last executing test programs: 14m17.30563623s ago: executing program 32 (id=779): syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000280)='./bus\x00', 0x1200840, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x3, 0x37c, &(0x7f0000000ec0)="$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") ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0/../file0\x00'}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) 14m11.926405107s ago: executing program 33 (id=951): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) syz_emit_ethernet(0x66, &(0x7f0000000b80)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x14, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}, 0x0) 14m9.162640203s ago: executing program 34 (id=1036): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) pwritev2(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) 13m48.5945364s ago: executing program 35 (id=1604): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socket$kcm(0x10, 0x2, 0x4) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000000100000003b400001802000000000400", @ANYRES32=r0, @ANYBLOB="05000000000000000000af9f0000000000000000", @ANYRES32=0x0, @ANYRES32=r0], 0x50) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port1\x00', 0x62, 0x104fe, 0x0, 0x8000008, 0x3, 0x0, 0x3, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x40505330, &(0x7f0000000040)={0x800080, 0x859, 0x7, 0xb, 0x7, 0x4}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/clients\x00', 0x0, 0x0) readv(r2, &(0x7f00000038c0)=[{&(0x7f0000004980)=""/4096, 0x1000}], 0x1) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r3, 0x6, 0x19, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7fe, @empty, 0x1}, {0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x2}, r5, 0xb}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000f80)={0x1, 0xe, 0xfa00, {&(0x7f0000000300), r5}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000680)={0x9, 0x108, 0xfa00, {r5, 0xc6, "f1688a", "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"}}, 0x110) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8a020000f8ffffffb703000008000000b7040000000000008500000024000000950000000400"/65], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x18) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_GET_INTERFACE(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140000027a6b492dbe68be0c75d1919c06abae6c158671d838f4bd3f655335e7b6171d5edba5b95bfa06d8cf3668860945bf948508cd1dea58dac95137ac64036ea3e6fa65e3b20af909618eecae2bad6284eeaf3d1113821d2313dc1e6fc8d3f525fd6da2421bdb7ed325c9", @ANYRES16=r7, @ANYBLOB="000227bd7000fbdbdf2505000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000091}, 0x8080) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000180)=0x7, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r8}, 0x18) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000200000000000000000000008500000041000000850000001100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) 13m48.218325756s ago: executing program 36 (id=1616): syz_read_part_table(0x5ea, &(0x7f0000001140)="$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") prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[], 0x15) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRES8, @ANYRES32, @ANYRESHEX=r2, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="04d0db45000200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x110004, 0x10000, 0xfffffffe, 0x0, 0x80, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r6, 0xffffffffffffffff}, &(0x7f0000000400)=0xa1, &(0x7f00000004c0)=r7}, 0x20) close(r8) r9 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x4810, &(0x7f0000000380)={[{@journal_dev={'journal_dev', 0x3d, 0x8}}, {@grpquota}, {@nomblk_io_submit}, {@data_err_ignore}, {@errors_remount}, {@nojournal_checksum}, {@noauto_da_alloc}]}, 0x0, 0x4ec, &(0x7f0000000c40)="$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") dup(r3) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f00000007c0)=ANY=[@ANYBLOB="0000000000000000b7080000d2ad51719440f5000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500", @ANYRES32=r8, @ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000a96c572e7e2aa0713b130d45644f20799bcf234a7bca0706fdd9de478c6bd72b90828f5b2cac251953c8e53dbe47de6185ea373346", @ANYRES16=r9, @ANYBLOB="80951cbee70e178fc834c52a92e3475d985c8f6b517648db7c8e3eda0258398929039d5a9359612a610a6f6d61ec709b7121863a7de0cb4a7bab73c2b3375f4a241fcf5d7909e830ce370007bea509fef0d9cb97dba82e3f84393e726220f168d55c0f6238aa3e03abf521cc4ff4b140912a1c2466263efec6ef49c1770df0bb0a710667e481d6c0a3479c63606f17967330579dc553c5a27da4eb0581788cd05caff5b82f22a0db7338993c87d6ea02c6659035f903b6c98d7d80484a0fd4", @ANYRESOCT], &(0x7f00000000c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9936}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r11, 0x0, 0xf7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xfffffffffbfffff5]}, 0x8, 0x0) dup(r10) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r12, 0x6, 0xd, &(0x7f0000000040)='dctcp', 0x5) bind$inet6(r12, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) 13m33.048055405s ago: executing program 37 (id=2088): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x8000588) 9m1.953514118s ago: executing program 38 (id=4390): r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000101"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000700008018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x60100100, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r6 = getpgrp(0x0) r7 = syz_pidfd_open(r6, 0x0) setns(r7, 0x34020000) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x1, &(0x7f0000000040)={[{@delalloc}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7bf}}]}, 0x1, 0x56e, &(0x7f0000000640)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m29.814924886s ago: executing program 39 (id=6988): r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x228, 0xb8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x190, 0xffffffff, 0xffffffff, 0x190, 0xffffffff, 0x3, &(0x7f0000000280), {[{{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@common=@ttl={{0x28}, {0x0, 0xf}}]}, @unspec=@TRACE={0x20}}, {{@ip={@rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x38}, 0xffffff00, 0xffffffff, 'xfrm0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x88, 0x2, 0x20}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0xff95, 0x7f000000, 0xcfaf, 'syz0\x00', 'syz0\x00', {0x2}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) (fail_nth: 1) 1m22.48742737s ago: executing program 40 (id=7109): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[], 0x50) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port1\x00', 0x62, 0x104fe, 0x0, 0x8000008, 0x3, 0x0, 0x3, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x40505330, &(0x7f0000000040)={0x800080, 0x859, 0x7, 0xb, 0x7, 0x4}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/clients\x00', 0x0, 0x0) readv(r2, &(0x7f00000038c0)=[{&(0x7f0000004980)=""/4096, 0x1000}], 0x1) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r3, 0x6, 0x19, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7fe, @empty, 0x1}, {0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x2}, r4, 0xb}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x1, 0xe, 0xfa00, {&(0x7f0000000300), r4}}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8a020000f8ffffffb703000008000000b7040000000000008500000024000000950000000400"/65], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) 37.563167179s ago: executing program 41 (id=8621): r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r1 = dup(r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f00000008c0)={0xa0, 0x0, 0xf20, 0x4, 0x0, 0xb, 0x0}) (fail_nth: 4) 36.074839512s ago: executing program 42 (id=8667): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x42, 0x4, 0x318, 0xffffffff, 0xf8, 0x0, 0x1c8, 0xffffffff, 0xffffffff, 0x2b0, 0x2b0, 0x2b0, 0xffffffff, 0x5, 0x0, {[{{@ip={@empty, @rand_addr=0x64010100, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00'}, 0x3127, 0xa0, 0xc8, 0x1ba, {0x46010000}, [@common=@unspec=@connmark={{0x30}, {0x7, 0x16a}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ip={@multicast2, @broadcast, 0xffffffff, 0xff000000, 'vlan1\x00', 'macvlan1\x00', {}, {0xff}, 0x16, 0x0, 0x8}, 0x287, 0x70, 0xd0, 0x0, {0x0, 0x4}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x1, 0x0, 0x0, 0x0, 0x1], 0x4, 0x1}, {0x0, [0x4, 0x4, 0x5, 0x1, 0x5, 0x4], 0x4, 0x3}}}}, {{@ip={@multicast1, @broadcast, 0xff, 0x0, 'lo\x00', 'veth0_virt_wifi\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00', 0x0, 0x1, 0x1, 0x1}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) 26.201035092s ago: executing program 2 (id=8842): syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0xec29, 0x0, 0x1, 0x40000337}, &(0x7f0000000dc0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/216, 0xd8}], 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000ff0f00000500000000000000", @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRES16, @ANYRES32, @ANYBLOB="00000000000000000000000000000000a52b66fe9af9320000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib6_table_lookup\x00', r4}, 0x18) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x29, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d08007b490d4f1e81f8d815000100ff05142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x1840020, &(0x7f00000001c0)=ANY=[], 0x1, 0x2fc, &(0x7f00000006c0)="$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") r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x1c, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x85, 0x0, 0x0, 0x17}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0xfca804a0, 0xe, 0x0, &(0x7f00000002c0)="b8000005000000005baf2312bbc2", 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r8 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r8, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000000), 0x4) r9 = getpid() r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r11, 0x1, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x30) 25.627405246s ago: executing program 2 (id=8854): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="010000000400000008000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) pipe2$watch_queue(&(0x7f00000004c0), 0x80) 25.619323707s ago: executing program 2 (id=8855): bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x46556b34e8e5276f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2007fff}, 0x94) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c01", @ANYRES16, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c0005000400000200000200080001000300000005000200030000000500020008000000240003"], 0x12c}, 0x1, 0x0, 0x0, 0x24004820}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) 25.580152331s ago: executing program 2 (id=8856): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x3}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newtaction={0x98, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x4}, 0x3, r3}}]}, {0x4, 0xa}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x84, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12c5008, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sctp\x00') open_tree(r7, &(0x7f0000000640)='\x00', 0x89901) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) 25.502962379s ago: executing program 43 (id=8860): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af0ff00000000bfa200000000000007020000d5ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (fail_nth: 4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@call]}, &(0x7f0000000a00)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x1c, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x13b02, r1, 0x0, 0x0, 0x0, 0x10, 0xd}, 0x94) 25.501359449s ago: executing program 2 (id=8863): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000007440), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000007580)={0x0, 0x0, &(0x7f0000007540)={&(0x7f0000007480)={0x44, r3, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xe7}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x44}}, 0x48840) write$cgroup_type(r1, &(0x7f0000000180), 0xfffffe51) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000001, 0x31, 0xffffffffffffffff, 0xffffd000) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x1, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mbind(&(0x7f00004c9000/0x3000)=nil, 0x3000, 0x8000, 0x0, 0x20, 0x2) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x13, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030200000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYRES16=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8e3c0, 0x0) 25.302337388s ago: executing program 5 (id=8865): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="010000000400000008000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) pipe2$watch_queue(&(0x7f00000004c0), 0x80) 25.243079744s ago: executing program 5 (id=8866): truncate(&(0x7f00000002c0)='./file0\x00', 0x260) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000180)=0xffff7b6e, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000440)=""/33, &(0x7f0000000240)=0x21) r1 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000000)=""/24, 0x18}, {0x0}, {&(0x7f00000003c0)=""/237, 0xed}, {&(0x7f00000000c0)=""/44, 0x2c}, {&(0x7f0000000100)=""/1, 0x1}, {&(0x7f00000001c0)=""/39, 0x27}], 0x6, 0xf, 0x8001) io_uring_enter(r1, 0x6e2, 0x3900, 0x3, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r4, 0x29, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000800)=ANY=[], 0x9) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x77359400}, 0x0) 24.377090207s ago: executing program 5 (id=8872): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESOCT=r1]) 24.376578267s ago: executing program 5 (id=8873): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x3}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newtaction={0x98, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x4}, 0x3, r3}}]}, {0x4, 0xa}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x84, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12c5008, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/sctp\x00') r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) 24.196660544s ago: executing program 5 (id=8876): truncate(&(0x7f00000002c0)='./file0\x00', 0x260) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000180)=0xffff7b6e, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x1e, &(0x7f0000000440)=""/33, &(0x7f0000000240)=0x21) r1 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000000)=""/24, 0x18}, {0x0}, {&(0x7f00000003c0)=""/237, 0xed}, {&(0x7f00000000c0)=""/44, 0x2c}, {&(0x7f0000000100)=""/1, 0x1}, {&(0x7f00000001c0)=""/39, 0x27}], 0x6, 0xf, 0x8001) io_uring_enter(r1, 0x6e2, 0x3900, 0x3, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r4, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000800)=ANY=[], 0x9) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x77359400}, 0x0) 24.043057169s ago: executing program 5 (id=8878): pwritev(0xffffffffffffffff, 0x0, 0x0, 0x8, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) lsm_get_self_attr(0x67, &(0x7f0000000200)={0x0, 0x0, 0x71, 0x51, ""/81}, &(0x7f0000000280)=0x71, 0x0) 24.042891349s ago: executing program 44 (id=8878): pwritev(0xffffffffffffffff, 0x0, 0x0, 0x8, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) lsm_get_self_attr(0x67, &(0x7f0000000200)={0x0, 0x0, 0x71, 0x51, ""/81}, &(0x7f0000000280)=0x71, 0x0) 23.276142963s ago: executing program 6 (id=8883): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0ff5b14104fe62cc60e413905ea23c2262"], 0x0}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000100001000000000000000000d100000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a320000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a31000000004c000000050a19020000000000000000010020000c00024000000000000000010900010073797a31000000002000048014000300"], 0xe8}}, 0x0) (fail_nth: 4) 22.996599369s ago: executing program 6 (id=8884): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000ff1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000006c0)='kfree\x00', r4}, 0x18) (async) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r6}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) (rerun: 64) write$cgroup_devices(r1, 0x0, 0xa) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)}, 0x20000801) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) write$cgroup_pid(r1, &(0x7f00000002c0)=r0, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) write$cgroup_devices(r1, &(0x7f00000005c0)=ANY=[], 0xfffffeff) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = socket(0x22, 0x2, 0x3) getsockopt$packet_buf(r10, 0x107, 0xd, &(0x7f0000000240)=""/1, &(0x7f0000002180)=0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) (async, rerun: 32) socket$nl_xfrm(0x10, 0x3, 0x6) (rerun: 32) 22.869957702s ago: executing program 6 (id=8885): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20064000}, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'hsr0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)={0x1c, 0x15, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8841}, 0x4000010) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000004000000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000040000000000006c00a43f47ae97dc5573cb46c53e9fa1b0e38dbc6fa65368b9965b0933b38abf0a2ae0cabe863cc37f5724ac0ba47ba809d40a35dd015900000000b5ec000000000100000000"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x7fff}, 0x18) sendmsg$nl_route_sched(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@getchain={0x2c, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xc}, {0xfff3}, {0x0, 0x9}}, [{0x8, 0xb, 0x5}]}, 0x2c}}, 0x20040000) 22.807627967s ago: executing program 6 (id=8886): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x3}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newtaction={0x98, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x4}, 0x3, r3}}]}, {0x4, 0xa}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x84, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12c5008, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/sctp\x00') r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) 22.653227672s ago: executing program 6 (id=8889): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0xa00, 0x81, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) 22.58092253s ago: executing program 9 (id=8890): r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000004a40), 0x0, 0x40000001, 0x0) 22.415049255s ago: executing program 6 (id=8891): syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0xec29, 0x0, 0x1, 0x40000337}, &(0x7f0000000dc0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/216, 0xd8}], 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000ff0f00000500000000000000", @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRES16, @ANYRES32, @ANYBLOB="00000000000000000000000000000000a52b66fe9af9320000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib6_table_lookup\x00', r5}, 0x18) socket$kcm(0x10, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x1840020, &(0x7f00000001c0)=ANY=[], 0x1, 0x2fc, &(0x7f00000006c0)="$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") r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x1c, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x85, 0x0, 0x0, 0x17}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0xfca804a0, 0xe, 0x0, &(0x7f00000002c0)="b8000005000000005baf2312bbc2", 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$netlink(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r9, 0x1, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x30) 22.390503228s ago: executing program 45 (id=8891): syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0xec29, 0x0, 0x1, 0x40000337}, &(0x7f0000000dc0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/216, 0xd8}], 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000ff0f00000500000000000000", @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRES16, @ANYRES32, @ANYBLOB="00000000000000000000000000000000a52b66fe9af9320000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib6_table_lookup\x00', r5}, 0x18) socket$kcm(0x10, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x1840020, &(0x7f00000001c0)=ANY=[], 0x1, 0x2fc, &(0x7f00000006c0)="$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") r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x1c, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x85, 0x0, 0x0, 0x17}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0xfca804a0, 0xe, 0x0, &(0x7f00000002c0)="b8000005000000005baf2312bbc2", 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$netlink(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r9, 0x1, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x30) 21.589111975s ago: executing program 9 (id=8895): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20064000}, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'hsr0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)={0x1c, 0x15, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8841}, 0x4000010) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000004000000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000040000000000006c00a43f47ae97dc5573cb46c53e9fa1b0e38dbc6fa65368b9965b0933b38abf0a2ae0cabe863cc37f5724ac0ba47ba809d40a35dd015900000000b5ec000000000100000000"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x7fff}, 0x18) sendmsg$nl_route_sched(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@getchain={0x2c, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xc}, {0xfff3}, {0x0, 0x9}}, [{0x8, 0xb, 0x5}]}, 0x2c}}, 0x20040000) 21.412856702s ago: executing program 9 (id=8896): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20064000}, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'hsr0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)={0x1c, 0x15, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8841}, 0x4000010) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000004000000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000040000000000006c00a43f47ae97dc5573cb46c53e9fa1b0e38dbc6fa65368b9965b0933b38abf0a2ae0cabe863cc37f5724ac0ba47ba809d40a35dd015900000000b5ec000000000100000000"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x7fff}, 0x18) sendmsg$nl_route_sched(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@getchain={0x2c, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xc}, {0xfff3}, {0x0, 0x9}}, [{0x8, 0xb, 0x5}]}, 0x2c}}, 0x20040000) 21.263631756s ago: executing program 9 (id=8897): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x3}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newtaction={0x98, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x4}, 0x3, r3}}]}, {0x4, 0xa}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x84, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12c5008, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) 21.025362969s ago: executing program 9 (id=8900): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) 20.814876689s ago: executing program 2 (id=8902): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x0, 0x6}, [@IFLA_ADDRESS={0xa, 0x3, @random="08e7eebc872f"}, @IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x44}}, 0x0) r3 = socket(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000780)=[{{&(0x7f0000000440)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x1, 0x4000810) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000340)="fb", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e24, 0x0, @loopback, 0x1}}, 0x0, 0x0, 0x2, 0x0, "10baa70a93289349d889de25b87376f64276337642b890d33cb5b592266c5b98fb19402835fee1b3871b7ef6619db5b2a94edb6f73ea08b02aa3b47debd38b6d889a8c986b33eb49c3157f1f370dfd67"}, 0xd8) sendmmsg$inet6(r4, &(0x7f0000008e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x84) dup(r4) bind$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6, 0x0, 0x8000000000000}, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 20.814501899s ago: executing program 46 (id=8902): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x0, 0x6}, [@IFLA_ADDRESS={0xa, 0x3, @random="08e7eebc872f"}, @IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x44}}, 0x0) r3 = socket(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000780)=[{{&(0x7f0000000440)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x1, 0x4000810) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000340)="fb", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e24, 0x0, @loopback, 0x1}}, 0x0, 0x0, 0x2, 0x0, "10baa70a93289349d889de25b87376f64276337642b890d33cb5b592266c5b98fb19402835fee1b3871b7ef6619db5b2a94edb6f73ea08b02aa3b47debd38b6d889a8c986b33eb49c3157f1f370dfd67"}, 0xd8) sendmmsg$inet6(r4, &(0x7f0000008e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x84) dup(r4) bind$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6, 0x0, 0x8000000000000}, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 20.782939252s ago: executing program 9 (id=8905): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x3, 0x53e, &(0x7f0000000b40)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000004c0)='kfree\x00', r1, 0x0, 0x4ab}, 0x18) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20.750808305s ago: executing program 47 (id=8905): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x3, 0x53e, &(0x7f0000000b40)="$eJzs3cFvHFcZAPBvJt544zh1Cj0AAhpKIaAoa3vTRlUvpBcQqiohKk4cUmNvLCu72ci7EbXJwT5w4F6JSJyA/4AbQpV64sCNG9y4lANSgAhUI3FYNLMTd2vvxktje2Lv7ydNZt57k/3e2817b+ZFuxPAxLoUEVsRcTYi3omIuSI/Kba40d+y8z56dH9559H95SR6vbf/keTlWV4M/J3M+eI1qxHx/e9E/CjZH7ezsXl7qdlsrBfp+W7r7nxnY/PqWhozeU79+uL1hdeuvVo/tLa+2PrNw2+vvfmD93/7pQ//uPXNn2TVmv3ZhbxssB2Hqd/0SswO5E1FxJtHEawkU8W/H06eNCI+ExEv5f1/Ls7kn2Zhe6rMqgEAR6TXm4ve3GAaADjtsvv/2UjSWrEWMBtpWqv11/BeiJm02e50r8y1791ZiXwN62JU0ltrzcZCsVZ4MSpJll7Mjz9O1z+Rfq9xLSKej4j3ps/l5bXldnOlzAsfAJhg5/fM//+e7s//gyplVQ4AODrVsisAABw78z8ATB7zPwBMnv9j/veNQAA4Jdz/A8DkMf8DwOQ5cP7fPp56AADH4ntvvZVtvZ3+718//qXuqyuNzu1a695ybbm9fre22m6vNhu15V7voNdrttt3F1/ZTXY2Nm+22vfudG+utZZWGzcbfksAAMr3/Isf/Dmb9LdeP5dvMfAsB3M1nG5p2RUASnOm7AoApfF9HphcY9zjWwaAU27II3r7igWCZNQJDzz8FU6qy5+3/g+T6mnW/60dwMn26db/v3Xo9QCOnzkcJlevl+x75n+6WwYAnEbW+IGR//9fqP70d8MLHhxFbQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBkmM23JK3lzwLfyv5Ma7WICxFxMSrJrbVmYyEinouIP01XprP0YtmVBgCeUvq3pHj+1+W5l2f3lp5N/jOd7yPix794++fvLnW764tZ/j9387sPsvxz3fX62TIaAAAMurE/K5+/68V+4Eb+o0f3lx9vx1nFh29ERLUff6fY+iVTMZXvq1GJiJl/JUW6L7teOXMI8be2I+Jzj9tfjXcHIszmayDVPLU3fhb7wqHHH3z/98ZPP9HeNC/L9pX8vfhs7KkccKAP3uiPk0Xfy7p40f/SuJTvh/f/aj5CPb1s/Mu6686+8S/dHf/O7Iuf5H3+0m56T032PNT94Su//+6+wL25ftl2xBemhsVPduMnw8ffystjtvEvX/zyS6PKer+MuDy0/VnU9ysRrXyYne+27s53NjavrrWWVhurjTv1+vXF6wuvXXu1Pn9rrRkL8/lK9R+Gxfj761eeGxU/a//MiPjVJ7c/vjZm+3/133d++JUnxP/GV4d//i88IX72EX99zPhLMzeqo8qy+Csj2n/A5x9Xxoz/4V83V8Y8FQA4Bp2NzdtLzWZj/YCD7FrzoHMcjH+Q3ds/A9XID2IrYqyTzx98Tr4oERFDz8muqJ+NJh/VQVJa9F8f9guWPTIBR+3jTl92TQAAAAAAAAAAAAAAgFE6G5u3p4d/W+vQDspuIwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKfX/wIAAP//nCW+Cg==") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000004c0)='kfree\x00', r1, 0x0, 0x4ab}, 0x18) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 15.446323945s ago: executing program 3 (id=8980): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="4000aa000a0002"], 0x28}, 0x1, 0x0, 0x0, 0x44800}, 0x0) 15.406892289s ago: executing program 3 (id=8981): r0 = syz_io_uring_setup(0x6b70, &(0x7f0000000040)={0x0, 0x9b38, 0x1000, 0x100003, 0x170}, &(0x7f0000000500), &(0x7f0000000a40)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) io_uring_enter(r0, 0x627, 0x4c1, 0x43, 0x0, 0x0) 15.262572623s ago: executing program 3 (id=8984): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002000)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x2, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x8}, [{}, {0x0, 0x4, 0x80000000, 0x0, 0x3}, {}, {0x1, 0x0, 0x0, 0x7fff, 0x0, 0xfffffffd}, {}, {0x0, 0xfffffffc, 0xfffffffd}, {}, {0x0, 0xfffffffd}, {0x7, 0x0, 0x0, 0x8}, {0x0, 0x10, 0x0, 0x25, 0x0, 0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x100}, {0x0, 0x8}, {}, {}, {}, {0x4}, {}, {0x0, 0x0, 0x0, 0xa902}, {0x3}, {0x0, 0x0, 0x0, 0xffffffff}, {0x0, 0x400, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0xeffffffd, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x40}, {0x0, 0x0, 0x9, 0x2, 0xa46}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {0x6, 0x0, 0xfffffffe}, {}, {0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x1c69, 0x100}, {0x0, 0x0, 0x10000}, {0x0, 0x0, 0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {0x20, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {0x7, 0x9, 0x0, 0xffffffff, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5155}, {}, {0x6e5000cb, 0x0, 0x0, 0x0, 0x6, 0x5}, {0x6, 0x3, 0x2}, {}, {0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffff2ff1}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x6}, {}, {0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x5a9}, {}, {0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x80}, {0xfffffffd, 0x2}, {0x0, 0xfe}, {0x4, 0x0, 0x0, 0xfffffffe}, {}, {0x400, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff7ff}, {0x0, 0x0, 0x1000000}, {0x0, 0x0, 0x0, 0x1, 0x8000}, {0x0, 0x3}, {0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x0, 0x0, 0x0, 0x0, 0x4d1, 0x4}, {}, {0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd}, {0x0, 0x0, 0x0, 0x8001}, {0x0, 0x0, 0x0, 0xfffff800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, {0x0, 0x1}, {0x400, 0x0, 0x0, 0x4, 0x0, 0x2400000}, {0x0, 0xfffffffe, 0x0, 0xb5}, {0x0, 0x2}, {0x0, 0x0, 0x81, 0x0, 0xfffffe00, 0x6a76d8f4}, {}, {0x0, 0x0, 0xfffffffc}, {}, {0x0, 0x0, 0x100000, 0x0, 0x8}, {0x9}, {0x9}, {0x0, 0x7fffffff}, {0x4}, {0x1}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x100, 0x0, 0x0, 0x8000}, {}, {}, {0x400}, {0x0, 0xfffffffd}, {0x0, 0xffffffff}, {0x0, 0x0, 0xabd}, {0x0, 0x0, 0x1}, {0x0, 0xdd86, 0x0, 0xfffffffc}, {0xfffffffd}, {0x0, 0x0, 0x100}, {}, {0x0, 0x0, 0x0, 0x0, 0x7}, {0x0, 0x0, 0x0, 0x0, 0xf8, 0x80000000}, {0x0, 0x0, 0x1}, {0x40000, 0x0, 0x0, 0x0, 0x0, 0x451d}, {0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x40000}, {0x4}, {}, {0xfffffffe, 0x0, 0x0, 0x0, 0xfffffffe, 0xfffffe00}, {0x0, 0x80000}, {0x122}, {0x0, 0x8}, {0x80000000, 0x3, 0x6a, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x0, 0x1000}, {0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x212, 0xffffffff}, {0x0, 0x0, 0x0, 0x0, 0x4000000}, {0x200}, {}, {0x0, 0x800}], [{}, {}, {}, {0x1}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {0x1}, {}, {}, {}, {}, {}, {0x4}, {}, {0x0, 0x1}, {0x3}, {}, {}, {0x0, 0x1}, {}, {0x3}, {}, {}, {0x4}, {}, {}, {}, {0x2}, {0x4}, {0x3}, {0x2}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x5}, {0x4}, {0x5, 0x1}, {0x2}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {0x3}, {0x3}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0xe}, {0x4}, {0x0, 0x1}, {}, {0x2}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x0, 0x1}, {0x2}], 