:45 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x97, 0xc2, 0xf4, 0x8, 0x988, 0x578, 0x4d2f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x20, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0x82, 0xa4}}]}}]}}, 0x0) 00:28:46 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x97, 0xc2, 0xf4, 0x8, 0x988, 0x578, 0x4d2f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x20, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0x82, 0xa4}}]}}]}}, 0x0) [ 1728.847330][ T2750] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1729.118350][ T2750] usb 1-1: Using ep0 maxpacket: 8 [ 1729.789032][ T2750] usb 1-1: New USB device found, idVendor=0988, idProduct=0578, bcdDevice=4d.2f [ 1729.790999][ T2750] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1730.480959][ T2750] cp210x 1-1:32.0: cp210x converter detected [ 1731.017849][ T2750] cp210x 1-1:32.0: failed to get vendor val 0x370b size 1: -71 [ 1731.019647][ T2750] cp210x 1-1:32.0: querying part number failed [ 1731.180436][ T2750] usb 1-1: cp210x converter now attached to ttyUSB0 [ 1731.416467][ T2750] usb 1-1: USB disconnect, device number 2 [ 1731.840053][ T2750] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1731.949314][ T2750] cp210x 1-1:32.0: device disconnected [ 1734.226325][ T1313] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 1734.695802][ T1313] usb 2-1: Using ep0 maxpacket: 8 [ 1734.819966][ T1313] usb 2-1: New USB device found, idVendor=0988, idProduct=0578, bcdDevice=4d.2f [ 1734.821908][ T1313] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1735.348201][ T1313] cp210x 2-1:32.0: cp210x converter detected 00:28:53 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x97, 0xc2, 0xf4, 0x8, 0x988, 0x578, 0x4d2f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x20, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0x82, 0xa4}}]}}]}}, 0x0) [ 1735.828827][ T1313] cp210x 2-1:32.0: failed to get vendor val 0x370b size 1: -71 [ 1735.830606][ T1313] cp210x 2-1:32.0: querying part number failed [ 1736.011076][ T1313] usb 2-1: cp210x converter now attached to ttyUSB0 [ 1736.277189][ T1313] usb 2-1: USB disconnect, device number 4 [ 1736.605010][ T1313] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1736.668793][ T1313] cp210x 2-1:32.0: device disconnected [ 1738.997024][ T2753] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1739.276124][ T2753] usb 1-1: Using ep0 maxpacket: 8 00:28:57 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x97, 0xc2, 0xf4, 0x8, 0x988, 0x578, 0x4d2f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x20, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0x82, 0xa4}}]}}]}}, 0x0) [ 1739.778117][ T2753] usb 1-1: New USB device found, idVendor=0988, idProduct=0578, bcdDevice=4d.2f [ 1739.780028][ T2753] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1740.121281][ T2753] cp210x 1-1:32.0: cp210x converter detected [ 1740.476765][ T2753] cp210x 1-1:32.0: failed to get vendor val 0x370b size 1: -71 [ 1740.478272][ T2753] cp210x 1-1:32.0: querying part number failed [ 1740.599890][ T2753] usb 1-1: cp210x converter now attached to ttyUSB0 [ 1740.961288][ T2753] usb 1-1: USB disconnect, device number 3 [ 1741.427554][ T2753] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1741.495721][ T2753] cp210x 1-1:32.0: device disconnected [ 1742.495980][ T2793] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 1742.927490][ T2793] usb 2-1: Using ep0 maxpacket: 8 [ 1743.078109][ T2793] usb 2-1: New USB device found, idVendor=0988, idProduct=0578, bcdDevice=4d.2f [ 1743.080093][ T2793] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1743.340578][ T2793] cp210x 2-1:32.0: cp210x converter detected [ 1743.789297][ T2793] cp210x 2-1:32.0: failed to get vendor val 0x370b size 1: -71 [ 1743.791178][ T2793] cp210x 2-1:32.0: querying part number failed [ 1743.970480][ T2793] usb 2-1: cp210x converter now attached to ttyUSB0 [ 1744.229933][ T2793] usb 2-1: USB disconnect, device number 5 [ 1744.437725][ T2793] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1744.490481][ T2793] cp210x 2-1:32.0: device disconnected 00:29:03 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x97, 0xc2, 0xf4, 0x8, 0x988, 0x578, 0x4d2f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x20, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0x82, 0xa4}}]}}]}}, 0x0) [ 1751.336567][ T1313] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1751.617522][ T1313] usb 1-1: Using ep0 maxpacket: 8 [ 1752.219856][ T1313] usb 1-1: New USB device found, idVendor=0988, idProduct=0578, bcdDevice=4d.2f [ 1752.222142][ T1313] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 00:29:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_deladdr={0x34, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x34}}, 0x0) [ 1752.656765][ T1313] cp210x 1-1:32.0: cp210x converter detected [ 1753.010276][ T1313] cp210x 1-1:32.0: failed to get vendor val 0x370b size 1: -71 [ 1753.012114][ T1313] cp210x 1-1:32.0: querying part number failed [ 1753.171999][ T1313] usb 1-1: cp210x converter now attached to ttyUSB0 [ 1753.430397][ T1313] usb 1-1: USB disconnect, device number 4 [ 1753.610232][ T1313] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1753.666230][ T1313] cp210x 1-1:32.0: device disconnected 00:29:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_deladdr={0x34, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x34}}, 0x0) 00:29:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 00:29:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_deladdr={0x34, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x34}}, 0x0) 00:29:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 00:29:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 00:29:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 00:29:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 00:29:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 00:29:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 00:29:33 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@mpol={'mpol', 0x3d, {'default', '', @val={0x3a, [0x2f]}}}}]}) [ 1777.031515][ T2940] tmpfs: Bad value for 'mpol' 00:29:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', 0x0}) 00:29:37 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@mpol={'mpol', 0x3d, {'default', '', @val={0x3a, [0x2f]}}}}]}) [ 1781.075973][ T2948] tmpfs: Bad value for 'mpol' 00:29:42 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@mpol={'mpol', 0x3d, {'default', '', @val={0x3a, [0x2f]}}}}]}) [ 1786.315886][ T2953] tmpfs: Bad value for 'mpol' 00:29:45 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001040)='/sys/module/apparmor', 0x200140, 0x0) fcntl$getflags(r0, 0x0) 00:29:46 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@mpol={'mpol', 0x3d, {'default', '', @val={0x3a, [0x2f]}}}}]}) 00:29:47 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001040)='/sys/module/apparmor', 0x200140, 0x0) fcntl$getflags(r0, 0x0) [ 1790.282504][ T2957] tmpfs: Bad value for 'mpol' 00:29:52 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001040)='/sys/module/apparmor', 0x200140, 0x0) fcntl$getflags(r0, 0x0) 00:29:53 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xfff7}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x8018}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 00:29:59 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001040)='/sys/module/apparmor', 0x200140, 0x0) fcntl$getflags(r0, 0x0) 00:30:00 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xfff7}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x8018}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 00:30:08 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xfff7}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x8018}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 00:30:09 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xfff7}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x8018}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 00:30:18 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xfff7}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x8018}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 00:30:19 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xfff7}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x8018}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 00:30:24 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xfff7}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x8018}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 00:30:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x8, 0x3, 0x1f8, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0xffffffff, 'bond_slave_1\x00', 'lo\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="4f46cc0cae1b", 0x0, 0xa, [0x23, 0x8, 0x3b, 0x34, 0x2d, 0x29, 0x3b, 0xd, 0x2, 0x39]}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x197) [ 1831.021557][ T2993] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and it will removed soon, use xt_cluster instead 00:30:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@dellink={0x34, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'gretap0\x00'}]}, 0x34}}, 0x0) 00:30:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x8, 0x3, 0x1f8, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0xffffffff, 'bond_slave_1\x00', 'lo\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="4f46cc0cae1b", 0x0, 0xa, [0x23, 0x8, 0x3b, 0x34, 0x2d, 0x29, 0x3b, 0xd, 0x2, 0x39]}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x197) 00:30:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@dellink={0x34, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'gretap0\x00'}]}, 0x34}}, 0x0) 00:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x8, 0x3, 0x1f8, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0xffffffff, 'bond_slave_1\x00', 'lo\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="4f46cc0cae1b", 0x0, 0xa, [0x23, 0x8, 0x3b, 0x34, 0x2d, 0x29, 0x3b, 0xd, 0x2, 0x39]}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x197) 00:30:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@dellink={0x34, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'gretap0\x00'}]}, 0x34}}, 0x0) 00:30:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x8, 0x3, 0x1f8, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0xffffffff, 'bond_slave_1\x00', 'lo\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="4f46cc0cae1b", 0x0, 0xa, [0x23, 0x8, 0x3b, 0x34, 0x2d, 0x29, 0x3b, 0xd, 0x2, 0x39]}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x197) 00:30:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@dellink={0x34, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'gretap0\x00'}]}, 0x34}}, 0x0) 00:30:49 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) 00:30:50 executing program 1: ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000040)={0x1, 0x3}) r0 = syz_io_uring_setup(0x7bac, &(0x7f0000000080), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r3 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r3, 0x5460, 0xec000) ppoll(&(0x7f0000000300)=[{r0}, {0xffffffffffffffff, 0x6100}, {}], 0x3, &(0x7f0000000340)={0x0, 0x989680}, 0x0, 0x0) 00:30:53 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) 00:30:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 00:30:57 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) 00:31:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 00:31:01 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) 00:31:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 00:31:07 executing program 0: r0 = memfd_create(&(0x7f0000000000)='/dev/vhost-net\x00', 0x5) fcntl$addseals(r0, 0x409, 0x0) 00:31:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 00:31:11 executing program 0: r0 = memfd_create(&(0x7f0000000000)='/dev/vhost-net\x00', 0x5) fcntl$addseals(r0, 0x409, 0x0) 00:31:14 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0x0) read$usbfs(r0, 0x0, 0x0) 00:31:15 executing program 0: r0 = memfd_create(&(0x7f0000000000)='/dev/vhost-net\x00', 0x5) fcntl$addseals(r0, 0x409, 0x0) 00:31:18 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0x0) read$usbfs(r0, 0x0, 0x0) 00:31:19 executing program 0: r0 = memfd_create(&(0x7f0000000000)='/dev/vhost-net\x00', 0x5) fcntl$addseals(r0, 0x409, 0x0) 00:31:21 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0x0) read$usbfs(r0, 0x0, 0x0) 00:31:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0x0) read$usbfs(r0, 0x0, 0x0) 00:31:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6gretap0\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xe}}) 00:31:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6gretap0\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xe}}) 00:31:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) shutdown(r1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) recvmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 00:31:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) shutdown(r1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) recvmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 00:31:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6gretap0\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xe}}) 00:31:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6gretap0\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xe}}) 00:31:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) shutdown(r1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) recvmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 00:31:43 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='user_xattr,usrquota,data_err=ignore,nojournal_checksum,delalloc,test_dummy_encryption']) 00:31:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) shutdown(r1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) recvmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) [ 1907.582670][ T3059] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:31:48 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='user_xattr,usrquota,data_err=ignore,nojournal_checksum,delalloc,test_dummy_encryption']) 00:31:50 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) [ 1912.931111][ T3067] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:31:53 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='user_xattr,usrquota,data_err=ignore,nojournal_checksum,delalloc,test_dummy_encryption']) 00:31:53 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) [ 1918.940239][ T3076] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:31:58 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) 00:32:01 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='user_xattr,usrquota,data_err=ignore,nojournal_checksum,delalloc,test_dummy_encryption']) 00:32:04 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) [ 1928.666088][ T3085] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:32:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="9b7f", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x0) 00:32:15 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1900) 00:32:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="9b7f", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x0) 00:32:20 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1900) 00:32:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="9b7f", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x0) 00:32:24 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1900) 00:32:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="9b7f", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x0) 00:32:27 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1900) 00:32:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="9b7f", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x0) 00:32:31 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001dc0), 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r1, 0xc0045002, &(0x7f0000000000)) 00:32:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="9b7f", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x0) 00:32:35 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x20) 00:32:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="9b7f", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x0) 00:32:39 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x20) 00:32:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 1963.939823][ T27] audit: type=1804 audit(1962.390:2): pid=3121 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/53/file1" dev="vda" ino=644 res=1 errno=0 00:32:42 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x20) [ 1964.611578][ T27] audit: type=1804 audit(1963.050:3): pid=3122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/53/file1" dev="vda" ino=644 res=1 errno=0 [ 1964.771416][ T27] audit: type=1804 audit(1963.230:4): pid=3121 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/53/file1" dev="vda" ino=644 res=1 errno=0 00:32:46 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x20) 00:32:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="598c632b5672b5f5d684f7ae5f4cc171f4c31e58ff5fdda23bc21599e05567fb043bd18fdbbfadda6b70f47f37b9aead397f99c116d34552bff859d0ac1017ab669b2fdbbaebc9461bd70c8c4edab99f349307d4dce12d30979759cfbad346513c57ca2a9d7ef902f754f87334fa68a223cd26876e64dbd59fe072c2c2daf4bebab1718e5faaf1c0f98debb634e7daba53add045a1d81559e4bb17a5dba75fe7f49fb5ad6d6a7be1862c7285711cf66b99a5f8ff57c728801208c91bbd0e62cf89be985a128b55e0644bcd3a8c221e39d7178d29ce39f3aaae59b0b3aa3c3db82f9add9dfb992ec391532b450834de50f183c5810a972b9cf227c5d61435d75a3fd0736ac9b2b46b3295faaa08b0740958aa5f96963884d7552c7be4fd2e0dadc010ab536ab126b11d27eea4e516e32db0dd39c55a5c8a159523aa026c5c02f308d42b69bcf555f9e8a185bdd2286e0c4adfc708bd93dcb2c33c6aa1dcfeaece0b2d046254ed325595108c2c39f1f8883f68030730021077ccf7c5f4509237284910ad7f93824e99e01ce106e5bd729be153b4b6bc1fbfb1bece9c48ac49d157d800e3940b77e3f9c70baa42791d60181d925c1412e44696e833547076bae516f3602e5fc07b0be9785342ceee6d9486777f796d834c17d18b8ba8353b83dfc473fece90bba7f3749ee30f2c768b7bb1b82c893656c3b95e8dea4cd36a72257a9d8c96fc90aff24149d3eae8f051a6283b98ebe353f417bd67dd38705d959846a622e152a999d6dd8686c95a4c9edab92de9a9af041b1bd1c8c80a7fdbf274f5ed32959824152810594d79bc690739ed04d9248cc6240e1ecf54f7843bc591c899ad0b1e7b7388b336bbeac9ee9e6fa392298503c232906e18aaa96c82a0edfdc311f8dfc7dedc7ce7c177fcadfe3f70a8e3d1c353d8d40d9139ec8e17fc69d936102e6fa28666db89cb5aeb2365e906ebe0d4c07539a77b9120da6415c06f9d6fe7bdf9930ce63eeae1a7896bde5d08e41ae89cc49c50abc9ea1504a9e22b4f38e80dd917740d105f7642dc1c153d337144446f69d100d72fb588ead3d67370506edaf6a1d2a43f8a0070bef061debf20958beec3b82f054913eea8f7532030e7d3f2fe6fa8d47c083418c4927bcf6f5d334baf8b9d438437373a74968a560a530b87a54832deac24f40e13b4b9426578b2b3a03050b11a371f238ef1416278bd7743ed3e7b8f41b3cafeff35b0ceea73f844a256ff4adedfb19fe7f8fc4b2fb33d7cf0b5e8e3ae95074e8e8366ce9ddafcd6523b52f372a092c3e459b0f24845d34c8eb9a8d1bdae16f7beb78608b3b9fe18ec027f382a17f36d37e9d134f433ef4329aea78f3c8b1d4d14560d48af0672efedfca383b335afd6f71ba307a61991997b1f123530c7abf0fac11c7d0ca2ec9fcaf8d726ccdffbbfee26ee6d163355d850e64dcac8e3daf7020834ee9003ad83ecdae8688d73df70e678d578d21f4ef54c69cfa2a8588ce1dd158bd997af6041764b867a6008b1695347723f436e2bc406577e11e1684663b1ff113b0e37dc41de6801906c9771c77985da34e0f10faf434f2391fbee210814e0986a9d10a95b96e15638f61eeb3a5b95cdf6750c544aee3b2cddd165a80cec85d3b679195ded810bd1baac769f872a81f75bbbcf7095fa6764624cbf194e2ceb929ef621696013b2c8c6a112a69b3284484ea261c41c945f8b326fe501bc5cd65975c71db8f3055c3e15a7e7358acfb5440a0bc0fe51b6cbd8206b74adac83f65b14af8aea55ec53f41fc669b43908f72bf5b41cd15b42515fb2af9739e6e2540ff458f708154e898ec85ce9be3f0cc277d25d78c0a716f8c126526f1b68dbc5d6dd5cec07ebb9e8ba7b6b936e908bbf41db1280bd3958ea5897d9d64a8e866984a5b187b29b2ed758564197f131378773828c7d11d3e2b00d411b6c082fb7da649954767dfd73fc7f28db0fddc9ff6700c8517103a7cb3fb6d3412a37b0cdd7643d53a85804d68b7fb11408a01ca277dbdd0984a00235b4ea7edea085b33be4c45dd46e8310c54a197f996ce3a83f6e4d0b5c6e64579f8e41097a6b10a5d0e25333c29aa6677394aa6a112185e9b458218828049aa9a9ed3fedabaf36c40e3683e1e50896518d09be4ac0fd37910534e8a359", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 1970.995953][ T27] audit: type=1804 audit(1969.450:5): pid=3128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/54/file1" dev="vda" ino=644 res=1 errno=0 [ 1971.695589][ T27] audit: type=1804 audit(1970.150:6): pid=3128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/54/file1" dev="vda" ino=644 res=1 errno=0 [ 1971.896435][ T27] audit: type=1804 audit(1970.350:7): pid=3128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/54/file1" dev="vda" ino=644 res=1 errno=0 