0x1}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0xe68}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000640)={0x0, r1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000000000006b0000006b000000080000000f0000000000000803000000000000000100000d000000000000000001000000051000000000000700000000050000000200008f0300000005000000090000020400000004000000060000001eb4000055adec14be287b2edd46df80000000000000000300000000020000000200000007000000d920a61c0cadf0bd84c20f8b38cf6a306600878cc9cf4da36538402f46b9fca132f8690447183be3dc9c25ac"], &(0x7f0000000580)=""/141, 0x8c, 0x8d, 0x0, 0x200, 0x10000, @value=r2}, 0x28) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), r3) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r4, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x1, 0xc1}}}}, 0x30}, 0x1, 0x0, 0x0, 0x20044090}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000825bd7000fedbdf2501000000000000000b000000000c001473797a3000001000ebc615255a0408568338c20cacc3b3d917805e60159b53bf812daf1f8f51c92465809500ceaf725103a6054e050347a996d88fa508f941aa22d46a77270dfcd079fbb13cf552582e9dbd13a3877ce1894d6b003adfe6198a9712a0851f05"], 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x40040) 15.249792274s ago: executing program 3 (id=8987): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_wakeup_irq', 0x0, 0xb) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000540)='./file0\x00', 0x1204018, &(0x7f0000000240)=ANY=[@ANYBLOB="6f76657272696465726f636b7065726d2c6e6f636f6d70726573732c686964652c73657373696f6e3d3078303030303030303030303030303032312c756e686964652c696f636861727365743d63703433372c6f76657272696465726f636b7065726d2c626c6f636b3d3078303030303030303030303030303430302c005fb50aab29cf1d32d24be5ab2a6506aa524c8f1cd5781842ee1c86bee627767fee958f25bb6db8e631262ed8a59d337d730b6698271aeb8c31c1902a7e236e5dd878e6c1352c0c799d8e80d7346f8d2870acebe617c694bbb925d3ab4fb01784c564c03d88c81d2f84f58e8c6ba18548f09fa6"], 0x1, 0x56f, &(0x7f0000000b00)="$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") r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000008500000005000000953209e65e5410bac5856ffea0b08d750e8d5e45e260c44c639dcd515cb1250d9d07320037e7363e7d6ef684f96646c5058173860b40f280d2340e14fae0188bcd23113f927384c8d989d2d52c720c099c252e04f48c"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) r5 = syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = getpid() socket$pppl2tp(0x18, 0x1, 0x1) madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x17) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) process_vm_readv(r6, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x48, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32], 0x20) r8 = socket$nl_rdma(0x10, 0x3, 0x14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ff9}]}) alarm(0x9) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000340)={0x79e, 0x0, &(0x7f0000000200)=[r7, r8, r2, r1, r2]}, 0x5) ptrace$ARCH_GET_UNTAG_MASK(0x1e, r5, &(0x7f00000004c0), 0x4001) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r8, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000001714"], 0x30}}, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r9, 0x4c0a, &(0x7f0000001600)={r0, 0x800, {0x2a00, 0x80010000, 0x0, 0x6975c1a0, 0x0, 0x0, 0x6, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09d0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c1e54406c7f00", [0x4, 0x40000000000000]}}) r10 = dup3(r8, r8, 0x0) ioctl$PIO_FONTRESET(r10, 0x4b6d, 0x0) 15.124979756s ago: executing program 3 (id=8989): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x0, 0x6}, [@IFLA_ADDRESS={0xa, 0x3, @random="08e7eebc872f"}, @IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x44}}, 0x0) r3 = socket(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000780)=[{{&(0x7f0000000440)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x1, 0x4000810) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r4, &(0x7f0000000340), 0x0, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e24, 0x0, @loopback, 0x1}}, 0x0, 0x0, 0x2, 0x0, "10baa70a93289349d889de25b87376f64276337642b890d33cb5b592266c5b98fb19402835fee1b3871b7ef6619db5b2a94edb6f73ea08b02aa3b47debd38b6d889a8c986b33eb49c3157f1f370dfd67"}, 0xd8) sendmmsg$inet6(r4, &(0x7f0000008e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x84) dup(r4) bind$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5, 0x0, 0x8000000000000}, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 14.903259637s ago: executing program 3 (id=8995): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x18}, 0x0) syz_clone(0x9200, 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000780)) 14.902943497s ago: executing program 48 (id=8995): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x18}, 0x0) syz_clone(0x9200, 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000780)) 1.894579788s ago: executing program 4 (id=9361): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r1, 0xee00, 0xee01) keyctl$read(0xb, r1, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYRESDEC=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000080)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095", @ANYRES16=r1, @ANYRESDEC=r2, @ANYRESDEC=r0], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r8, 0x0, 0xf3a, 0x0) close(r7) write$binfmt_script(r8, 0x0, 0xd9) write(r5, 0x0, 0x0) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000001300)=""/238, 0xee}], 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r9}, &(0x7f0000000300), &(0x7f0000000380)}, 0x20) r10 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r10, 0xa, 0x13) fcntl$setlease(r10, 0x400, 0x0) timer_create(0x0, &(0x7f00000005c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) 1.597488567s ago: executing program 8 (id=9369): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) pipe2$watch_queue(&(0x7f00000004c0), 0x80) 1.597137217s ago: executing program 8 (id=9370): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0xa00, 0x81, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) 1.45740339s ago: executing program 8 (id=9371): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)={0x114, 0x29, 0x1, 0x4, 0x25dfdbfc, "", [@nested={0x101, 0xf2, 0x0, 0x1, [@typed={0xc, 0x18, 0x0, 0x0, @u64=0xfac0b}, @typed={0x14, 0x1f, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @loopback}}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb43d9621dc08c029d1608a46cf26fbe816b89f7cb81bff81a8b9482565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875ec58e9a3ddb9ad02a078cf0d972df9e99f079767734f69ce475f00ac64337803f5eb4e5842f4d98fe3fa370d47eb640dc5061dc358", @typed={0x8, 0x145, 0x0, 0x0, @ipv4=@remote}]}]}, 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x41000, 0x2c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r3, 0x0, 0xfffffffffffffffd}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r8, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)=@newtfilter={0x70, 0x2c, 0xd27, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0xa, 0x7}, {}, {0xc, 0x1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x40, 0x2, [@TCA_CGROUP_EMATCHES={0x3c, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x2c, 0x1, 0x0, 0x0, {{0xe38, 0x9, 0x4}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}, @TCA_EM_IPT_MATCH_DATA={0x10}]}}]}]}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x880}, 0x40010) 1.351054791s ago: executing program 8 (id=9374): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000ac0)={'wpan0\x00', 0x0}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0xffffffffffffffff}, 0x18) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, &(0x7f0000000140)="10", 0x1, r4) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x24, r1, 0x1, 0x70bd24, 0x25dfdc00, {}, [@NL802154_ATTR_SEC_KEY={0x8, 0x30, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x4}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x24}}, 0x4040084) 1.280327637s ago: executing program 8 (id=9375): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x6}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000000)={[{@discard}, {@data_err_ignore}]}, 0xfe, 0x55b, &(0x7f0000000980)="$eJzs3c9vFFUcAPDvbFt+FaUkhKgH04SDGGRLW39g4gGPRokkesdNOzSkW5Z0t4RWEuEgFy+GmBgjifEP8O6R+A/4V5AoCTGk0YOXNbOdhaXdH6UsdGU/n2TgvXmzvHkz8328t283G8DQmsz+KES8GhHfJhGHWspGIy+c3Dhu/cG1uWxLol7/7K8kknxf8/gk/3s8z7wSEb99HXGisLXe6uraYqlcTpfz/FRt6fJUdXXt5MWl0kK6kF6amZ09/c7szPvvvbv1xXt31tY3z/3zw6d3Pjr9zbH173+5d/hWEmfiYF7W2o6ncL01MxmT+TUZizObDpzuQ2WDJNntE2BHRvI4H4usDzgUI3nUAy++ryKiDgypRPzDkGqOA5pz+67z4PqLN8u7/+HGBGhr+5ON90ZiX2NudGA9eWxmlF2JiT7Un9Xx65+3b2Vb9O99CICert+IiFOjo4/1fy9HS/+3c6e2cczmOvR/8PzcycY/b+1tM/4pPBz/RJvxz3ib2N2J3vFfuNeHajrKxn8ftB3/Ply0mhjJcy81xnxjyYWL5TTr27Ju8niM7c3y3dZzTq/frXcqax3/ZVtWf3MsmJ/HvdFN613zpVrpadrc6v6NiNd6jH+TNvc/ux7ntlnH0fT2653Kerf/2ar/HPFG2/v/aK6TdF+fnGo8D1PNp2Krv28e/b1T/bvd/uz+H+je/omkdb22+uR1/LTv37RT2WSSL5o+4fO/J/m8kd6T77taqtWWpyP2JJ9s3T/z6LXNfPP4rP3Hj7WP/27P//6I+GKb7b955GbHQwfh/s8/0f3vkKgnHYvufvzlj53q317/93YjdTzfs53+r8uZPpZ4mmsHAAAAAAAAg6YQEQcjKRQfpguFYnHj8x1H4kChXKnWTlyorFyaj8Z3ZSdirNBc6R5v+TzEdP552GZ+ZlN+NiIOR8R3I/sb+eJcpTy/240HAAAAAAAAAAAAAAAAAACAATHe4fv/mT9GdvvsgGfOT37D8OoZ//34pSdgIPn/H4aX+IfhJf5heIl/GF7iH4aX+IfhJf5heIl/AAAAAAAAAAAAAAAAAAAAAAAAAAAA6KtzZ89mW339wbW5LD9/ZXVlsXLl5HxaXSwurcwV5yrLl4sLlcpCOS3OVZZ6/XvlSuXy9EysXJ2qpUltqrq6dn6psnKpdv7iUmkhPZ+OPZdWAQAAAAAAAAAAAAAAAAAAwP9LdXVtsVQup8sSEjtKjA7GaUj0ObHbPRMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPPJfAAAA//9j0zaD") pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x4ffe6, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="84000000", @ANYRES16=r7, @ANYBLOB="010000000000fbdbdf250100000008000200000000000500050000000000080003000100000048000180050002002000000006000100020000000800060003000000080003"], 0x84}}, 0x20000000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x2f, 0x1, 0x0, 0x3, 0xd, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x730, 0xad, 0x1}}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r8, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x2904c, 0xff01, 0x10003, '\x00', [{0x0, 0x0, 0x700, 0x7, 0x0, 0x40000000000000}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}]}) 1.04215896s ago: executing program 4 (id=9380): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80078b, &(0x7f0000000680)={[{@nodioread_nolock}, {@journal_dev={'journal_dev', 0x3d, 0xff}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@nouid32}, {@resgid}, {@acl}, {@usrjquota}]}, 0x0, 0x46e, &(0x7f0000000bc0)="$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") (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f00000005c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8000b11}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="c1188e19b95d02ff4284860186dd", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f00000012c0)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000002000000e000000200"/466], 0x290) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) newfstatat(0xffffffffffffff9c, &(0x7f0000001040)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000140)={[{@resuid={'resuid', 0x3d, r3}}, {@nodioread_nolock}]}, 0x2, 0x5ea, &(0x7f00000014c0)="$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") (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r0, &(0x7f0000000480)="3bd6cb7ec4931702a1bf4c895edbe26371c13ee7aaa1d8650308cd0ce792446e58abd4fc4d72b81ca9f77d38dc8a6ed1f444f959c76fa1cfc69a3614539820", &(0x7f0000000740)=""/248}, 0x20) (async) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200400, &(0x7f0000000380)={[], [{@measure}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_eq={'fowner', 0x3d, r3}}]}, 0xdf, 0x256, &(0x7f0000000880)="$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") r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29, 0xffffffffffffffff}, './file0\x00'}) (async) r6 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) close(r6) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001e00100000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000fcffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r11}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r5}, 0x4) (async) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x24, r8, 0x1, 0x4070bd28, 0x1, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x24}}, 0x18) (async) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000", @ANYRES8=r10, @ANYRES16=r8, @ANYRES8=r12, @ANYRES8=r11], 0x0, 0xcd1, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023629, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) 983.132656ms ago: executing program 4 (id=9381): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x18}, 0x0) syz_clone(0x9200, 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000780)) 949.317389ms ago: executing program 4 (id=9382): r0 = socket(0xa, 0x5, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040), 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x4, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000040)='\x00', 0x1, 0x8044004, &(0x7f0000000100)={0xa, 0x4e24, 0xb, @loopback, 0xc5f}, 0x1c) 932.70297ms ago: executing program 4 (id=9383): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0, 0x0, 0xd}, 0x18) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0) syz_read_part_table(0x4097, &(0x7f00000040c0)="$eJzsz7FN61AYBeDjxE5elCdFUFAioKF1FsgWWQchWIIOiTLDsANDUNBg5FwcZ4EIhL6v8Dn2//tKN/yo17FWSZ727a0+fOhNxpqcl5gnZ0murvPYtsm/eZJ1Gd0fdpu0627VH/A/Sf0y6aer+nu6TLa7094OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4TaqxPi9Lzkt8JJkeL3RHu4skd5uL2+H9oUmzuayGf/cms+H82bR/fnZFku3udDcCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP6gqi7ZLPLe582y/mJ/jm0YhIEwjF5iWwlLULMQS7B/Q3VIiIMJ6N7r/Ptz4bpqMT1dZuZvafd5zJ8xKv3X2uOatnoT/XvmVewZa773HQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBgBw4EAAAAAID8XxuhqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqCjtwQAIAAAAg6P/rdgQKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwEMBAAD//33UI0E=") 918.763372ms ago: executing program 1 (id=9384): r0 = socket(0xa, 0x5, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x8, 0x1, 0x85}]}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)='\x00', 0x1, 0x8044004, &(0x7f0000000100)={0xa, 0x4e24, 0xb, @loopback, 0xc5f}, 0x1c) 898.106074ms ago: executing program 1 (id=9386): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000ac0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x70bd24, 0x25dfdc00, {}, [@NL802154_ATTR_SEC_KEY={0x10, 0x30, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x2c}}, 0x4040084) 885.516265ms ago: executing program 1 (id=9387): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) 853.201378ms ago: executing program 0 (id=9388): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r1, 0xee00, 0xee01) keyctl$read(0xb, r1, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000080)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095", @ANYRES16=r1, @ANYRESDEC=r2, @ANYRESDEC=r0], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000000)) 836.8707ms ago: executing program 0 (id=9389): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) pipe2$watch_queue(&(0x7f00000004c0), 0x80) 836.56716ms ago: executing program 1 (id=9390): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) unshare(0xa000200) semtimedop(0x0, &(0x7f0000000040)=[{0x4, 0x6, 0x1000}], 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)=r3}, 0x20) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) unshare(0x20060400) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0xa14401, &(0x7f0000000000)={[{@errors_remount}, {@nodiscard}], [{@pcr={'pcr', 0x3d, 0x39}}]}, 0x8, 