00:32:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="598c632b5672b5f5d684f7ae5f4cc171f4c31e58ff5fdda23bc21599e05567fb043bd18fdbbfadda6b70f47f37b9aead397f99c116d34552bff859d0ac1017ab669b2fdbbaebc9461bd70c8c4edab99f349307d4dce12d30979759cfbad346513c57ca2a9d7ef902f754f87334fa68a223cd26876e64dbd59fe072c2c2daf4bebab1718e5faaf1c0f98debb634e7daba53add045a1d81559e4bb17a5dba75fe7f49fb5ad6d6a7be1862c7285711cf66b99a5f8ff57c728801208c91bbd0e62cf89be985a128b55e0644bcd3a8c221e39d7178d29ce39f3aaae59b0b3aa3c3db82f9add9dfb992ec391532b450834de50f183c5810a972b9cf227c5d61435d75a3fd0736ac9b2b46b3295faaa08b0740958aa5f96963884d7552c7be4fd2e0dadc010ab536ab126b11d27eea4e516e32db0dd39c55a5c8a159523aa026c5c02f308d42b69bcf555f9e8a185bdd2286e0c4adfc708bd93dcb2c33c6aa1dcfeaece0b2d046254ed325595108c2c39f1f8883f68030730021077ccf7c5f4509237284910ad7f93824e99e01ce106e5bd729be153b4b6bc1fbfb1bece9c48ac49d157d800e3940b77e3f9c70baa42791d60181d925c1412e44696e833547076bae516f3602e5fc07b0be9785342ceee6d9486777f796d834c17d18b8ba8353b83dfc473fece90bba7f3749ee30f2c768b7bb1b82c893656c3b95e8dea4cd36a72257a9d8c96fc90aff24149d3eae8f051a6283b98ebe353f417bd67dd38705d959846a622e152a999d6dd8686c95a4c9edab92de9a9af041b1bd1c8c80a7fdbf274f5ed32959824152810594d79bc690739ed04d9248cc6240e1ecf54f7843bc591c899ad0b1e7b7388b336bbeac9ee9e6fa392298503c232906e18aaa96c82a0edfdc311f8dfc7dedc7ce7c177fcadfe3f70a8e3d1c353d8d40d9139ec8e17fc69d936102e6fa28666db89cb5aeb2365e906ebe0d4c07539a77b9120da6415c06f9d6fe7bdf9930ce63eeae1a7896bde5d08e41ae89cc49c50abc9ea1504a9e22b4f38e80dd917740d105f7642dc1c153d337144446f69d100d72fb588ead3d67370506edaf6a1d2a43f8a0070bef061debf20958beec3b82f054913eea8f7532030e7d3f2fe6fa8d47c083418c4927bcf6f5d334baf8b9d438437373a74968a560a530b87a54832deac24f40e13b4b9426578b2b3a03050b11a371f238ef1416278bd7743ed3e7b8f41b3cafeff35b0ceea73f844a256ff4adedfb19fe7f8fc4b2fb33d7cf0b5e8e3ae95074e8e8366ce9ddafcd6523b52f372a092c3e459b0f24845d34c8eb9a8d1bdae16f7beb78608b3b9fe18ec027f382a17f36d37e9d134f433ef4329aea78f3c8b1d4d14560d48af0672efedfca383b335afd6f71ba307a61991997b1f123530c7abf0fac11c7d0ca2ec9fcaf8d726ccdffbbfee26ee6d163355d850e64dcac8e3daf7020834ee9003ad83ecdae8688d73df70e678d578d21f4ef54c69cfa2a8588ce1dd158bd997af6041764b867a6008b1695347723f436e2bc406577e11e1684663b1ff113b0e37dc41de6801906c9771c77985da34e0f10faf434f2391fbee210814e0986a9d10a95b96e15638f61eeb3a5b95cdf6750c544aee3b2cddd165a80cec85d3b679195ded810bd1baac769f872a81f75bbbcf7095fa6764624cbf194e2ceb929ef621696013b2c8c6a112a69b3284484ea261c41c945f8b326fe501bc5cd65975c71db8f3055c3e15a7e7358acfb5440a0bc0fe51b6cbd8206b74adac83f65b14af8aea55ec53f41fc669b43908f72bf5b41cd15b42515fb2af9739e6e2540ff458f708154e898ec85ce9be3f0cc277d25d78c0a716f8c126526f1b68dbc5d6dd5cec07ebb9e8ba7b6b936e908bbf41db1280bd3958ea5897d9d64a8e866984a5b187b29b2ed758564197f131378773828c7d11d3e2b00d411b6c082fb7da649954767dfd73fc7f28db0fddc9ff6700c8517103a7cb3fb6d3412a37b0cdd7643d53a85804d68b7fb11408a01ca277dbdd0984a00235b4ea7edea085b33be4c45dd46e8310c54a197f996ce3a83f6e4d0b5c6e64579f8e41097a6b10a5d0e25333c29aa6677394aa6a112185e9b458218828049aa9a9ed3fedabaf36c40e3683e1e50896518d09be4ac0fd37910534e8a359", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 1974.949203][ T27] audit: type=1804 audit(1973.390:8): pid=3130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/55/file1" dev="vda" ino=645 res=1 errno=0 [ 1976.138111][ T27] audit: type=1804 audit(1974.600:9): pid=3131 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/55/file1" dev="vda" ino=645 res=1 errno=0 00:32:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 1976.607629][ T27] audit: type=1804 audit(1975.060:10): pid=3130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/55/file1" dev="vda" ino=645 res=1 errno=0 [ 1981.246907][ T27] audit: type=1804 audit(1979.700:11): pid=3133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/55/file1" dev="vda" ino=644 res=1 errno=0 [ 1982.099301][ T27] audit: type=1804 audit(1980.550:12): pid=3134 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/55/file1" dev="vda" ino=644 res=1 errno=0 [ 1982.359767][ T27] audit: type=1804 audit(1980.820:13): pid=3133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/55/file1" dev="vda" ino=644 res=1 errno=0 00:33:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 1986.908506][ T27] audit: type=1804 audit(1985.340:14): pid=3136 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/56/file1" dev="vda" ino=645 res=1 errno=0 00:33:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 1987.631588][ T27] audit: type=1804 audit(1986.090:15): pid=3137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/56/file1" dev="vda" ino=645 res=1 errno=0 [ 1988.109868][ T27] audit: type=1804 audit(1986.570:16): pid=3136 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/56/file1" dev="vda" ino=645 res=1 errno=0 [ 1991.469130][ T27] audit: type=1804 audit(1989.910:17): pid=3139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/56/file1" dev="vda" ino=644 res=1 errno=0 [ 1992.019725][ T27] audit: type=1804 audit(1990.480:18): pid=3139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/56/file1" dev="vda" ino=644 res=1 errno=0 [ 1992.151141][ T27] audit: type=1804 audit(1990.610:19): pid=3139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/56/file1" dev="vda" ino=644 res=1 errno=0 00:33:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 1996.732782][ T27] audit: type=1804 audit(1995.190:20): pid=3142 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/57/file1" dev="vda" ino=645 res=1 errno=0 [ 1998.200035][ T27] audit: type=1804 audit(1996.660:21): pid=3143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/57/file1" dev="vda" ino=645 res=1 errno=0 00:33:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 2005.661082][ T27] audit: type=1804 audit(2004.060:22): pid=3146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/57/file1" dev="vda" ino=637 res=1 errno=0 [ 2006.675113][ T27] audit: type=1804 audit(2005.130:23): pid=3146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/57/file1" dev="vda" ino=637 res=1 errno=0 [ 2006.851192][ T27] audit: type=1804 audit(2005.310:24): pid=3146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/57/file1" dev="vda" ino=637 res=1 errno=0 00:33:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 2009.654373][ T27] audit: type=1804 audit(2008.110:25): pid=3148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/58/file1" dev="vda" ino=645 res=1 errno=0 [ 2010.174682][ T27] audit: type=1804 audit(2008.630:26): pid=3148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/58/file1" dev="vda" ino=645 res=1 errno=0 [ 2010.311296][ T27] audit: type=1804 audit(2008.770:27): pid=3148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/58/file1" dev="vda" ino=645 res=1 errno=0 00:33:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) 00:33:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 2015.339586][ T27] audit: type=1804 audit(2013.800:28): pid=3150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/58/file1" dev="vda" ino=638 res=1 errno=0 [ 2015.757094][ T27] audit: type=1804 audit(2014.140:29): pid=3150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/58/file1" dev="vda" ino=638 res=1 errno=0 [ 2015.951724][ T27] audit: type=1804 audit(2014.410:30): pid=3150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/58/file1" dev="vda" ino=638 res=1 errno=0 [ 2017.834588][ T27] audit: type=1804 audit(2016.290:31): pid=3152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/59/file1" dev="vda" ino=645 res=1 errno=0 [ 2018.299876][ T27] audit: type=1804 audit(2016.730:32): pid=3152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/59/file1" dev="vda" ino=645 res=1 errno=0 [ 2018.676223][ T27] audit: type=1804 audit(2017.130:33): pid=3152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/59/file1" dev="vda" ino=645 res=1 errno=0 00:33:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 2023.030089][ T27] audit: type=1804 audit(2021.490:34): pid=3154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/59/file1" dev="vda" ino=641 res=1 errno=0 00:33:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r2, &(0x7f0000000080)="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", 0x600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffffffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000007, 0x13, r4, 0x0) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs$userns(0x0, &(0x7f0000000100)) ioctl$NS_GET_PARENT(r6, 0x5460, 0xec000) sendfile(r1, r0, 0x0, 0x7ffffffd) [ 2023.506638][ T27] audit: type=1804 audit(2021.950:35): pid=3154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/59/file1" dev="vda" ino=641 res=1 errno=0 [ 2023.692015][ T27] audit: type=1804 audit(2022.150:36): pid=3154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3102388395/syzkaller.l8Hmkz/59/file1" dev="vda" ino=641 res=1 errno=0 [ 2025.320671][ T27] audit: type=1804 audit(2023.780:37): pid=3156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/60/file1" dev="vda" ino=645 res=1 errno=0 [ 2026.172336][ T27] audit: type=1804 audit(2024.630:38): pid=3157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/60/file1" dev="vda" ino=645 res=1 errno=0 [ 2026.507707][ T27] audit: type=1804 audit(2024.970:39): pid=3156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3327621126/syzkaller.Ew1FIE/60/file1" dev="vda" ino=645 res=1 errno=0 00:33:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='cgroup\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 00:33:54 executing program 1: r0 = socket(0x1d, 0x2, 0x6) getsockname$packet(r0, 0x0, &(0x7f0000000180)) 00:33:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='cgroup\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 00:33:58 executing program 1: r0 = socket(0x1d, 0x2, 0x6) getsockname$packet(r0, 0x0, &(0x7f0000000180)) 00:33:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='cgroup\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 00:34:04 executing program 1: r0 = socket(0x1d, 0x2, 0x6) getsockname$packet(r0, 0x0, &(0x7f0000000180)) 00:34:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='cgroup\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 00:34:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) getsockname$packet(r0, 0x0, &(0x7f0000000180)) 00:34:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8863}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @gre}]}, 0x34}}, 0x0) 00:34:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x14, 0x4, 0x1, 0x801}, 0x14}}, 0x0) 00:34:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8863}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @gre}]}, 0x34}}, 0x0) 00:34:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x14, 0x4, 0x1, 0x801}, 0x14}}, 0x0) 00:34:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8863}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @gre}]}, 0x34}}, 0x0) 00:34:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x14, 0x4, 0x1, 0x801}, 0x14}}, 0x0) 00:34:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8863}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @gre}]}, 0x34}}, 0x0) 00:34:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x14, 0x4, 0x1, 0x801}, 0x14}}, 0x0) 00:34:45 executing program 0: migrate_pages(0x0, 0x100, &(0x7f0000000080)=0x4, &(0x7f0000000040)=0x1) 00:34:46 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x8008af26, &(0x7f0000000340)) 00:34:49 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x8008af26, &(0x7f0000000340)) 00:34:50 executing program 0: migrate_pages(0x0, 0x100, &(0x7f0000000080)=0x4, &(0x7f0000000040)=0x1) 00:34:53 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x8008af26, &(0x7f0000000340)) 00:34:54 executing program 0: migrate_pages(0x0, 0x100, &(0x7f0000000080)=0x4, &(0x7f0000000040)=0x1) 00:34:58 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x8008af26, &(0x7f0000000340)) 00:34:59 executing program 0: migrate_pages(0x0, 0x100, &(0x7f0000000080)=0x4, &(0x7f0000000040)=0x1) 00:35:04 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000cc0), 