0x496, &(0x7f0000000540)="$eJzs3MtvVFUYAPDvTqflbSviA0SpopFobGlBZeECjCYsNDHqApe1LQQplNBqhBCtLnBpSIxb48KFiX+BK90YZWXiVveGhBg2oG6uuTP3ltthpvQxZazz+yXDnPuacz7OOTPn3NOZALrWYPZPErE1In6LiP765sITButPN69fHP/r+sXxJNL0zT+T2nk3rl8cL04trttSbMwt3F82c/7CqbGpqclz+fbw7OmzwzPnLzx78vTYickTk2dGDx06eGDkhedHn7vt2rMriDMr041dH07v3nn07cuvjR+7/M7P3yZF/AvieH8Fr97UYJN9PUXiyXbl8h+xrZROqvXnNzpVGJYsa5BZdfXW+n9/9ER1/lh/vPJJRwsHrKk0TdMNrQ/PpcD/WBKdLgHQGfnnfBIxN57Ngcvz+W5w7Uh9ApTFfTN/1I9Uo5Kf09swv22nbLZ1bO7vL7NHNNxPyX20RlkDAF3q+yP152Lsd2v8UamWzzucrw0NRMS9EbE9Iu6LiB0RcX9EPBARD0bEQ/NX9JYvb7YEVLNwkSQbcTWOfypXVxHeHWXjvxfzta2F479i9BcDPfnWtlr8vcnxk1OT+yPinojYF70bsu2RRfL44eVfP2t1bLA0/sseWf7FWDAvx9Vqww26ibHZsdXEXHbt44hd1WbxJ/MrAVnl7YyIXXtWlsfJp7/Z3erYneNfRHVl5SlLv4p4ql7/c9EQfyFZfH1yeGNMTe4fLlrF7a78cun1VvmvKv42yOp/c9P2Px//QFJer51Zfh6Xfv+05Zxyie2/r3xN1v77krdq6eLAB2Ozs+dGIvqSV/P9h/P9C/OrnTd66/ws/n17m/f/7XHrf+LhiMga8SMR8WhE7MnL/lhEPB4RexeJ/6eXnnh3GfEfPVvKd61l8U8sq/5bJoq17dsO9Zz68btSVdU/RFrFn0ST+j9YS+3L9yzl/W/Rkp5bTWsGAACA9acSEVsjqQzNpyuVoaH638vviM2VqemZ2WeOT793ZqL+HYGB6K0Ud7r65++HxtxIPq0v7o+ONmwfyO8bf75hU217aHx6aqLTwUOX29Ki/2f+6Ol06YA114Z1NGCdWmn/T9PUH6fCOufzH7qX/g/dq0n/39SwvchvBADrWdb/NzbsM7GH7mD8D91L/4fupf9D99L/oSvl34Sv1hJXImJpX5tvbyJ7/7nrma4ikaYdyr2vbS+YJqt9nah0rAqi0w1gmYl/8h/bzPZ8cVdz/3rll3f6nQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA9/g0AAP//eZHg/g==") syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file2\x00', 0x8, &(0x7f0000000080)={[{@nodioread_nolock}, {@sb={'sb', 0x3d, 0x1}}]}, 0x4, 0x523, &(0x7f00000018c0)="$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") r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5, 0x0, 0x3}, 0x18) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) 789.398164ms ago: executing program 0 (id=9391): pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000500)=0xed, r3, 0x0, 0x0, 0x1}}, 0x20) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$cont(0x18, r4, 0x106, 0xfffffffffbfffe64) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="f3e78946fd4d74d510141cfc31f1694dc62fa2787495aa7405a436f77544a90433516d0fc592c6dfe854c01c6592736fcc96f1337d03e2cb872a12c67068a0a18b8236b5d3249d974ba311741364f433b0ece766fcb62daab94c848b2167914a878c1bb1d80e3088bb1bcc361e32f84bbb5db80e99577d27e5bf7ac35d45ee660138ee0ec9ea04d5380903d3d623d854a8c48f6646821f226de4c4971bdfc1ae1183021d91b4d8502981ef85c66fae70a5cfa281252fd790da6c7b71bcca7028112e9ee466b57056e7e0ee8fdbf44021abeb2f13fd8583f812b0c1d8a1fefa790333bc419ae6b0d97ed42d71a8279eb741", @ANYRESDEC=r0, @ANYRES32=r1, @ANYRESHEX=r4, @ANYRESHEX=r0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRESDEC], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r5, 0x0, 0x9}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000240)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)='kfree\x00', r6, 0x0, 0xf1c38fa000000000}, 0x18) sendmsg$xdp(0xffffffffffffffff, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002240)=[{&(0x7f00000000c0)="9454b83847a5c639dccc1cc3aa288229ee8a8a45ab78b6638fd2636c7547f7afcc1711878b54b4a8bc9eda3358a5cafd58dbb8a9f638354fbf2e6ab22b8558896f959a8579d9a05c6dde4a9dcc1779d407440e34d6e555f793ec7c2979d1f4b82e4122ce3f815e2e5322b7e74e3439af393c3adad4bab28934e91efd14ebc482d56ce8cedb094afc27d5c1e6cc050411de76f5731640796ba1e233fa6da1bb14cd30662898a0595bf34af8eebc3d12716e62ae66fbb6cf070bef47415d593769c361fc054ea962c9d09ed46aecba2af20e0a40204d4d795d019895bc0d52d8cc032ee13ae832fb1f989b70ab35596dfe28c239d45c99016cadd05b87af7bd13d37c5efae45046d0e5f9860e35c2f08ef9f67c80c47b870e353c089bab87b74c588183c64b20b7ccbdb068390e4c59a848d9695f46fc8bdbde97a4400f2e8b7379a62c57fd4ef8bd4f8e3a4bf141e87156efc1b86e15f34591489db7112fcae399f83f9e4ee56a923ea3123b3fbff37ccdf92284137a1500cad979bc0331524168b5f1a5da3e2d6643b6b0f28eb15869ba7f609c4fc9e4aecca1183de7b6427e7564714ffe154c2e4db0042ada0561c58a4003191033a4fdbf0d09c9c49e802e325da5bc2bcbe5b7a64c411a780ae8d0902118894f5f63fe989623f25a7e201e135e8f25b5365c3a615a4727144109cc4b88660728445ce841940d20e87069cb74f63fbfb5dd7992dc4ccde1484aeec05630a440ed9481d03267585eed156484d23b07280cc045ff023abd628d43f7d3b7bc5a9e8e6445f94271d508e5bb17b12216dba8a5f1a02aef9126389dcf725197440404b29b95e71d45b9dad8f3fdf1c6a2734632ca7991026304d869a94259cc32ac8a45da5ba38f54e9d98faf2af04e3f11ab495eb490daa88cbf465fe127cf144081196d8319692a51d3bae449ff531427c829d9cfab8cb15ae4ff6f4392e2c657beae5364b55d05729bc7f950e4b99c7ce71136168a3fda8b7ead182973c1f5fb52f7c6f488f6383c1259345306375ebe0639e40f367be4a480c2babf3e0572a5c089cccd06588489fdf12ff256af41faef912dea1c1cf122e8e4b99770b19fdc9f6b12cdfa51d0b0d3b6dbc18af665f0f92b83b12eda1fae071a9fb49575763d1bfce45616089b868e37bad0c806a5cff911ae163f82f98c885e7c9afa4d55a4117246086b07e55991205ad345dde63ef855097c7be09343ff9dd982e7e8332337c1b9c8aedd1afeb06010e59aeb5008f7bb0d971963f79df825d94773c9b79e6897c53a83388ef89bddd1d35addfb6c3dc0121ac2a7936643159365a0ef14dc95de2d1f60f41a687c04ba42ed9b225496a418e593587f40a25bbb761eeddc2080512646d163a9968ea00f599239b3abd581253d383fb72abad3b19e0d85a7eafdc02e92cbe784129c37152934a286c2a3d5c5eb1ac65caf63f352e58c96a26b0b13462b992926bae78774d7d9de575bf86b50da743692fb38ee9fbc51ac0eff40589f7259b50e1208753abdd7e404abe252592ec7605fb2aacf41771c506cbcf84d7e8657d3801a64f8b8480ff07", 0x461}], 0x1, 0x0, 0x0, 0x10}, 0x40000) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000200)) 788.993154ms ago: executing program 0 (id=9392): r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4b49, &(0x7f0000000140)={'veth0_to_team\x00', &(0x7f0000000280)=@ethtool_channels={0x1a, 0xffffffff, 0x0, 0x0, 0x4, 0x2, 0x1}}) 723.082211ms ago: executing program 0 (id=9393): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x18}, 0x0) syz_clone(0x9200, 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000780)) 684.851764ms ago: executing program 1 (id=9394): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0xffff, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000020000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r2, 0xffffffffffffffff}, 0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1d, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYRES16=r3], &(0x7f0000000380)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000021c0), 0x181000) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r6}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r5, 0xc0a85320, &(0x7f0000000c40)={{0x80}, 'port0\x00', 0x41, 0xfe8ee28a1d9fac77, 0x5, 0x6, 0x2, 0x40, 0x3, 0x0, 0x6, 0x5}) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0xc0a85320, &(0x7f0000000240)={{0x80}, 'port1\x00', 0x24, 0x0, 0x3, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x3}) close(r5) r7 = socket$igmp6(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r7, 0x29, 0x22, &(0x7f0000000080)={{0xa, 0x4e24, 0x101, @empty}, {0xa, 0x4e22, 0x1ff, @dev}, 0x1, {[0x0, 0x0, 0x0, 0x0, 0x899, 0x1]}}, 0x5c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f00000008c0)='fib6_table_lookup\x00', r1}, 0x10) r8 = socket$kcm(0xa, 0x5, 0x0) chmod(&(0x7f0000000240)='./file0\x00', 0x60) sendmsg$kcm(r8, &(0x7f00000003c0)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)="b7", 0x1}], 0x1}, 0x40080c0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100) 674.172836ms ago: executing program 0 (id=9395): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r1, 0xee00, 0xee01) keyctl$read(0xb, r1, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYRESDEC=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000080)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095", @ANYRES16=r1, @ANYRESDEC=r2, @ANYRESDEC=r0], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r8, 0x0, 0xf3a, 0x0) close(r7) write(r5, 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x2) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000001300)=""/238, 0xee}], 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r9}, &(0x7f0000000300), &(0x7f0000000380)}, 0x20) r10 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r10, 0xa, 0x13) fcntl$setlease(r10, 0x400, 0x0) timer_create(0x0, &(0x7f00000005c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 585.801614ms ago: executing program 1 (id=9397): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r1, 0xee00, 0xee01) keyctl$read(0xb, r1, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYRESDEC=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000080)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095", @ANYRES16=r1, @ANYRESDEC=r2, @ANYRESDEC=r0], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r8, 0x0, 0xf3a, 0x0) close(r7) write$binfmt_script(r8, 0x0, 0xd9) write(r5, 0x0, 0x0) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000001300)=""/238, 0xee}], 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r9}, &(0x7f0000000300), &(0x7f0000000380)}, 0x20) r10 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r10, 0xa, 0x13) fcntl$setlease(r10, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 585.484964ms ago: executing program 4 (id=9398): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b000000000000000000000000804dbc1258afbf026fc7c49c3fddc60a7465a67dcf3b0d158c4602b5928b09286995e01b9ab06be66c6597952636c350f008e34de3d4db65ec6e9ef071811c76b9fbbadc27cf42aa71cb4d3fe7096929cfc1013df84ef3fc65fb3303d145b82658ef8de5d12bb578f66ca8f860a8a7a0925d7aadd4a49da976d81b8fcfb46488768f038c9f54ec4d5b7666a0c6111646b71bd5b7cd7e327f6ad338e28f8276dca9639bfd8a85f949e9ec3dd455cfdc06f7b442b45e00bbbde4b765f3ebf9e2"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) ustat(0x3, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200)='t', 0x1) sendfile(r4, r3, 0x0, 0x3ffff) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x4004110) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4050000000000007110130000004fb48405000000000000d2e30036118e1b32"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x480d5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11e167, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r7}, 0x18) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r8 = socket(0x400000000010, 0x3, 0x0) dup2(r8, r5) 502.505722ms ago: executing program 7 (id=9402): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x402, 0x142) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000800000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) mkdirat(0xffffffffffffff9c, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_debug_messages', 0x42, 0x0) copy_file_range(r5, 0x0, r5, &(0x7f00000000c0)=0xc, 0x3, 0x0) 498.382972ms ago: executing program 7 (id=9403): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x0, 0x6}, [@IFLA_ADDRESS={0xa, 0x3, @random="08e7eebc872f"}, @IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x44}}, 0x0) r3 = socket(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000780)=[{{&(0x7f0000000440)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x1, 0x4000810) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r4, &(0x7f0000000340), 0x0, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e24, 0x0, @loopback, 0x1}}, 0x0, 0x0, 0x2, 0x0, "10baa70a93289349d889de25b87376f64276337642b890d33cb5b592266c5b98fb19402835fee1b3871b7ef6619db5b2a94edb6f73ea08b02aa3b47debd38b6d889a8c986b33eb49c3157f1f370dfd67"}, 0xd8) sendmmsg$inet6(r4, &(0x7f0000008e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x84) dup(r4) bind$tipc(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5, 0x0, 0x8000000000000}, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 369.767345ms ago: executing program 8 (id=9404): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b000000000000000000000000804dbc1258afbf026fc7c49c3fddc60a7465a67dcf3b0d158c4602b5928b09286995e01b9ab06be66c6597952636c350f008e34de3d4db65ec6e9ef071811c76b9fbbadc27cf42aa71cb4d3fe7096929cfc1013df84ef3fc65fb3303d145b82658ef8de5d12bb578f66ca8f860a8a7a0925d7aadd4a49da976d81b8fcfb46488768f038c9f54ec4d5b7666a0c6111646b71bd5b7cd7e327f6ad338e28f8276dca9639bfd8a85f949e9ec3dd455cfdc06f7b442b45e00bbbde4b765f3ebf9e2"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) ustat(0x3, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200)='t', 0x1) sendfile(r4, r3, 0x0, 0x3ffff) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x4004110) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4050000000000007110130000004fb48405000000000000d2e30036118e1b32"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x480d5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11e167, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r7}, 0x18) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) dup2(0xffffffffffffffff, r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 266.434585ms ago: executing program 7 (id=9405): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="1802000000000000000000000001000085100000010000009500000000000000184400000300000000000000000000008500000012000000950000000000000095"], &(0x7f0000000240)='GPL\x00', 0x9}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00'}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, r1, 0x11}, 0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f00000009c0)={'filter\x00', 0x7, 0x4, 0x3c8, 0x1d8, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x5}}}, {{@arp={@loopback, @loopback, 0xffffff00, 0xffffff00, 0x5, 0x4, {@mac=@multicast, {[0x0, 0xff, 0xff, 0xff, 0xff]}}, {@empty, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}}, 0x2, 0x0, 0x200, 0xb, 0xb, 0x9, 'pim6reg\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x0, 0x1b3}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xb, 0x2, 0x2}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, 0x0, 0xff000000, 0x7, 0xf, {@empty, {[0xff, 0x0, 0xff]}}, {@empty, {[0xff, 0xff, 0xff, 0xff]}}, 0x401, 0x15c, 0x3, 0x5, 0x6, 0x8, 'vlan0\x00', 'hsr0\x00', {0xff}, {}, 0x0, 0xb}, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x18000000, {0x10}}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) 210.40112ms ago: executing program 7 (id=9406): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) unshare(0xa000200) semtimedop(0x0, &(0x7f0000000040)=[{0x4, 0x6, 0x1000}], 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)=r3}, 0x20) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) unshare(0x20060400) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0xa14401, &(0x7f0000000000)={[{@errors_remount}, {@nodiscard}], [{@pcr={'pcr', 0x3d, 0x39}}]}, 0x8, 0x496, &(0x7f0000000540)="$eJzs3MtvVFUYAPDvTqflbSviA0SpopFobGlBZeECjCYsNDHqApe1LQQplNBqhBCtLnBpSIxb48KFiX+BK90YZWXiVveGhBg2oG6uuTP3ltthpvQxZazz+yXDnPuacz7OOTPn3NOZALrWYPZPErE1In6LiP765sITButPN69fHP/r+sXxJNL0zT+T2nk3rl8cL04trttSbMwt3F82c/7CqbGpqclz+fbw7OmzwzPnLzx78vTYickTk2dGDx06eGDkhedHn7vt2rMriDMr041dH07v3nn07cuvjR+7/M7P3yZF/AvieH8Fr97UYJN9PUXiyXbl8h+xrZROqvXnNzpVGJYsa5BZdfXW+n9/9ER1/lh/vPJJRwsHrKk0TdMNrQ/PpcD/WBKdLgHQGfnnfBIxN57Ngcvz+W5w7Uh9ApTFfTN/1I9Uo5Kf09swv22nbLZ1bO7vL7NHNNxPyX20RlkDAF3q+yP152Lsd2v8UamWzzucrw0NRMS9EbE9Iu6LiB0RcX9EPBARD0bEQ/NX9JYvb7YEVLNwkSQbcTWOfypXVxHeHWXjvxfzta2F479i9BcDPfnWtlr8vcnxk1OT+yPinojYF70bsu2RRfL44eVfP2t1bLA0/sseWf7FWDAvx9Vqww26ibHZsdXEXHbt44hd1WbxJ/MrAVnl7YyIXXtWlsfJp7/Z3erYneNfRHVl5SlLv4p4ql7/c9EQfyFZfH1yeGNMTe4fLlrF7a78cun1VvmvKv42yOp/c9P2Px//QFJer51Zfh6Xfv+05Zxyie2/r3xN1v77krdq6eLAB2Ozs+dGIvqSV/P9h/P9C/OrnTd66/ws/n17m/f/7XHrf+LhiMga8SMR8WhE7MnL/lhEPB4RexeJ/6eXnnh3GfEfPVvKd61l8U8sq/5bJoq17dsO9Zz68btSVdU/RFrFn0ST+j9YS+3L9yzl/W/Rkp5bTWsGAACA9acSEVsjqQzNpyuVoaH638vviM2VqemZ2WeOT793ZqL+HYGB6K0Ud7r65++HxtxIPq0v7o+ONmwfyO8bf75hU217aHx6aqLTwUOX29Ki/2f+6Ol06YA114Z1NGCdWmn/T9PUH6fCOufzH7qX/g/dq0n/39SwvchvBADrWdb/NzbsM7GH7mD8D91L/4fupf9D99L/oSvl34Sv1hJXImJpX5tvbyJ7/7nrma4ikaYdyr2vbS+YJqt9nah0rAqi0w1gmYl/8h/bzPZ8cVdz/3rll3f6nQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA9/g0AAP//eZHg/g==") syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file2\x00', 0x8, &(0x7f0000000080)={[{@nodioread_nolock}, {@sb={'sb', 0x3d, 0x1}}]}, 0x4, 0x523, &(0x7f00000018c0)="$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") r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5, 0x0, 0x3}, 0x18) r6 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0xfd, 0x3, 0x2, 0x5c, @local, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x40, 0x4, 0x4}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000340), 0x0}, 0x20) munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) 21.829948ms ago: executing program 7 (id=9407): fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000400)=0x3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18}, '\x00'}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r2, 0x80047453, &(0x7f00000019c0)) 0s ago: executing program 7 (id=9408): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0, 0x0, 0xd}, 0x18) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0) syz_read_part_table(0x4097, &(0x7f00000040c0)="$eJzsz7FN61AYBeDjxE5elCdFUFAioKF1FsgWWQchWIIOiTLDsANDUNBg5FwcZ4EIhL6v8Dn2//tKN/yo17FWSZ727a0+fOhNxpqcl5gnZ0murvPYtsm/eZJ1Gd0fdpu0627VH/A/Sf0y6aer+nu6TLa7094OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4TaqxPi9Lzkt8JJkeL3RHu4skd5uL2+H9oUmzuayGf/cms+H82bR/fnZFku3udDcCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP6gqi7ZLPLe582y/mJ/jm0YhIEwjF5iWwlLULMQS7B/Q3VIiIMJ6N7r/Ptz4bpqMT1dZuZvafd5zJ8xKv3X2uOatnoT/XvmVewZa773HQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBgBw4EAAAAAID8XxuhqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqCjtwQAIAAAAg6P/rdgQKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwEMBAAD//33UI0E=") kernel console output (not intermixed with test programs): 2][T30325] wg2: left promiscuous mode [ 911.059586][T30325] wg2: left allmulticast mode [ 911.075404][T30325] wg2: entered promiscuous mode [ 911.080488][T30325] wg2: entered allmulticast mode [ 911.113956][T30331] loop5: detected capacity change from 0 to 512 [ 911.226506][T30335] netlink: 'syz.2.8842': attribute type 3 has an invalid length. [ 911.234285][T30335] netlink: 132 bytes leftover after parsing attributes in process `syz.2.8842'. [ 911.294074][T30344] bridge: RTM_NEWNEIGH with invalid ether address [ 911.334876][T30349] loop5: detected capacity change from 0 to 256 [ 911.336689][T30348] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 911.388106][T30348] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 911.451884][T30348] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 911.478979][T30355] wg2: left promiscuous mode [ 911.483644][T30355] wg2: left allmulticast mode [ 911.494811][T30355] wg2: entered promiscuous mode [ 911.499692][T30355] wg2: entered allmulticast mode [ 911.513453][T30348] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 911.529317][T30358] loop5: detected capacity change from 0 to 512 [ 911.649671][T26972] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 911.679338][T26972] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 911.709869][T26972] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 911.718267][T26972] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 911.773985][T30369] $H: renamed from bond0 (while UP) [ 911.780960][T30369] $H: entered promiscuous mode [ 911.785989][T30369] bond_slave_0: entered promiscuous mode [ 911.791806][T30369] bond_slave_1: entered promiscuous mode [ 911.817026][T30371] vlan2: entered allmulticast mode [ 911.857245][T26972] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 911.902819][T26972] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 911.972315][T26972] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 912.007414][T30381] lo speed is unknown, defaulting to 1000 [ 912.053006][T26972] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 912.066126][T30381] chnl_net:caif_netlink_parms(): no params data found [ 912.105933][T30381] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.113122][T30381] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.120362][T30381] bridge_slave_0: entered allmulticast mode [ 912.126861][T30381] bridge_slave_0: entered promiscuous mode [ 912.135687][T30381] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.142835][T30381] bridge0: port 2(bridge_slave_1) entered disabled state [ 912.150070][T30381] bridge_slave_1: entered allmulticast mode [ 912.156446][T30381] bridge_slave_1: entered promiscuous mode [ 912.181544][T30381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 912.196048][T30381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 912.233283][T30381] team0: Port device team_slave_0 added [ 912.240030][T30381] team0: Port device team_slave_1 added [ 912.245837][T26972] bridge_slave_1: left allmulticast mode [ 912.251521][T26972] bridge_slave_1: left promiscuous mode [ 912.257266][T26972] bridge0: port 2(bridge_slave_1) entered disabled state [ 912.264862][T26972] bridge_slave_0: left promiscuous mode [ 912.270653][T26972] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.278273][T30409] FAULT_INJECTION: forcing a failure. [ 912.278273][T30409] name failslab, interval 1, probability 0, space 0, times 0 [ 912.278805][T26972] veth0_to_team: left allmulticast mode [ 912.291077][T30409] CPU: 1 UID: 0 PID: 30409 Comm: syz.9.8868 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 912.291163][T30409] Tainted: [W]=WARN [ 912.291169][T30409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 912.291233][T30409] Call Trace: [ 912.291239][T30409] [ 912.291248][T30409] __dump_stack+0x1d/0x30 [ 912.291269][T30409] dump_stack_lvl+0xe8/0x140 [ 912.291288][T30409] dump_stack+0x15/0x1b [ 912.291307][T30409] should_fail_ex+0x265/0x280 [ 912.291337][T30409] should_failslab+0x8c/0xb0 [ 912.291362][T30409] __kvmalloc_node_noprof+0x12e/0x670 [ 912.291392][T30409] ? xt_alloc_entry_offsets+0x4d/0x60 [ 912.291503][T30409] xt_alloc_entry_offsets+0x4d/0x60 [ 912.291531][T30409] translate_table+0xa9/0xf90 [ 912.291605][T30409] ? __rcu_read_unlock+0x4f/0x70 [ 912.291629][T30409] ? __memcg_slab_post_alloc_hook+0x44c/0x580 [ 912.291696][T30409] ? should_fail_ex+0xdb/0x280 [ 912.291768][T30409] ? _copy_from_user+0x89/0xb0 [ 912.291864][T30409] do_ipt_set_ctl+0x66f/0x820 [ 912.291881][T30409] ? _raw_spin_unlock_bh+0x36/0x40 [ 912.291903][T30409] ? tcp_release_cb+0xf1/0x370 [ 912.291990][T30409] nf_setsockopt+0x199/0x1b0 [ 912.292011][T30409] ip_setsockopt+0x102/0x110 [ 912.292038][T30409] tcp_setsockopt+0x98/0xb0 [ 912.292103][T30409] sock_common_setsockopt+0x69/0x80 [ 912.292125][T30409] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 912.292149][T30409] __sys_setsockopt+0x184/0x200 [ 912.292180][T30409] __x64_sys_setsockopt+0x64/0x80 [ 912.292207][T30409] x64_sys_call+0x20ec/0x3000 [ 912.292233][T30409] do_syscall_64+0xd2/0x200 [ 912.292250][T30409] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 912.292340][T30409] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 912.292445][T30409] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 912.292478][T30409] RIP: 0033:0x7f0f8e3aefc9 [ 912.292493][T30409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 912.292511][T30409] RSP: 002b:00007f0f8cdee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 912.292604][T30409] RAX: ffffffffffffffda RBX: 00007f0f8e606090 RCX: 00007f0f8e3aefc9 [ 912.292616][T30409] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000007 [ 912.292653][T30409] RBP: 00007f0f8cdee090 R08: 0000000000000468 R09: 0000000000000000 [ 912.292665][T30409] R10: 0000200000001640 R11: 0000000000000246 R12: 0000000000000001 [ 912.292677][T30409] R13: 00007f0f8e606128 R14: 00007f0f8e606090 R15: 00007fff17b647c8 [ 912.292695][T30409] [ 912.543650][T26972] veth0_to_team: left promiscuous mode [ 912.549193][T26972] : port 2(veth0_to_team) entered disabled state [ 912.556873][T26972] veth0_to_bridge: left allmulticast mode [ 912.562672][T26972] veth0_to_bridge: left promiscuous mode [ 912.568350][T26972] : port 1(veth0_to_bridge) entered disabled state [ 912.731853][T26972] $H (unregistering): (slave bond_slave_0): Releasing backup interface [ 912.740630][T26972] bond_slave_0: left promiscuous mode [ 912.747253][T26972] $H (unregistering): (slave bond_slave_1): Releasing backup interface [ 912.756416][T26972] bond_slave_1: left promiscuous mode [ 912.762611][T26972] $H (unregistering): Released all slaves [ 912.780093][T30381] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 912.787040][T30381] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 912.812989][T30381] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 912.826788][T30381] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 912.831057][T30411] loop6: detected capacity change from 0 to 512 [ 912.833869][T30381] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 912.866024][T30381] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 912.882155][T30411] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 912.894817][T30411] ext4 filesystem being mounted at /36/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 912.921172][T29714] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 912.930619][T30381] hsr_slave_0: entered promiscuous mode [ 912.936597][T30381] hsr_slave_1: entered promiscuous mode [ 912.952149][T30416] loop6: detected capacity change from 0 to 512 [ 912.959435][T26972] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 912.966891][T26972] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 912.983545][T26972] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 912.989110][T30419] 9pnet: Could not find request transport: fd0x0000000000000005 [ 912.991052][T26972] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 913.011341][T26972] veth1_macvtap: left promiscuous mode [ 913.017032][T26972] veth0_macvtap: left promiscuous mode [ 913.023586][T30416] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 913.036261][T30416] ext4 filesystem being mounted at /37/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 913.072578][T29714] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 913.100240][T26972] team0 (unregistering): Port device team_slave_1 removed [ 913.110756][T26972] team0 (unregistering): Port device team_slave_0 removed [ 913.455864][T30435] chnl_net:caif_netlink_parms(): no params data found [ 913.486830][T30435] bridge0: port 1(bridge_slave_0) entered blocking state [ 913.493997][T30435] bridge0: port 1(bridge_slave_0) entered disabled state [ 913.501209][T30435] bridge_slave_0: entered allmulticast mode [ 913.507612][T30435] bridge_slave_0: entered promiscuous mode [ 913.514303][T30435] bridge0: port 2(bridge_slave_1) entered blocking state [ 913.521390][T30435] bridge0: port 2(bridge_slave_1) entered disabled state [ 913.528576][T30435] bridge_slave_1: entered allmulticast mode [ 913.535195][T30435] bridge_slave_1: entered promiscuous mode [ 913.551531][T30435] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 913.562127][T30435] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 913.588845][T30435] team0: Port device team_slave_0 added [ 913.597693][T30435] team0: Port device team_slave_1 added [ 913.611891][T30381] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 913.621726][T30435] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 913.628656][T30435] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 913.654703][T30435] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 913.665935][T30435] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 913.672976][T30435] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 913.699016][T30435] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 913.709699][T30381] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 913.718244][T30381] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 913.729372][T30381] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 913.751953][T30435] hsr_slave_0: entered promiscuous mode [ 913.758014][T30435] hsr_slave_1: entered promiscuous mode [ 913.763895][T30435] debugfs: 'hsr0' already exists in 'hsr' [ 913.769600][T30435] Cannot create hsr debugfs directory [ 913.833570][T30381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 913.847823][T30381] 8021q: adding VLAN 0 to HW filter on device team0 [ 913.857754][ T7347] bridge0: port 1(bridge_slave_0) entered blocking state [ 913.864868][ T7347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 913.875720][ T7347] bridge0: port 2(bridge_slave_1) entered blocking state [ 913.882774][ T7347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 913.937430][T30381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 913.979604][T30466] loop6: detected capacity change from 0 to 256 [ 914.035519][T26972] bridge_slave_1: left allmulticast mode [ 914.041271][T26972] bridge_slave_1: left promiscuous mode [ 914.047042][T26972] bridge0: port 2(bridge_slave_1) entered disabled state [ 914.070291][T26972] bridge_slave_0: left promiscuous mode [ 914.075954][T26972] bridge0: port 1(bridge_slave_0) entered disabled state [ 914.085051][T26972] veth0_to_bridge: left allmulticast mode [ 914.090836][T26972] veth0_to_bridge: left promiscuous mode [ 914.096592][T26972] : port 1(veth0_to_bridge) entered disabled state [ 914.103748][T30478] netlink: 224 bytes leftover after parsing attributes in process `syz.9.8882'. [ 914.114564][T30480] FAULT_INJECTION: forcing a failure. [ 914.114564][T30480] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 914.127812][T30480] CPU: 1 UID: 0 PID: 30480 Comm: syz.6.8883 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 914.127844][T30480] Tainted: [W]=WARN [ 914.127851][T30480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 914.127863][T30480] Call Trace: [ 914.127870][T30480] [ 914.127878][T30480] __dump_stack+0x1d/0x30 [ 914.127927][T30480] dump_stack_lvl+0xe8/0x140 [ 914.127947][T30480] dump_stack+0x15/0x1b [ 914.128031][T30480] should_fail_ex+0x265/0x280 [ 914.128069][T30480] should_fail+0xb/0x20 [ 914.128084][T30480] should_fail_usercopy+0x1a/0x20 [ 914.128102][T30480] _copy_from_iter+0xd2/0xe80 [ 914.128194][T30480] ? __build_skb_around+0x1ab/0x200 [ 914.128220][T30480] ? __alloc_skb+0x223/0x320 [ 914.128252][T30480] netlink_sendmsg+0x471/0x6b0 [ 914.128272][T30480] ? __pfx_netlink_sendmsg+0x10/0x10 [ 914.128288][T30480] __sock_sendmsg+0x145/0x180 [ 914.128307][T30480] ____sys_sendmsg+0x31e/0x4e0 [ 914.128369][T30480] ___sys_sendmsg+0x17b/0x1d0 [ 914.128530][T30480] __x64_sys_sendmsg+0xd4/0x160 [ 914.128605][T30480] x64_sys_call+0x191e/0x3000 [ 914.128627][T30480] do_syscall_64+0xd2/0x200 [ 914.128645][T30480] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 914.128679][T30480] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 914.128706][T30480] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 914.128726][T30480] RIP: 0033:0x7fa41639efc9 [ 914.128741][T30480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 914.128766][T30480] RSP: 002b:00007fa414e07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 914.128784][T30480] RAX: ffffffffffffffda RBX: 00007fa4165f5fa0 RCX: 00007fa41639efc9 [ 914.128795][T30480] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 914.128807][T30480] RBP: 00007fa414e07090 R08: 0000000000000000 R09: 0000000000000000 [ 914.128817][T30480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.128899][T30480] R13: 00007fa4165f6038 R14: 00007fa4165f5fa0 R15: 00007ffc11a2a4a8 [ 914.128917][T30480] [ 914.358322][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 914.358347][ T29] audit: type=1400 audit(2147484562.329:61560): avc: denied { ioctl } for pid=30477 comm="syz.9.8882" path="socket:[132015]" dev="sockfs" ino=132015 