0x0, 0x0) readv(r0, &(0x7f0000000fc0)=[{&(0x7f0000000f80)=""/33, 0x21}], 0x1) 00:35:04 executing program 1: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000026c0)=[{0x0}, {&(0x7f00000013c0)=""/9, 0x9}, {&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/91, 0x5b}], 0x4) 00:35:07 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000cc0), 0x0, 0x0) readv(r0, &(0x7f0000000fc0)=[{&(0x7f0000000f80)=""/33, 0x21}], 0x1) 00:35:09 executing program 1: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000026c0)=[{0x0}, {&(0x7f00000013c0)=""/9, 0x9}, {&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/91, 0x5b}], 0x4) 00:35:11 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000cc0), 0x0, 0x0) readv(r0, &(0x7f0000000fc0)=[{&(0x7f0000000f80)=""/33, 0x21}], 0x1) 00:35:13 executing program 1: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000026c0)=[{0x0}, {&(0x7f00000013c0)=""/9, 0x9}, {&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/91, 0x5b}], 0x4) 00:35:15 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000cc0), 0x0, 0x0) readv(r0, &(0x7f0000000fc0)=[{&(0x7f0000000f80)=""/33, 0x21}], 0x1) 00:35:18 executing program 1: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000026c0)=[{0x0}, {&(0x7f00000013c0)=""/9, 0x9}, {&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/91, 0x5b}], 0x4) 00:35:20 executing program 0: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000026c0)=[{0x0}, {&(0x7f00000013c0)=""/9, 0x9}, {&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/91, 0x5b}], 0x4) 00:35:23 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:24 executing program 0: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000026c0)=[{0x0}, {&(0x7f00000013c0)=""/9, 0x9}, {&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/91, 0x5b}], 0x4) 00:35:29 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:30 executing program 0: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000026c0)=[{0x0}, {&(0x7f00000013c0)=""/9, 0x9}, {&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/91, 0x5b}], 0x4) 00:35:32 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:37 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:37 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:40 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:42 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:44 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:45 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:51 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = memfd_create(&(0x7f0000000080)='O\x93?\xa6\xff\x10\x05R\xe2\x05~\xb9\r\xdf\f]x\x8f\x1bW ^\xcc[\xd2\xd4\x96\x8e-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x3fffffe, 0x200}) 00:35:53 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)) 00:35:54 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = memfd_create(&(0x7f0000000080)='O\x93?\xa6\xff\x10\x05R\xe2\x05~\xb9\r\xdf\f]x\x8f\x1bW ^\xcc[\xd2\xd4\x96\x8e-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x3fffffe, 0x200}) 00:36:01 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = memfd_create(&(0x7f0000000080)='O\x93?\xa6\xff\x10\x05R\xe2\x05~\xb9\r\xdf\f]x\x8f\x1bW ^\xcc[\xd2\xd4\x96\x8e-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x3fffffe, 0x200}) 00:36:01 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = memfd_create(&(0x7f0000000080)='O\x93?\xa6\xff\x10\x05R\xe2\x05~\xb9\r\xdf\f]x\x8f\x1bW ^\xcc[\xd2\xd4\x96\x8e-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x3fffffe, 0x200}) 00:36:06 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = memfd_create(&(0x7f0000000080)='O\x93?\xa6\xff\x10\x05R\xe2\x05~\xb9\r\xdf\f]x\x8f\x1bW ^\xcc[\xd2\xd4\x96\x8e-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x3fffffe, 0x200}) 00:36:08 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = memfd_create(&(0x7f0000000080)='O\x93?\xa6\xff\x10\x05R\xe2\x05~\xb9\r\xdf\f]x\x8f\x1bW ^\xcc[\xd2\xd4\x96\x8e-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x3fffffe, 0x200}) 00:36:13 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = memfd_create(&(0x7f0000000080)='O\x93?\xa6\xff\x10\x05R\xe2\x05~\xb9\r\xdf\f]x\x8f\x1bW ^\xcc[\xd2\xd4\x96\x8e-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x3fffffe, 0x200}) 00:36:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x8) 00:36:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001380)='#', 0x1, 0xc094, 0x0, 0x0) shutdown(r0, 0x1) 00:36:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x8) 00:36:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x8) 00:36:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001380)='#', 0x1, 0xc094, 0x0, 0x0) shutdown(r0, 0x1) 00:36:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x8) 00:36:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001380)='#', 0x1, 0xc094, 0x0, 0x0) shutdown(r0, 0x1) 00:36:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001380)='#', 0x1, 0xc094, 0x0, 0x0) shutdown(r0, 0x1) 00:36:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001380)='#', 0x1, 0xc094, 0x0, 0x0) shutdown(r0, 0x1) 00:36:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001380)='#', 0x1, 0xc094, 0x0, 0x0) shutdown(r0, 0x1) 00:36:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001380)='#', 0x1, 0xc094, 0x0, 0x0) shutdown(r0, 0x1) 00:36:45 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_int(r1, 0x29, 0x2, 0x0, &(0x7f0000000100)=0xffffffffffffff2c) 00:36:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x4, 0x0, 0x9}, 0x48) 00:36:49 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_int(r1, 0x29, 0x2, 0x0, &(0x7f0000000100)=0xffffffffffffff2c) 00:36:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x4, 0x0, 0x9}, 0x48) 00:36:52 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_int(r1, 0x29, 0x2, 0x0, &(0x7f0000000100)=0xffffffffffffff2c) 00:36:55 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_int(r1, 0x29, 0x2, 0x0, &(0x7f0000000100)=0xffffffffffffff2c) 00:36:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x4, 0x0, 0x9}, 0x48) 00:36:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x4, 0x0, 0x9}, 0x48) 00:36:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000002e00)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) 00:37:01 executing program 0: ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/kcm\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x44, r2, 0x1, 0xffffffff, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r3}, {0x8}, {0x8}]}]}, 0x44}}, 0x0) ppoll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x8020}, {0xffffffffffffffff, 0x1402}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x9004}, {0xffffffffffffffff, 0x8}, {r4, 0x1020}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x1200}, {0xffffffffffffffff, 0x800}, {0xffffffffffffffff, 0x2030}], 0xa, &(0x7f0000000200)={0x77359400}, &(0x7f0000000480)={[0x5]}, 0x8) 00:37:02 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000002e00)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) [ 2226.091580][ T3314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2226.117935][ T3314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2226.119908][ T3314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2226.121545][ T3314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:37:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000002e00)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) 00:37:08 executing program 0: ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/kcm\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x44, r2, 0x1, 0xffffffff, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r3}, {0x8}, {0x8}]}]}, 0x44}}, 0x0) ppoll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x8020}, {0xffffffffffffffff, 0x1402}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x9004}, {0xffffffffffffffff, 0x8}, {r4, 0x1020}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x1200}, {0xffffffffffffffff, 0x800}, {0xffffffffffffffff, 0x2030}], 0xa, &(0x7f0000000200)={0x77359400}, &(0x7f0000000480)={[0x5]}, 0x8) 00:37:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000002e00)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) [ 2233.089559][ T3319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2233.136496][ T3319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2233.138405][ T3319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2233.140009][ T3319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2234.605277][ C1] hrtimer: interrupt took 2403500 ns 00:37:14 executing program 0: ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/kcm\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x44, r2, 0x1, 0xffffffff, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r3}, {0x8}, {0x8}]}]}, 0x44}}, 0x0) ppoll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x8020}, {0xffffffffffffffff, 0x1402}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x9004}, {0xffffffffffffffff, 0x8}, {r4, 0x1020}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x1200}, {0xffffffffffffffff, 0x800}, {0xffffffffffffffff, 0x2030}], 0xa, &(0x7f0000000200)={0x77359400}, &(0x7f0000000480)={[0x5]}, 0x8) 00:37:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000002e00)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) 00:37:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000002e00)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) [ 2240.499001][ T3325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2240.500318][ T3325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2240.501296][ T3325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2240.502320][ T3325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:37:22 executing program 0: ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/kcm\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x44, r2, 0x1, 0xffffffff, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r3}, {0x8}, {0x8}]}]}, 0x44}}, 0x0) ppoll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x8020}, {0xffffffffffffffff, 0x1402}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x9004}, {0xffffffffffffffff, 0x8}, {r4, 0x1020}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x1200}, {0xffffffffffffffff, 0x800}, {0xffffffffffffffff, 0x2030}], 0xa, &(0x7f0000000200)={0x77359400}, &(0x7f0000000480)={[0x5]}, 0x8) 00:37:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000002e00)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) [ 2246.527642][ T3330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2246.529609][ T3330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2246.531304][ T3330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2246.620890][ T3330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:37:26 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="c104a57c9fcd", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d1c59e", 0x8, 0x87, 