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 914.391139][ T29] audit: type=1400 audit(2147484562.339:61561): avc: denied { connect } for pid=30481 comm="syz.6.8884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 914.451680][T26972] $H (unregistering): (slave bond_slave_0): Releasing backup interface [ 914.460362][T26972] bond_slave_0: left promiscuous mode [ 914.466720][T26972] $H (unregistering): (slave bond_slave_1): Releasing backup interface [ 914.475617][T26972] bond_slave_1: left promiscuous mode [ 914.481313][T26972] $H (unregistering): Released all slaves [ 914.489942][T30478] team0: entered promiscuous mode [ 914.494978][T30478] team_slave_0: entered promiscuous mode [ 914.500883][T30478] team_slave_1: entered promiscuous mode [ 914.529289][T30477] team0: left promiscuous mode [ 914.534147][T30477] team_slave_0: left promiscuous mode [ 914.539730][T30477] team_slave_1: left promiscuous mode [ 914.546803][T30492] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8885'. [ 914.552101][T30381] veth0_vlan: entered promiscuous mode [ 914.572006][T30381] veth1_vlan: entered promiscuous mode [ 914.591205][T30496] vlan2: entered allmulticast mode [ 914.604582][T26972] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 914.613101][T26972] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 914.640816][T26972] team0 (unregistering): Port device team_slave_1 removed [ 914.650497][T26972] team0 (unregistering): Port device team_slave_0 removed [ 914.657908][T26978] smc: removing ib device syz! [ 914.682002][T30498] bridge: RTM_NEWNEIGH with invalid ether address [ 914.698572][T30381] veth0_macvtap: entered promiscuous mode [ 914.727513][T30381] veth1_macvtap: entered promiscuous mode [ 914.738331][T30381] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 914.747815][T30500] 9pnet_fd: Insufficient options for proto=fd [ 914.748865][T30381] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 914.770774][T30435] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 914.787450][T30435] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 914.798425][T30435] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 914.828643][T30435] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 914.837545][ T7347] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 914.855635][ T7347] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 914.865197][ T7347] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 914.876283][ T7347] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 914.914900][T30435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 914.927630][T30512] wg2: entered promiscuous mode [ 914.932662][T30512] wg2: entered allmulticast mode [ 914.940982][T30435] 8021q: adding VLAN 0 to HW filter on device team0 [ 914.951816][T26975] bridge0: port 1(bridge_slave_0) entered blocking state [ 914.958959][T26975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 914.975332][ T7347] bridge0: port 2(bridge_slave_1) entered blocking state [ 914.982411][ T7347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 915.076931][T30435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 915.087847][T26972] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 915.134898][T26972] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 915.189735][T26972] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 915.199686][T30522] loop8: detected capacity change from 0 to 32768 [ 915.230624][T30519] chnl_net:caif_netlink_parms(): no params data found [ 915.239003][T30435] veth0_vlan: entered promiscuous mode [ 915.250337][T30522] loop8: p1 p2 p3 < > p4 < p5 p6 > [ 915.255663][T30522] loop8: p1 start 460800 is beyond EOD, truncated [ 915.262185][T30522] loop8: p2 size 83886080 extends beyond EOD, truncated [ 915.270740][T30522] loop8: p5 start 460800 is beyond EOD, truncated [ 915.273028][T30435] veth1_vlan: entered promiscuous mode [ 915.277206][T30522] loop8: p6 size 83886080 extends beyond EOD, truncated [ 915.303297][T26972] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 915.322046][T30519] bridge0: port 1(bridge_slave_0) entered blocking state [ 915.329112][T30519] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.336358][T30519] bridge_slave_0: entered allmulticast mode [ 915.343319][T30519] bridge_slave_0: entered promiscuous mode [ 915.355702][T30435] veth0_macvtap: entered promiscuous mode [ 915.367005][T30519] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.374172][T30519] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.377690][T30543] loop8: detected capacity change from 0 to 128 [ 915.381630][T30519] bridge_slave_1: entered allmulticast mode [ 915.389275][T30543] EXT4-fs (loop8): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 915.394847][T30519] bridge_slave_1: entered promiscuous mode [ 915.405789][T30543] ext4 filesystem being mounted at /2/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 915.416283][T30435] veth1_macvtap: entered promiscuous mode [ 915.436387][T26972] bridge_slave_1: left allmulticast mode [ 915.442178][T26972] bridge_slave_1: left promiscuous mode [ 915.447853][T26972] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.456308][T26972] bridge_slave_0: left promiscuous mode [ 915.462067][T26972] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.555000][T26972] $H (unregistering): (slave bond_slave_0): Releasing backup interface [ 915.563823][T26972] bond_slave_0: left promiscuous mode [ 915.570550][T26972] $H (unregistering): (slave bond_slave_1): Releasing backup interface [ 915.579391][T26972] bond_slave_1: left promiscuous mode [ 915.585484][T26972] $H (unregistering): Released all slaves [ 915.598132][T30519] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 915.659985][T30546] EXT4-fs warning (device loop8): verify_group_input:137: Cannot add at group 3 (only 1 groups) [ 915.679892][ T29] audit: type=1400 audit(2147484563.629:61562): avc: denied { map } for pid=30542 comm="syz.8.8894" path="socket:[133062]" dev="sockfs" ino=133062 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 915.764586][T30519] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 915.803361][T30435] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 915.847158][T30519] team0: Port device team_slave_0 added [ 915.874826][T30519] team0: Port device team_slave_1 added [ 915.888763][T30548] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8895'. [ 915.906155][T30435] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 915.929665][T30519] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 915.936675][T30519] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 915.962758][T30519] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 915.976076][T30519] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 915.983053][T30519] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 916.009207][T30519] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 916.026031][ T1765] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 916.050687][T30552] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8896'. [ 916.062881][T30519] hsr_slave_0: entered promiscuous mode [ 916.068869][T30519] hsr_slave_1: entered promiscuous mode [ 916.074915][T30519] debugfs: 'hsr0' already exists in 'hsr' [ 916.080711][T30519] Cannot create hsr debugfs directory [ 916.086228][ T1765] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 916.095068][ T1765] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 916.110297][ T1765] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 916.122637][T26972] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 916.130133][T26972] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 916.137673][T26972] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 916.145160][T26972] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 916.154878][T26972] veth1_macvtap: left promiscuous mode [ 916.160786][T26972] veth0_macvtap: left promiscuous mode [ 916.166363][T26972] veth1_vlan: left promiscuous mode [ 916.171672][T26972] veth0_vlan: left promiscuous mode [ 916.242103][T26972] team0 (unregistering): Port device team_slave_1 removed [ 916.251894][T26972] team0 (unregistering): Port device team_slave_0 removed [ 916.276734][T30381] EXT4-fs (loop8): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 916.296157][T30560] 9pnet_fd: Insufficient options for proto=fd [ 916.331622][ T29] audit: type=1326 audit(2147484564.299:61563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30561 comm="syz.8.8899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 916.355228][ T29] audit: type=1326 audit(2147484564.299:61564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30561 comm="syz.8.8899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 916.378871][ T29] audit: type=1326 audit(2147484564.299:61565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30561 comm="syz.8.8899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 916.402844][ T29] audit: type=1326 audit(2147484564.299:61566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30561 comm="syz.8.8899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 916.426716][ T29] audit: type=1326 audit(2147484564.299:61567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30561 comm="syz.8.8899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 916.450355][ T29] audit: type=1326 audit(2147484564.299:61568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30561 comm="syz.8.8899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 916.474131][ T29] audit: type=1326 audit(2147484564.299:61569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30561 comm="syz.8.8899" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 916.636729][T30571] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8904'. [ 916.648940][T30571] hsr_slave_0: left promiscuous mode [ 916.656076][T30571] hsr_slave_1: left promiscuous mode [ 916.693797][T30579] netlink: 'syz.8.8908': attribute type 6 has an invalid length. [ 916.836145][T30576] chnl_net:caif_netlink_parms(): no params data found [ 916.872689][T30582] chnl_net:caif_netlink_parms(): no params data found [ 916.902256][T30576] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.909316][T30576] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.916626][T30576] bridge_slave_0: entered allmulticast mode [ 916.923202][T30576] bridge_slave_0: entered promiscuous mode [ 916.937478][T30576] bridge0: port 2(bridge_slave_1) entered blocking state [ 916.944640][T30576] bridge0: port 2(bridge_slave_1) entered disabled state [ 916.951850][T30576] bridge_slave_1: entered allmulticast mode [ 916.958351][T30576] bridge_slave_1: entered promiscuous mode [ 916.986869][T30576] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 916.997320][T30576] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 917.029374][T30582] bridge0: port 1(bridge_slave_0) entered blocking state [ 917.036493][T30582] bridge0: port 1(bridge_slave_0) entered disabled state [ 917.043878][T30582] bridge_slave_0: entered allmulticast mode [ 917.050388][T30582] bridge_slave_0: entered promiscuous mode [ 917.058054][T30582] bridge0: port 2(bridge_slave_1) entered blocking state [ 917.065226][T30582] bridge0: port 2(bridge_slave_1) entered disabled state [ 917.072451][T30582] bridge_slave_1: entered allmulticast mode [ 917.078807][T30582] bridge_slave_1: entered promiscuous mode [ 917.088268][T30576] team0: Port device team_slave_0 added [ 917.096250][T30576] team0: Port device team_slave_1 added [ 917.113048][T30519] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 917.121357][T30519] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 917.142575][T30519] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 917.151367][T30576] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 917.158548][T30576] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 917.184587][T30576] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 917.196413][T30582] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 917.205599][T30519] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 917.215800][T30576] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 917.222963][T30576] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 917.249061][T30576] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 917.261552][T30582] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 917.284154][T30582] team0: Port device team_slave_0 added [ 917.292212][T30582] team0: Port device team_slave_1 added [ 917.313599][T30582] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 917.320579][T30582] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 917.346563][T30582] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 917.365842][T30582] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 917.372853][T30582] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 917.398744][T30582] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 917.411735][T30576] hsr_slave_0: entered promiscuous mode [ 917.417721][T30576] hsr_slave_1: entered promiscuous mode [ 917.423759][T30576] debugfs: 'hsr0' already exists in 'hsr' [ 917.429459][T30576] Cannot create hsr debugfs directory [ 917.468361][T26972] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 917.494510][T30582] hsr_slave_0: entered promiscuous mode [ 917.500713][T30582] hsr_slave_1: entered promiscuous mode [ 917.506505][T30582] debugfs: 'hsr0' already exists in 'hsr' [ 917.512253][T30582] Cannot create hsr debugfs directory [ 917.523146][T26972] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 917.573947][T26972] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 917.615186][T30519] 8021q: adding VLAN 0 to HW filter on device bond0 [ 917.629371][T30519] 8021q: adding VLAN 0 to HW filter on device team0 [ 917.639318][T26978] bridge0: port 1(bridge_slave_0) entered blocking state [ 917.646394][T26978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 917.656996][T26978] bridge0: port 2(bridge_slave_1) entered blocking state [ 917.664081][T26978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 917.673816][T26972] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 917.730764][T30519] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 917.755139][T26972] batadv1: left allmulticast mode [ 917.760468][T26972] batadv1: left promiscuous mode [ 917.765507][T26972] bridge0: port 3(batadv1) entered disabled state [ 917.772662][T26972] bridge_slave_1: left allmulticast mode [ 917.778292][T26972] bridge_slave_1: left promiscuous mode [ 917.784028][T26972] bridge0: port 2(bridge_slave_1) entered disabled state [ 917.792122][T26972] bridge_slave_0: left promiscuous mode [ 917.797788][T26972] bridge0: port 1(bridge_slave_0) entered disabled state [ 917.806209][T26972] bridge_slave_1: left allmulticast mode [ 917.811970][T26972] bridge_slave_1: left promiscuous mode [ 917.817568][T26972] bridge0: port 2(bridge_slave_1) entered disabled state [ 917.825231][T26972] bridge_slave_0: left promiscuous mode [ 917.830958][T26972] bridge0: port 1(bridge_slave_0) entered disabled state [ 917.961703][T26972] $H (unregistering): (slave bond_slave_0): Releasing backup interface [ 917.970557][T26972] bond_slave_0: left promiscuous mode [ 917.976531][T26972] $H (unregistering): (slave bond_slave_1): Releasing backup interface [ 917.985515][T26972] bond_slave_1: left promiscuous mode [ 917.991297][T26972] $H (unregistering): Released all slaves [ 918.041910][T26972] $H (unregistering): (slave bond_slave_0): Releasing backup interface [ 918.051110][T26972] bond_slave_0: left promiscuous mode [ 918.057459][T26972] $H (unregistering): (slave