0x0, @local, @local, {[@dstopts]}}}}}, 0x0) 00:37:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000ffffffdb0a00000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 00:37:31 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="c104a57c9fcd", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d1c59e", 0x8, 0x87, 0x0, @local, @local, {[@dstopts]}}}}}, 0x0) 00:37:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000ffffffdb0a00000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 00:37:33 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="c104a57c9fcd", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d1c59e", 0x8, 0x87, 0x0, @local, @local, {[@dstopts]}}}}}, 0x0) 00:37:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000ffffffdb0a00000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 00:37:36 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="c104a57c9fcd", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d1c59e", 0x8, 0x87, 0x0, @local, @local, {[@dstopts]}}}}}, 0x0) 00:37:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000ffffffdb0a00000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 00:37:42 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='//'], &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, 0x0) 00:37:44 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:37:45 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='//'], &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, 0x0) 00:37:47 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:37:49 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='//'], &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, 0x0) 00:37:51 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="34fbdbdf2502000000f5db81c25835078c21d342c2997157670cf919c2e802d951692ebb01000000000000130bcd8ae083efbd2ad790ee58ae6211eaa36a4eed75a59d41ebd3a0451495b44f3bd7a2b65d6cf4b42735ffd5b1b3b2d0ab2b2a9c7055ee813cf310f9d0006e98383c6b49bf93df63a80ba83f8468066b541e039f54feedebe7fd00000000000000000000000000000040ee9d6db095ba48c6ec044df73cf398109bc1b87b9eac12d5614ac658c7663243474a88d9c7c15803e046d12f7826bcb59abab1130dbf23f37f501411b01d11274975843874a7f02552776e64575e453911a5a9257552d91b964f82003c7afa64a98b472fadc610396895a6a750b860dca624d0e12e63e2ed6e400fe4b51b5113538724bd0f9f4be6ac43c7febe", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:37:53 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='//'], &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, 0x0) 00:37:55 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:37:59 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:01 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:05 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:09 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:13 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:19 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:23 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='//'], &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, 0x0) 00:38:27 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:29 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='//'], &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, 0x0) 00:38:30 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f00000002c0)="9e2227cc5d4fa4b6e839712daebc77180c612633cbd354bb02463acc348c3943f59f3e97e76aae7912e82c225fc45d05cd6442351badfd2691e4c5d4c3605758d4c6129541426247d9f1d4c40ed55002f995bf86f5c4866d01ac93601bd8d6e15b39daa3eaa3dfe50850ace9ea689cadfaed66ced9505b523a82140c5c26bad03fb5dc0cb50df59ca547f03ead4fda3cd01bae0f132ba88273bb710860a7a28d49b3a1a97f0094fcf31f7a83e7bcd5f77ef03df53fcebc722bbb72d9bedbf88424ec44bec8f4a4c147", 0xc9, 0xfffffffffffffffa, 0x0, 0x3}]) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmmsg$sock(r0, &(0x7f0000000040)=[{{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x3ff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0x80, 0x0}}], 0x1, 0x4000010) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=@can_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "c6e13f9047ef8827"}, 0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000106080001006401010108000800", @ANYRES32=0x0, @ANYBLOB="0600050004000000"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:38:35 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}]}) 00:38:35 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='//'], &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, 0x0) [ 2322.317115][ T3390] EXT4-fs (vda): re-mounted. Quota mode: none. 00:38:43 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}]}) 00:38:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) [ 2328.641466][ T3397] EXT4-fs (vda): re-mounted. Quota mode: none. 00:38:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 00:38:49 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}]}) 00:38:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) [ 2334.434645][ T3402] EXT4-fs (vda): re-mounted. Quota mode: none. 00:38:54 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800026, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}]}) 00:38:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) [ 2338.776154][ T3408] EXT4-fs (vda): re-mounted. Quota mode: none. 00:38:58 executing program 0: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) ppoll(&(0x7f0000001400)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) 00:39:00 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x1238, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x11a0, 0xffffffff, 0xffffffff, 0x11a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x10c8, 0x1110, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0x1, 0x0, 0x0, 0x0, './cgroup/syz1\x00'}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x1298) [ 2343.988292][ T3414] xt_cgroup: invalid path, errno=-2 00:39:04 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x1238, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x11a0, 0xffffffff, 0xffffffff, 0x11a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x10c8, 0x1110, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0x1, 0x0, 0x0, 0x0, './cgroup/syz1\x00'}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x1298) 00:39:05 executing program 0: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) ppoll(&(0x7f0000001400)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) [ 2348.130106][ T3417] xt_cgroup: invalid path, errno=-2 00:39:08 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x1238, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x11a0, 0xffffffff, 0xffffffff, 0x11a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x10c8, 0x1110, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0x1, 0x0, 0x0, 0x0, './cgroup/syz1\x00'}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x1298) [ 2353.111271][ T3422] xt_cgroup: invalid path, errno=-2 00:39:12 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x1238, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x11a0, 0xffffffff, 0xffffffff, 0x11a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x10c8, 0x1110, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0x1, 0x0, 0x0, 0x0, './cgroup/syz1\x00'}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x1298) 00:39:13 executing program 0: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) ppoll(&(0x7f0000001400)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) [ 2356.225297][ T3425] xt_cgroup: invalid path, errno=-2 00:39:18 executing program 1: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) ppoll(&(0x7f0000001400)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) 00:39:19 executing program 0: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) ppoll(&(0x7f0000001400)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) 00:39:23 executing program 1: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) ppoll(&(0x7f0000001400)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) 00:39:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 00:39:28 executing program 1: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) ppoll(&(0x7f0000001400)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r1, 0x5460, 0xec000) 00:39:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 00:39:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 00:39:35 executing program 1: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 00:39:38 executing program 1: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:41 executing program 0: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:42 executing program 1: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:44 executing program 0: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:46 executing program 1: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:48 executing program 0: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:50 executing program 1: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:52 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000016c0)={{0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 00:39:54 executing program 1: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:56 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000016c0)={{0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 00:39:57 executing program 1: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 00:39:58 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000016c0)={{0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 00:40:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000cac700000000fa3200004d0000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 00:40:01 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000016c0)={{0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 00:40:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000cac700000000fa3200004d0000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 00:40:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000cac700000000fa3200004d0000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 00:40:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000cac700000000fa3200004d0000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 00:40:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000cac700000000fa3200004d0000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 00:40:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000cac700000000fa3200004d0000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 00:40:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000cac700000000fa3200004d0000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x48) 00:40:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0xe0902) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:40:31 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001c80), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x8) 00:40:32 