bond_slave_1): Releasing backup interface [ 918.066563][T26972] bond_slave_1: left promiscuous mode [ 918.072494][T26972] $H (unregistering): Released all slaves [ 918.111337][T30519] veth0_vlan: entered promiscuous mode [ 918.118605][T30519] veth1_vlan: entered promiscuous mode [ 918.128265][T26972] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 918.136218][T26972] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 918.145070][T26972] hsr_slave_0: left promiscuous mode [ 918.150843][T26972] hsr_slave_1: left promiscuous mode [ 918.156337][T26972] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 918.163935][T26972] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 918.171450][T26972] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 918.178801][T26972] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 918.188708][T26972] veth1_macvtap: left promiscuous mode [ 918.194377][T26972] veth0_macvtap: left promiscuous mode [ 918.200039][T26972] veth1_vlan: left promiscuous mode [ 918.205274][T26972] veth0_vlan: left promiscuous mode [ 918.250460][T26972] team0 (unregistering): Port device team_slave_1 removed [ 918.259488][T26972] team0 (unregistering): Port device team_slave_0 removed [ 918.303533][T26972] team0 (unregistering): Port device team_slave_1 removed [ 918.312627][T26972] team0 (unregistering): Port device team_slave_0 removed [ 918.358158][T30576] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 918.366886][T30576] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 918.375442][T30576] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 918.383842][T30576] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 918.392271][T30519] veth0_macvtap: entered promiscuous mode [ 918.400580][T30519] veth1_macvtap: entered promiscuous mode [ 918.414913][T30519] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 918.428926][T30519] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 918.442246][T26973] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.453668][T26973] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.463169][T26973] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.476115][T26973] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.498937][T30576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 918.510421][T30576] 8021q: adding VLAN 0 to HW filter on device team0 [ 918.520635][ T1765] bridge0: port 1(bridge_slave_0) entered blocking state [ 918.527788][ T1765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 918.536516][T30642] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 918.549189][ T7347] bridge0: port 2(bridge_slave_1) entered blocking state [ 918.556279][ T7347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 918.565853][T30644] $H: renamed from bond0 (while UP) [ 918.573084][T30644] $H: entered promiscuous mode [ 918.578199][T30644] bond_slave_0: entered promiscuous mode [ 918.584122][T30644] bond_slave_1: entered promiscuous mode [ 918.616119][T30647] loop1: detected capacity change from 0 to 512 [ 918.632829][T30647] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 918.645407][T30647] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 918.651872][T30576] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 918.675862][T30519] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 918.714096][T30582] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 918.731855][T30582] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 918.738717][T30663] loop3: detected capacity change from 0 to 512 [ 918.748167][T30582] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 918.757634][T30582] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 918.765985][T30663] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 918.779383][T30663] ext4 filesystem being mounted at /3/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 918.793383][T30675] 9pnet_fd: Insufficient options for proto=fd [ 918.829560][T30663] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 918.840604][T30582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 918.855375][T30582] 8021q: adding VLAN 0 to HW filter on device team0 [ 918.868495][T26973] bridge0: port 1(bridge_slave_0) entered blocking state [ 918.875610][T26973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 918.896250][T30682] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 918.908775][T26973] bridge0: port 2(bridge_slave_1) entered blocking state [ 918.915845][T26973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 918.930305][T30576] veth0_vlan: entered promiscuous mode [ 918.946945][T30576] veth1_vlan: entered promiscuous mode [ 918.957824][T30582] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 918.968326][T30582] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 918.995957][T30576] veth0_macvtap: entered promiscuous mode [ 919.015510][T30576] veth1_macvtap: entered promiscuous mode [ 919.036814][T30576] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 919.064994][T30582] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 919.075653][T30576] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 919.087981][T26973] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.104325][T26973] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.133649][T26973] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.164289][T26973] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.242255][T30719] 9pnet_fd: Insufficient options for proto=fd [ 919.301547][T30582] veth0_vlan: entered promiscuous mode [ 919.311056][T30582] veth1_vlan: entered promiscuous mode [ 919.331041][T30582] veth0_macvtap: entered promiscuous mode [ 919.338706][T30582] veth1_macvtap: entered promiscuous mode [ 919.359862][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 919.359904][ T29] audit: type=1326 audit(2147484567.329:61692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.371606][T30582] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 919.389754][ T29] audit: type=1326 audit(2147484567.329:61693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.420567][ T29] audit: type=1326 audit(2147484567.329:61694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.444161][ T29] audit: type=1326 audit(2147484567.329:61695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.467776][ T29] audit: type=1326 audit(2147484567.329:61696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.491363][ T29] audit: type=1326 audit(2147484567.329:61697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.503149][T30582] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 919.514998][ T29] audit: type=1326 audit(2147484567.329:61698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.545820][ T29] audit: type=1326 audit(2147484567.329:61699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.569455][ T29] audit: type=1326 audit(2147484567.329:61700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.593184][ T29] audit: type=1326 audit(2147484567.329:61701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30724 comm="syz.1.8929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 919.610755][T30740] loop1: detected capacity change from 0 to 1024 [ 919.630239][T26973] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.641264][T30740] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 919.657608][T26973] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.671855][T30736] wg2: entered promiscuous mode [ 919.676788][T30736] wg2: entered allmulticast mode [ 919.684259][T26973] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.707130][ T1765] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.733855][T30752] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 919.753916][T30752] netlink: 36 bytes leftover after parsing attributes in process `syz.1.8934'. [ 919.762973][T30752] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8934'. [ 919.772012][T30752] netlink: 36 bytes leftover after parsing attributes in process `syz.1.8934'. [ 919.782520][T30752] netlink: 36 bytes leftover after parsing attributes in process `syz.1.8934'. [ 919.818594][T27296] hid_parser_main: 48 callbacks suppressed [ 919.818612][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.831860][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.839237][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.846746][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.854151][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.861544][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.868951][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.876378][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.883772][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.891249][T27296] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 [ 919.908833][T27296] hid-generic 0000:0000:0000.003A: hidraw0: HID v8.00 Device [syz0] on syz0 [ 919.922842][T30768] netlink: 'syz.8.8942': attribute type 6 has an invalid length. [ 919.935014][T30770] serio: Serial port ptm1 [ 919.957047][T26131] hid-generic 0000:0000:0000.003B: hidraw0: HID v8.00 Device [syz0] on syz0 [ 919.995863][T26131] hid-generic 0000:0000:0000.003C: hidraw0: HID v8.00 Device [syz0] on syz0 [ 920.025822][T30785] FAULT_INJECTION: forcing a failure. [ 920.025822][T30785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 920.039025][T30785] CPU: 0 UID: 0 PID: 30785 Comm: syz.3.8949 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 920.039077][T30785] Tainted: [W]=WARN [ 920.039084][T30785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 920.039112][T30785] Call Trace: [ 920.039118][T30785] [ 920.039126][T30785] __dump_stack+0x1d/0x30 [ 920.039223][T30785] dump_stack_lvl+0xe8/0x140 [ 920.039243][T30785] dump_stack+0x15/0x1b [ 920.039261][T30785] should_fail_ex+0x265/0x280 [ 920.039308][T30785] should_fail+0xb/0x20 [ 920.039395][T30785] should_fail_usercopy+0x1a/0x20 [ 920.039414][T30785] copy_to_user_nofault+0x7f/0x120 [ 920.039431][T30785] bpf_probe_write_user+0x83/0xc0 [ 920.039499][T30785] bpf_prog_f26ae291ee3ebee3+0x41/0x49 [ 920.039517][T30785] bpf_trace_run2+0x107/0x1c0 [ 920.039550][T30785] __bpf_trace_sys_enter+0x10/0x30 [ 920.039572][T30785] trace_sys_enter+0x86/0xf0 [ 920.039614][T30785] syscall_trace_enter+0x13e/0x1e0 [ 920.039639][T30785] do_syscall_64+0xac/0x200 [ 920.039657][T30785] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 920.039678][T30785] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 920.039760][T30785] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 920.039860][T30785] RIP: 0033:0x7fbc25c1efc9 [ 920.039872][T30785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 920.039892][T30785] RSP: 002b:00007fbc2467f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 920.039908][T30785] RAX: ffffffffffffffda RBX: 00007fbc25e75fa0 RCX: 00007fbc25c1efc9 [ 920.039921][T30785] RDX: 0000000000000042 RSI: 0000200000000240 RDI: ffffffffffffff9c [ 920.039934][T30785] RBP: 00007fbc2467f090 R08: 0000000000000000 R09: 0000000000000000 [ 920.039946][T30785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.039956][T30785] R13: 00007fbc25e76038 R14: 00007fbc25e75fa0 R15: 00007ffe7f92d328 [ 920.039983][T30785] [ 920.277555][T30789] wg2: entered promiscuous mode [ 920.282616][T30789] wg2: entered allmulticast mode [ 920.298761][T30793] netlink: 24 bytes leftover after parsing attributes in process `syz.8.8952'. [ 920.365546][T30795] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 920.432756][T30519] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 920.480393][T30804] $H: renamed from bond0 (while UP) [ 920.488875][T30804] $H: entered promiscuous mode [ 920.494036][T30804] bond_slave_0: entered promiscuous mode [ 920.499909][T30804] bond_slave_1: entered promiscuous mode [ 920.512389][T30810] loop9: detected capacity change from 0 to 7 [ 920.518826][T30810] Buffer I/O error on dev loop9, logical block 0, async page read [ 920.526839][T30810] Buffer I/O error on dev loop9, logical block 0, async page read [ 920.534847][T30810] loop9: unable to read partition table [ 920.540677][T30810] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 920.540677][T30810] ) failed (rc=-5) [ 920.553822][T30812] wg2: left promiscuous mode [ 920.558448][T30812] wg2: left allmulticast mode [ 920.729141][T30829] FAULT_INJECTION: forcing a failure. [ 920.729141][T30829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 920.742395][T30829] CPU: 0 UID: 0 PID: 30829 Comm: syz.4.8967 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 920.742424][T30829] Tainted: [W]=WARN [ 920.742431][T30829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 920.742443][T30829] Call Trace: [ 920.742449][T30829] [ 920.742457][T30829] __dump_stack+0x1d/0x30 [ 920.742486][T30829] dump_stack_lvl+0xe8/0x140 [ 920.742580][T30829] dump_stack+0x15/0x1b [ 920.742597][T30829] should_fail_ex+0x265/0x280 [ 920.742636][T30829] should_fail+0xb/0x20 [ 920.742653][T30829] should_fail_usercopy+0x1a/0x20 [ 920.742674][T30829] _copy_from_user+0x1c/0xb0 [ 920.742699][T30829] ___sys_sendmsg+0xc1/0x1d0 [ 920.742826][T30829] __x64_sys_sendmsg+0xd4/0x160 [ 920.742861][T30829] x64_sys_call+0x191e/0x3000 [ 920.742885][T30829] do_syscall_64+0xd2/0x200 [ 920.742902][T30829] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 920.742957][T30829] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 920.743031][T30829] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 920.743065][T30829] RIP: 0033:0x7f45e6d3efc9 [ 920.743081][T30829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 920.743174][T30829] RSP: 002b:00007f45e57a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 920.743264][T30829] RAX: ffffffffffffffda RBX: 00007f45e6f95fa0 RCX: 00007f45e6d3efc9 [ 920.743277][T30829] RDX: 0000000004040084 RSI: 0000200000000c80 RDI: 0000000000000004 [ 920.743331][T30829] RBP: 00007f45e57a7090 R08: 0000000000000000 R09: 0000000000000000 [ 920.743343][T30829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.743360][T30829] R13: 00007f45e6f96038 R14: 00007f45e6f95fa0 R15: 00007ffc82645518 [ 920.743378][T30829] [ 921.137468][T30848] netlink: 'syz.4.8974': attribute type 6 has an invalid length. [ 921.603132][T30859] loop1: detected capacity change from 0 to 128 [ 921.621613][T30861] 9pnet_fd: Insufficient options for proto=fd [ 921.697854][T30863] rtc_cmos 00:00: Alarms can be up to one day in the future [ 921.707929][T26131] rtc_cmos 00:00: Alarms can be up to one day in the future [ 921.715490][T26131] rtc_cmos 00:00: Alarms can be up to one day in the future [ 921.723051][T26131] rtc_cmos 00:00: Alarms can be up to one day in the future [ 921.730654][T26131] rtc_cmos 00:00: Alarms can be up to one day in the future [ 921.737927][T26131] rtc rtc0: __rtc_set_alarm: err=-22 [ 921.749536][T30863] netlink: 20 bytes leftover after parsing attributes in process `syz.8.8978'. [ 921.759088][T30863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30863 comm=syz.8.8978 [ 921.759311][T30859] bio_check_eod: 74 callbacks suppressed [ 921.759323][T30859] syz.1.8976: attempt to access beyond end of device [ 921.759323][T30859] loop1: rw=2049, sector=145, nr_sectors = 16 limit=128 [ 921.791141][T30859] syz.1.8976: attempt to access beyond end of device [ 921.791141][T30859] loop1: rw=2049, sector=169, nr_sectors = 8 limit=128 [ 921.804642][T30859] syz.1.8976: attempt to access beyond end of device [ 921.804642][T30859] loop1: rw=2049, sector=185, nr_sectors = 8 limit=128 [ 921.818495][T30859] syz.1.8976: attempt to access beyond end of device [ 921.818495][T30859] loop1: rw=2049, sector=201, nr_sectors = 8 limit=128 [ 