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0xe0902) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:40:34 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001c80), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x8) 00:40:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0xe0902) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:40:37 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001c80), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x8) 00:40:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0xe0902) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:40:40 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001c80), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x8) 00:40:42 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0xe0902) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:40:44 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000054c0)={'vlan1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1, 0x4, 0x9, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 00:40:45 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0xe0902) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:40:47 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000054c0)={'vlan1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1, 0x4, 0x9, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 00:40:48 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0xe0902) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:40:50 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000054c0)={'vlan1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1, 0x4, 0x9, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 00:40:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:40:54 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000054c0)={'vlan1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1, 0x4, 0x9, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 00:40:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:40:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xe, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/225, 0x32, 0xe1, 0x1}, 0x20) 00:41:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xe, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/225, 0x32, 0xe1, 0x1}, 0x20) 00:41:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xe, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/225, 0x32, 0xe1, 0x1}, 0x20) 00:41:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file3\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1/file4\x00', &(0x7f00000001c0), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) landlock_restrict_self(r0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000400)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000600)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file1/file4/file7/file6\x00', 0x2) 00:41:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xe, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/225, 0x32, 0xe1, 0x1}, 0x20) 00:42:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x0, 0xec07}, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 00:42:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0x127c, &(0x7f0000000080)) 00:42:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x0, 0xec07}, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 00:42:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0x127c, &(0x7f0000000080)) 00:42:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0x127c, &(0x7f0000000080)) 00:42:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x0, 0xec07}, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 00:42:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x0, 0xec07}, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 00:42:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0x127c, &(0x7f0000000080)) 00:42:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000440)={'ip6_vti0\x00', 0x0}) 00:42:30 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0}, 0x68) 00:42:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000440)={'ip6_vti0\x00', 0x0}) 00:42:36 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0}, 0x68) 00:42:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000440)={'ip6_vti0\x00', 0x0}) 00:42:41 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0}, 0x68) 00:42:45 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0}, 0x68) 00:42:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000440)={'ip6_vti0\x00', 0x0}) 00:42:49 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 00:42:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:42:52 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 00:42:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:42:56 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 00:42:58 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 00:43:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) close(r1) 00:43:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/84, 0x54}], 0x1, 0x0, 0x0) 00:43:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/84, 0x54}], 0x1, 0x0, 0x0) 00:43:34 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000008c0)=""/247, 0xf7}], 0x1) 00:43:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/84, 0x54}], 0x1, 0x0, 0x0) 00:43:36 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000008c0)=""/247, 0xf7}], 0x1) 00:43:38 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/84, 0x54}], 0x1, 0x0, 0x0) 00:43:40 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000008c0)=""/247, 0xf7}], 0x1) 00:43:43 executing program 0: setuid(0xee00) unshare(0x8000000) 00:43:44 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000008c0)=""/247, 0xf7}], 0x1) 00:43:46 executing program 0: setuid(0xee00) unshare(0x8000000) 00:43:48 executing program 1: setuid(0xee00) unshare(0x8000000) 00:43:50 executing program 0: setuid(0xee00) unshare(0x8000000) 00:43:51 executing program 1: setuid(0xee00) unshare(0x8000000) 00:43:53 executing program 0: setuid(0xee00) unshare(0x8000000) 00:43:54 executing program 1: setuid(0xee00) unshare(0x8000000) 00:43:57 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@multicast, @local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @broadcast, @local}, @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}, 0x0) 00:43:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 00:44:01 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@multicast, @local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @broadcast, @local}, @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}, 0x0) 00:44:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 00:44:05 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@multicast, @local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @broadcast, @local}, @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}, 0x0) 00:44:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 00:44:10 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@multicast, @local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @broadcast, @local}, @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}, 0x0) 00:44:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 00:44:17 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 00:44:19 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f0000001480), 0x0) 00:44:22 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 00:44:25 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f0000001480), 0x0) 00:44:29 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 00:44:30 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f0000001480), 0x0) 00:44:33 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 00:44:34 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f0000001480), 0x0) 00:44:37 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x6) io_uring_enter(r0, 0x547c, 0x0, 0x0, 0x0, 0x0) 00:44:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:44:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:44:41 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x6) io_uring_enter(r0, 0x547c, 0x0, 0x0, 0x0, 0x0) 00:44:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:44:44 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x6) io_uring_enter(r0, 0x547c, 0x0, 0x0, 0x0, 0x0) 00:44:46 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x6) io_uring_enter(r0, 0x547c, 0x0, 0x0, 0x0, 0x0) 00:44:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:44:51 executing program 1: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x6) io_uring_enter(r0, 0x547c, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') read$FUSE(r0, 0x0, 0x0) 00:44:53 executing program 1: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x6) io_uring_enter(r0, 0x547c, 0x0, 0x0, 0x0, 0x0) 00:44:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') read$FUSE(r0, 0x0, 0x0) 00:44:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') read$FUSE(r0, 0x0, 0x0) 00:44:57 executing program 1: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x6) io_uring_enter(r0, 0x547c, 0x0, 0x0, 0x0, 0x0) 00:44:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') read$FUSE(r0, 0x0, 0x0) 00:45:03 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') 00:45:04 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x1, 0x0, 0xee00, 0xee00, 0xee00}}) 00:45:06 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x1, 0x0, 0xee00, 0xee00, 0xee00}}) 00:45:06 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') 00:45:09 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x1, 0x0, 0xee00, 0xee00, 0xee00}}) 00:45:11 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') 00:45:12 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x1, 0x0, 0xee00, 0xee00, 0xee00}}) 00:45:14 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') 00:45:17 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') 00:45:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}}, &(0x7f0000000180)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 00:45:23 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') 00:45:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}}, &(0x7f0000000180)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 00:45:26 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') 00:45:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}}, &(0x7f0000000180)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 00:45:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}}, &(0x7f0000000180)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 00:45:32 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 00:45:35 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 00:45:36 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc1105518, 0x0) 00:45:39 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 00:45:39 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc1105518, 0x0) 00:45:42 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc1105518, 0x0) 00:45:42 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 00:45:46 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc1105518, 0x0) 00:45:46 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc1105518, 0x0) 00:45:48 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc1105518, 0x0) 00:45:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xdf5690546dd19f79, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00e}}, 0x1c}}, 0x0) 00:45:52 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc1105518, 0x0) 00:45:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xdf5690546dd19f79, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00e}}, 0x1c}}, 0x0) 00:45:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xdf5690546dd19f79, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00e}}, 0x1c}}, 0x0) 00:45:57 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400)="ff", 0x1, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2080}, {&(0x7f0000011800)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000002004000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000005142ad1000000000000000000000000000000000000000000000000ed8100001a040000dbf4655fdbf4655fdbf4655f00000000000001004000000000000800010000000af301000400000000000000000000000100000060000000000000000000000000000000000000000000000000000000000000000000000000000000a7ea2103000000000000000000000000000000000000000000000000ffa1000026000000dbf4655fdbf4655fdbf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3638353036393038362f66696c65302f66696c653000000000000000000000000000000000000000000000e28cd836000000000000000000000000000000000000000000000000ed8100000a000000dbf4655fdbf4655fdbf4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000070", 0x1bd, 0x2580}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x8000}, {&(0x7f0000000140)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) [ 2759.970286][ T3796] loop0: detected capacity change from 0 to 2048 [ 2761.887503][ T3796] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 00:46:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getstats={0x1c, 0x5e, 0xdf5690546dd19f79, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00e}}, 0x1c}}, 0x0) 00:46:02 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400)="ff", 0x1, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2080}, {&(0x7f0000011800)="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", 0x1bd, 0x2580}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x8000}, {&(0x7f0000000140)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) 00:46:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040)=0x3, 0x65) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) [ 2768.512056][ T3810] loop0: detected capacity change from 0 to 2048 [ 2769.616475][ T3810] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 00:46:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040)=0x3, 0x65) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) 00:46:10 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400)="ff", 0x1, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2080}, {&(0x7f0000011800)="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", 0x1bd, 0x2580}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x8000}, {&(0x7f0000000140)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) 00:46:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040)=0x3, 0x65) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) [ 2778.009875][ T3824] loop0: detected capacity change from 0 to 2048 [ 2780.660621][ T3824] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 00:46:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040)=0x3, 0x65) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) 00:46:22 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000010400)="ff", 0x1, 0x1000}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2080}, {&(0x7f0000011800)="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", 0x1bd, 0x2580}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x8000}, {&(0x7f0000000140)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) [ 2790.250052][ T3838] loop0: detected capacity change from 0 to 2048 00:46:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040)=0x3, 0x65) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) [ 2793.302108][ T3838] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 00:46:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040)=0x3, 0x65) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) 00:46:40 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0x80045017, 0x0) 00:46:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040)=0x3, 0x65) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) 00:46:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:46:47 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0x80045017, 0x0) 00:46:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:46:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:46:55 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0x80045017, 0x0) 00:46:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:47:04 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0x80045017, 0x0) 00:47:05 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0x80045017, 0x0) 00:47:14 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0x80045017, 0x0) 00:47:18 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f00000006c0)={0x2, 0x0, @multicast2}, 0x10) 00:47:22 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f00000006c0)={0x2, 0x0, @multicast2}, 0x10) 00:47:23 executing program 1: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0x80045017, 0x0) 00:47:25 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f00000006c0)={0x2, 0x0, @multicast2}, 0x10) 00:47:29 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f00000006c0)={0x2, 0x0, @multicast2}, 0x10) 00:47:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000300)={0x3, 'vlan0\x00', {}, 0xdc}) 00:47:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r2}, 0x10) 00:47:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000300)={0x3, 'vlan0\x00', {}, 0xdc}) 00:47:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r2}, 0x10) 00:47:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000300)={0x3, 'vlan0\x00', {}, 0xdc}) 00:47:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r2}, 0x10) 00:47:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000300)={0x3, 'vlan0\x00', {}, 0xdc}) 00:47:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r2}, 0x10) 00:47:47 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 00:47:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x1, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) 00:47:50 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 00:47:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x1, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) 00:47:53 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 00:47:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x1, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) 00:47:56 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 00:47:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x1, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) 00:47:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x1, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) 00:48:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = gettid() r1 = gettid() kcmp(r0, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 00:48:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x1, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) 00:48:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = gettid() r1 = gettid() kcmp(r0, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 00:48:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x1, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) 00:48:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = gettid() r1 = gettid() kcmp(r0, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 00:48:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) 00:48:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = gettid() r1 = gettid() kcmp(r0, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) [ 2895.934890][ T3929] ================================================================== [ 2895.940588][ T3929] BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x212/0x2034 [ 2895.943268][ T3929] Read of size 4 at addr ffffaf800f7f7ffe by task syz-executor.1/3929 [ 2895.944931][ T3929] [ 2895.946220][ T3929] CPU: 1 PID: 3929 Comm: syz-executor.1 Not tainted 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 2895.949702][ T3929] Hardware name: riscv-virtio,qemu (DT) [ 2895.951236][ T3929] Call Trace: [ 2895.952380][ T3929] [] dump_backtrace+0x2e/0x3c [ 2895.954769][ T3929] [] show_stack+0x34/0x40 [ 2895.956279][ T3929] [] dump_stack_lvl+0xe4/0x150 [ 2895.958735][ T3929] [] print_address_description.constprop.0+0x2a/0x330 [ 2895.960634][ T3929] [] kasan_report+0x184/0x1e0 [ 2895.962203][ T3929] [] __asan_load4+0x6e/0x96 [ 2895.964649][ T3929] [] ext4_xattr_set_entry+0x212/0x2034 [ 2895.967232][ T3929] [] ext4_xattr_ibody_set+0x5c/0x158 [ 2895.968758][ T3929] [] ext4_xattr_set_handle+0x65e/0xea0 [ 2895.970267][ T3929] [] ext4_xattr_set+0x12e/0x2b4 [ 2895.971826][ T3929] [] ext4_xattr_trusted_set+0x34/0x46 [ 2895.973649][ T3929] [] __vfs_setxattr+0x106/0x172 [ 2895.975149][ T3929] [] __vfs_setxattr_noperm+0xca/0x378 [ 2895.976566][ T3929] [] __vfs_setxattr_locked+0x16a/0x186 [ 2895.978130][ T3929] [] vfs_setxattr+0x136/0x296 [ 2895.979568][ T3929] [] setxattr+0x212/0x29a [ 2895.980941][ T3929] [] path_setxattr+0x1a2/0x1bc [ 2895.982355][ T3929] [] sys_lsetxattr+0x36/0x48 [ 2895.984858][ T3929] [] ret_from_syscall+0x0/0x2 [ 2895.987409][ T3929] [ 2895.988358][ T3929] The buggy address belongs to the page: [ 2895.990128][ T3929] page:ffffaf807aaa4d78 refcount:2 mapcount:0 mapping:ffffaf800ababf10 index:0xb8 pfn:0x8f9f7 [ 2895.992018][ T3929] memcg:ffffaf80073e0000 [ 2895.993939][ T3929] aops:def_blk_aops ino:fd00000 [ 2895.995601][ T3929] flags: 0x880000203a(referenced|dirty|lru|active|private|section=17|node=0|zone=0) [ 2895.999096][ T3929] raw: 000000880000203a ffffaf807aaa4d38 ffffaf807aaa4708 ffffaf800ababf10 [ 2896.001453][ T3929] raw: 00000000000000b8 ffffaf8007752d98 00000002ffffffff ffffaf80073e0000 [ 2896.002938][ T3929] raw: 00000000000007ff [ 2896.004454][ T3929] page dumped because: kasan: bad access detected [ 2896.006012][ T3929] page_owner tracks the page as allocated [ 2896.007060][ T3929] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x148c40(GFP_NOFS|__GFP_NOFAIL|__GFP_COMP|__GFP_HARDWALL), pid 1, ts 535544763000, free_ts 0 [ 2896.010328][ T3929] __set_page_owner+0x48/0x136 [ 2896.011841][ T3929] post_alloc_hook+0xd0/0x10a [ 2896.013346][ T3929] get_page_from_freelist+0x8da/0x12d8 [ 2896.015161][ T3929] __alloc_pages+0x150/0x3b6 [ 2896.016368][ T3929] alloc_pages+0x132/0x2a6 [ 2896.017958][ T3929] folio_alloc+0x24/0x30 [ 2896.019160][ T3929] __filemap_get_folio+0x63c/0xd58 [ 2896.020423][ T3929] pagecache_get_page+0x2e/0x230 [ 2896.021650][ T3929] __getblk_slow+0x1f2/0x738 [ 2896.022811][ T3929] __getblk_gfp+0x74/0x78 [ 2896.024322][ T3929] ext4_sb_breadahead_unmovable+0x46/0xa8 [ 2896.025719][ T3929] __ext4_get_inode_loc+0x9d6/0xc08 [ 2896.026948][ T3929] __ext4_get_inode_loc_noinmem+0xb2/0x138 [ 2896.028646][ T3929] __ext4_iget+0x348/0x20f8 [ 2896.029782][ T3929] ext4_lookup+0x28a/0x4ea [ 2896.030964][ T3929] lookup_open.isra.0+0x6a6/0xd4a [ 2896.032593][ T3929] page_owner free stack trace missing [ 2896.034197][ T3929] [ 2896.035144][ T3929] Memory state around the buggy address: [ 2896.036647][ T3929] ffffaf800f7f7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2896.037991][ T3929] ffffaf800f7f7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2896.039494][ T3929] >ffffaf800f7f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2896.040870][ T3929] ^ [ 2896.042434][ T3929] ffffaf800f7f8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 2896.044581][ T3929] ffffaf800f7f8100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 2896.046749][ T3929] ================================================================== [ 2896.048034][ T3929] Disabling lock debugging due to kernel taint [ 2896.615254][ T3929] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #640: comm syz-executor.1: corrupted xattr entries [ 2896.680781][ T3931] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #640: comm syz-executor.1: corrupted xattr entries 00:48:16 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x200081, 0x86}, 0x20) 00:48:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) [ 2899.291922][ T3936] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.1: corrupted xattr entries [ 2899.367017][ T3936] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.1: corrupted xattr entries 00:48:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) 00:48:18 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x200081, 0x86}, 0x20) [ 2901.435306][ T3940] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.1: corrupted xattr entries [ 2901.486417][ T3940] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.1: corrupted xattr entries 00:48:20 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x200081, 0x86}, 0x20) 00:48:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) [ 2903.030846][ T3944] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.1: corrupted xattr entries [ 2903.066844][ T3944] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.1: corrupted xattr entries 00:48:21 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x200081, 0x86}, 0x20) 00:48:22 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x200081, 0x86}, 0x20) 00:48:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) 00:48:23 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x200081, 0x86}, 0x20) [ 2905.146486][ T3951] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.0: corrupted xattr entries [ 2905.171325][ T3951] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.0: corrupted xattr entries 00:48:24 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x200081, 0x86}, 0x20) 00:48:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) [ 2906.330687][ T3956] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.0: corrupted xattr entries [ 2906.368844][ T3956] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.0: corrupted xattr entries 00:48:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) 00:48:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) [ 2907.865676][ T3959] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #641: comm syz-executor.1: corrupted xattr entries [ 2907.895658][ T3959] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #641: comm syz-executor.1: corrupted xattr entries [ 2907.945796][ T3960] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #645: comm syz-executor.0: corrupted xattr entries [ 2907.967607][ T3960] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #645: comm syz-executor.0: corrupted xattr entries 00:48:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) 00:48:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) [ 2909.414138][ T3963] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.0: corrupted xattr entries [ 2909.430485][ T3963] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.0: corrupted xattr entries [ 2909.601883][ T3964] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #645: comm syz-executor.1: corrupted xattr entries [ 2909.671933][ T3964] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #645: comm syz-executor.1: corrupted xattr entries 00:48:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) 00:48:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) [ 2910.716194][ T3967] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #640: comm syz-executor.0: corrupted xattr entries [ 2910.751452][ T3967] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #640: comm syz-executor.0: corrupted xattr entries [ 2910.900120][ T3968] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #645: comm syz-executor.1: corrupted xattr entries [ 2910.920899][ T3968] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #645: comm syz-executor.1: corrupted xattr entries 00:48:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0), 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00', 0x0, 0x0) 00:48:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @local}], 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="90", 0x1}], 0x1, &(0x7f00000003c0)=[@init={0x18, 0x84, 0x0, {0x7fff}}], 0x18}], 0x1, 0x0) [ 2912.268784][ T3972] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.0: corrupted xattr entries [ 2912.307412][ T3972] EXT4-fs error (device vda): ext4_xattr_set_entry:1596: inode #644: comm syz-executor.0: corrupted xattr entries 00:48:32 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_emit_ethernet(0x1a1, &(0x7f0000000240)=ANY=[@ANYBLOB="a5d65cc0ec22aaaaaaaaaabb86dd674c7425016b06"], 0x0) 00:48:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @local}], 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="90", 0x1}], 0x1, &(0x7f00000003c0)=[@init={0x18, 0x84, 0x0, {0x7fff}}], 0x18}], 0x1, 0x0) 00:48:33 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_emit_ethernet(0x1a1, &(0x7f0000000240)=ANY=[@ANYBLOB="a5d65cc0ec22aaaaaaaaaabb86dd674c7425016b06"], 0x0) 00:48:34 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_emit_ethernet(0x1a1, &(0x7f0000000240)=ANY=[@ANYBLOB="a5d65cc0ec22aaaaaaaaaabb86dd674c7425016b06"], 0x0) 00:48:35 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_emit_ethernet(0x1a1, &(0x7f0000000240)=ANY=[@ANYBLOB="a5d65cc0ec22aaaaaaaaaabb86dd674c7425016b06"], 0x0) 00:48:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @local}], 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="90", 0x1}], 0x1, &(0x7f00000003c0)=[@init={0x18, 0x84, 0x0, {0x7fff}}], 0x18}], 0x1, 0x0) 00:48:37 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_emit_ethernet(0x1a1, &(0x7f0000000240)=ANY=[@ANYBLOB="a5d65cc0ec22aaaaaaaaaabb86dd674c7425016b06"], 0x0) 00:48:38 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_emit_ethernet(0x1a1, &(0x7f0000000240)=ANY=[@ANYBLOB="a5d65cc0ec22aaaaaaaaaabb86dd674c7425016b06"], 0x0) 00:48:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @local}], 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="90", 0x1}], 0x1, &(0x7f00000003c0)=[@init={0x18, 0x84, 0x0, {0x7fff}}], 0x18}], 0x1, 0x0) 00:48:39 executing program 0: r0 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_emit_ethernet(0x1a1, &(0x7f0000000240)=ANY=[@ANYBLOB="a5d65cc0ec22aaaaaaaaaabb86dd674c7425016b06"], 0x0) 00:48:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @local}], 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="90", 0x1}], 0x1, &(0x7f00000003c0)=[@init={0x18, 0x84, 0x0, {0x7fff}}], 0x18}], 0x1, 0x0) 00:48:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @local}], 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="90", 0x1}], 0x1, &(0x7f00000003c0)=[@init={0x18, 0x84, 0x0, {0x7fff}}], 0x18}], 0x1, 0x0) 00:48:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @local}], 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000040)="90", 0x1}], 0x1, &(0x7f00000003c0)=[@init={0x18, 0x84, 0x0, {0x7fff}}], 0x18}], 0x1, 0x0) VM DIAGNOSIS: 17:18:13 Registers: info registers vcpu 0 pc 0000000000082950 mhartid 0000000000000000 mstatus 00000000000040a2 mip 0000000000000000 mie 00000000000002aa mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff800055d4 mepc ffffffff8000f97e sepc 00000000000829c4 mcause 0000000000000009 scause 0000000000000008 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra 000000000005c35c x2/sp 000000c00003bf38 x3/gp 0000000000002710 x4/tp 00007fffb73ac6c8 x5/t0 000000000000005b x6/t1 0000000000000000 x7/t2 0000000000000032 x8/s0 0000000000000001 x9/s1 0000000000004e20 x10/a0 000000c00003bf40 x11/a1 0000000000000000 x12/a2 0000000000000000 x13/a3 0000000000989680 x14/a4 0000000000000000 x15/a5 0000000000000000 x16/a6 0000000000000006 x17/a7 0000000000000065 x18/s2 000000000049bffa x19/s3 0000000000003000 x20/s4 000000c00003be20 x21/s5 0000000000000000 x22/s6 0000000000000000 x23/s7 0000000000000000 x24/s8 0000000000000038 x25/s9 00000000000000f6 x26/s10 0000000000000000 x27/s11 000000c0000004e0 x28/t3 ffffffffffffffff x29/t4 000000c000091520 x30/t5 000000c000091519 x31/t6 0000000000082354 f0/ft0 0000000000000000 f1/ft1 4076029afb99d949 f2/ft2 4132d4f800000000 f3/ft3 43e0000000000000 f4/ft4 3ffe000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000 info registers vcpu 1 pc ffffffff80dc15ca mhartid 0000000000000001 mstatus 00000000000000a0 mip 00000000000000a0 mie 000000000000022a mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff800055d4 mepc ffffffff804757b8 sepc 0000000000031aa0 mcause 8000000000000007 scause 8000000000000005 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff80dc15ca x2/sp ffffaf8024112bb0 x3/gp ffffffff85863ac0 x4/tp ffffaf800ed40000 x5/t0 ffffffff86bcb657 x6/t1 74e44603b8ca8000 x7/t2 0000000000000000 x8/s0 ffffaf8024112bd0 x9/s1 ffffffff86e58900 x10/a0 ffff8f800066c005 x11/a1 0000000000000007 x12/a2 1ffffffff0dcb129 x13/a3 ffffffff80dc15ca x14/a4 0000000000000000 x15/a5 ffffffff86e58948 x16/a6 ffffffff86e589f1 x17/a7 ffffffff80dcc9fe x18/s2 0000000000000005 x19/s3 0000000000002710 x20/s4 0000000000000020 x21/s5 ffffffff86e58b98 x22/s6 ffffffff86e58950 x23/s7 ffffffff86bcb6b5 x24/s8 0000000000000010 x25/s9 ffffffff86e58958 x26/s10 0000000000000010 x27/s11 0000000000000000 x28/t3 fffffffff3f3f300 x29/t4 ffffffff80112282 x30/t5 1ffff5f00482252c x31/t6 ffffffff86bcb657 f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000