921.844692][T30859] syz.1.8976: attempt to access beyond end of device [ 921.844692][T30859] loop1: rw=2049, sector=217, nr_sectors = 8 limit=128 [ 921.858328][T30859] syz.1.8976: attempt to access beyond end of device [ 921.858328][T30859] loop1: rw=2049, sector=233, nr_sectors = 8 limit=128 [ 921.872077][T30859] syz.1.8976: attempt to access beyond end of device [ 921.872077][T30859] loop1: rw=2049, sector=249, nr_sectors = 8 limit=128 [ 921.885945][T30859] syz.1.8976: attempt to access beyond end of device [ 921.885945][T30859] loop1: rw=2049, sector=265, nr_sectors = 8 limit=128 [ 921.899889][T30859] syz.1.8976: attempt to access beyond end of device [ 921.899889][T30859] loop1: rw=2049, sector=281, nr_sectors = 8 limit=128 [ 921.913527][T30859] syz.1.8976: attempt to access beyond end of device [ 921.913527][T30859] loop1: rw=2049, sector=297, nr_sectors = 8 limit=128 [ 921.949521][T30869] bridge: RTM_NEWNEIGH with invalid ether address [ 922.141895][T30882] loop3: detected capacity change from 0 to 164 [ 922.149025][T30882] ISOFS: unable to read i-node block [ 922.154769][T30882] ISOFS: root inode is unusable. Disabling Rock Ridge and switching to Joliet. [ 922.189223][T30883] wg2: entered promiscuous mode [ 922.194311][T30883] wg2: entered allmulticast mode [ 922.227949][T30882] netlink: 32 bytes leftover after parsing attributes in process `syz.3.8987'. [ 922.351581][T30891] wg2: left promiscuous mode [ 922.356212][T30891] wg2: left allmulticast mode [ 922.372342][T27300] hid-generic 0000:0000:0000.003D: hidraw0: HID v8.00 Device [syz0] on syz0 [ 922.427489][T30901] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 922.451891][T26975] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.513944][T26975] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.570836][T30915] FAULT_INJECTION: forcing a failure. [ 922.570836][T30915] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 922.583941][T30915] CPU: 1 UID: 0 PID: 30915 Comm: syz.4.9001 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 922.584039][T30915] Tainted: [W]=WARN [ 922.584046][T30915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 922.584058][T30915] Call Trace: [ 922.584066][T30915] [ 922.584074][T30915] __dump_stack+0x1d/0x30 [ 922.584096][T30915] dump_stack_lvl+0xe8/0x140 [ 922.584116][T30915] dump_stack+0x15/0x1b [ 922.584150][T30915] should_fail_ex+0x265/0x280 [ 922.584180][T30915] should_fail+0xb/0x20 [ 922.584197][T30915] should_fail_usercopy+0x1a/0x20 [ 922.584217][T30915] _copy_from_user+0x1c/0xb0 [ 922.584303][T30915] ___sys_sendmsg+0xc1/0x1d0 [ 922.584349][T30915] __x64_sys_sendmsg+0xd4/0x160 [ 922.584381][T30915] x64_sys_call+0x191e/0x3000 [ 922.584415][T30915] do_syscall_64+0xd2/0x200 [ 922.584433][T30915] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 922.584460][T30915] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 922.584487][T30915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 922.584533][T30915] RIP: 0033:0x7f45e6d3efc9 [ 922.584548][T30915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 922.584565][T30915] RSP: 002b:00007f45e57a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 922.584656][T30915] RAX: ffffffffffffffda RBX: 00007f45e6f95fa0 RCX: 00007f45e6d3efc9 [ 922.584669][T30915] RDX: 000000003000d041 RSI: 0000200000000080 RDI: 0000000000000003 [ 922.584681][T30915] RBP: 00007f45e57a7090 R08: 0000000000000000 R09: 0000000000000000 [ 922.584693][T30915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 922.584706][T30915] R13: 00007f45e6f96038 R14: 00007f45e6f95fa0 R15: 00007ffc82645518 [ 922.584723][T30915] [ 922.764769][ T4021] hid-generic 0000:0000:0000.003E: hidraw0: HID v8.00 Device [syz0] on syz0 [ 922.810231][T26975] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.875721][T30933] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 922.888559][T26975] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.024542][T26975] bridge_slave_1: left allmulticast mode [ 923.030221][T26975] bridge_slave_1: left promiscuous mode [ 923.035947][T26975] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.048096][T30950] netlink: 'syz.7.9013': attribute type 3 has an invalid length. [ 923.050129][T26975] bridge_slave_0: left allmulticast mode [ 923.055856][T30950] netlink: 132 bytes leftover after parsing attributes in process `syz.7.9013'. [ 923.061744][T30950] loop7: detected capacity change from 0 to 256 [ 923.070848][T26975] bridge_slave_0: left promiscuous mode [ 923.082768][T26975] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.174941][ T1049] hid-generic 0000:0000:0000.003F: hidraw0: HID v8.00 Device [syz0] on syz0 [ 923.203932][T30957] serio: Serial port ptm0 [ 923.211318][T30959] 9pnet_fd: Insufficient options for proto=fd [ 923.223057][T26975] $H (unregistering): (slave bond_slave_0): Releasing backup interface [ 923.232129][T26975] bond_slave_0: left promiscuous mode [ 923.239449][T26975] $H (unregistering): (slave bond_slave_1): Releasing backup interface [ 923.248564][T26975] bond_slave_1: left promiscuous mode [ 923.254276][ T1049] hid-generic 0000:0000:0000.0040: hidraw0: HID v8.00 Device [syz0] on syz0 [ 923.260615][T26975] $H (unregistering): Released all slaves [ 923.283409][T30953] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.299913][T30964] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 923.324791][T26975] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 923.332540][T26975] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 923.342980][T26975] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 923.350526][T26975] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 923.360730][T26975] veth1_macvtap: left promiscuous mode [ 923.366249][T26975] veth0_macvtap: left promiscuous mode [ 923.372070][T26975] veth1_vlan: left promiscuous mode [ 923.377316][T26975] veth0_vlan: left promiscuous mode [ 923.437238][T26975] team0 (unregistering): Port device team_slave_1 removed [ 923.448233][T26975] team0 (unregistering): Port device team_slave_0 removed [ 923.693306][T30911] chnl_net:caif_netlink_parms(): no params data found [ 923.748464][T30911] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.755565][T30911] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.763139][T30911] bridge_slave_0: entered allmulticast mode [ 923.769881][T30911] bridge_slave_0: entered promiscuous mode [ 923.802183][T30911] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.809337][T30911] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.821575][T30911] bridge_slave_1: entered allmulticast mode [ 923.828174][T30911] bridge_slave_1: entered promiscuous mode [ 923.845610][T30911] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 923.855869][T30911] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 923.873551][T30911] team0: Port device team_slave_0 added [ 923.880159][T30911] team0: Port device team_slave_1 added [ 923.897937][T30911] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 923.905038][T30911] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 923.931071][T30911] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 923.942590][T30911] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 923.949571][T30911] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 923.975643][T30911] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 924.002102][T30911] hsr_slave_0: entered promiscuous mode [ 924.008192][T30911] hsr_slave_1: entered promiscuous mode [ 924.014307][T30911] debugfs: 'hsr0' already exists in 'hsr' [ 924.020069][T30911] Cannot create hsr debugfs directory [ 924.062562][T27300] hid-generic 0000:0000:0000.0041: hidraw0: HID v8.00 Device [syz0] on syz0 [ 924.209449][T31004] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9029'. [ 924.218634][T31004] hsr_slave_0: left promiscuous mode [ 924.224897][T31004] hsr_slave_1: left promiscuous mode [ 924.304304][T31007] wg2: left promiscuous mode [ 924.308931][T31007] wg2: left allmulticast mode [ 924.334068][T31009] vlan2: entered allmulticast mode [ 924.354761][T30911] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 924.363370][T30911] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 924.374948][T30911] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 924.383701][T30911] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 924.418434][T30911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 924.430706][T30911] 8021q: adding VLAN 0 to HW filter on device team0 [ 924.439643][T26975] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.446706][T26975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.462062][T26975] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.469124][T26975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.529761][T30911] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 924.596610][T30911] veth0_vlan: entered promiscuous mode [ 924.604347][T30911] veth1_vlan: entered promiscuous mode [ 924.619004][T30911] veth0_macvtap: entered promiscuous mode [ 924.626790][T30911] veth1_macvtap: entered promiscuous mode [ 924.637998][T30911] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 924.649247][T30911] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 924.660562][T26975] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.673878][T26975] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.691624][T26975] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.703992][T26975] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.704675][T31034] loop8: detected capacity change from 0 to 512 [ 924.731896][ T29] kauditd_printk_skb: 360 callbacks suppressed [ 924.731910][ T29] audit: type=1326 audit(2147484572.709:62062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31036 comm="syz.0.8996" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f3eb325efc9 code=0x0 [ 924.741320][T31034] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 924.773675][T31034] ext4 filesystem being mounted at /35/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 924.784829][T30953] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.804184][T30381] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 924.819937][T26131] hid-generic 0000:0000:0000.0042: hidraw0: HID v8.00 Device [syz0] on syz0 [ 924.820479][ T29] audit: type=1326 audit(2147484572.799:62063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 924.853311][ T29] audit: type=1326 audit(2147484572.799:62064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 924.880600][ T29] audit: type=1326 audit(2147484572.799:62065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 924.904248][ T29] audit: type=1326 audit(2147484572.799:62066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 924.927850][ T29] audit: type=1326 audit(2147484572.799:62067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 924.951528][ T29] audit: type=1326 audit(2147484572.799:62068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 924.975283][ T29] audit: type=1326 audit(2147484572.799:62069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 924.998975][ T29] audit: type=1326 audit(2147484572.799:62070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 925.022622][ T29] audit: type=1326 audit(2147484572.799:62071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.8.9036" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 925.048178][T30953] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.060189][T31047] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 925.088528][T31054] $H: renamed from bond0 (while UP) [ 925.097467][T31054] $H: entered promiscuous mode [ 925.102576][T31054] bond_slave_0: entered promiscuous mode [ 925.108295][T31054] bond_slave_1: entered promiscuous mode [ 925.118533][T30953] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.153357][T31059] FAULT_INJECTION: forcing a failure. [ 925.153357][T31059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 925.166544][T31059] CPU: 1 UID: 0 PID: 31059 Comm: syz.8.9043 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 925.166572][T31059] Tainted: [W]=WARN [ 925.166578][T31059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 925.166589][T31059] Call Trace: [ 925.166657][T31059] [ 925.166665][T31059] __dump_stack+0x1d/0x30 [ 925.166686][T31059] dump_stack_lvl+0xe8/0x140 [ 925.166740][T31059] dump_stack+0x15/0x1b [ 925.166758][T31059] should_fail_ex+0x265/0x280 [ 925.166788][T31059] should_fail+0xb/0x20 [ 925.166877][T31059] should_fail_usercopy+0x1a/0x20 [ 925.166896][T31059] _copy_from_user+0x1c/0xb0 [ 925.166917][T31059] __ia32_sys_rt_sigreturn+0x128/0x350 [ 925.166950][T31059] x64_sys_call+0x2d4b/0x3000 [ 925.166968][T31059] do_syscall_64+0xd2/0x200 [ 925.166994][T31059] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 925.167016][T31059] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 925.167045][T31059] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 925.167067][T31059] RIP: 0033:0x7fb41f64b099 [ 925.167138][T31059] Code: 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 04 25 [ 925.167153][T31059] RSP: 002b:00007fb41e10ea80 EFLAGS: 00000202 ORIG_RAX: 000000000000000f [ 925.167172][T31059] RAX: ffffffffffffffda RBX: 00007fb41f905fa0 RCX: 00007fb41f64b099 [ 925.167184][T31059] RDX: 00007fb41e10ea80 RSI: 00007fb41e10ebb0 RDI: 0000000000000021 [ 925.167227][T31059] RBP: 00007fb41e10f090 R08: 0000000000000000 R09: 0000000000000000 [ 925.167239][T31059] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 925.167251][T31059] R13: 00007fb41f906038 R14: 00007fb41f905fa0 R15: 00007fffbd9b6768 [ 925.167273][T31059] [ 925.353018][ T1765] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 925.364175][ T1765] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 925.378297][ T1765] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 925.396674][ T1765] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 925.474750][T31076] wg2: entered promiscuous mode [ 925.479655][T31076] wg2: entered allmulticast mode [ 926.061403][T31099] netlink: 'syz.1.9058': attribute type 6 has an invalid length. [ 926.178327][T31104] loop1: detected capacity change from 0 to 512 [ 926.269263][T31104] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 926.295221][T31104] ext4 filesystem being mounted at /30/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 926.328819][T31104] SELinux: Context @ is not valid (left unmapped). [ 926.378582][T30519] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 926.431254][T31118] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 926.446351][T31116] netlink: 36 bytes leftover after parsing attributes in process `syz.8.9065'. [ 926.467742][T31116] loop8: detected capacity change from 0 to 512 [ 926.494219][T24843] hid_parser_main: 251 callbacks suppressed [ 926.494234][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.507654][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.515048][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.554750][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.562235][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.569622][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.577038][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.584441][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.591826][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.599207][T24843] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 926.610921][T31116] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 926.624537][T31116] ext4 filesystem being mounted at /43/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 926.635325][T24843] hid-generic 0000:0000:0000.0043: hidraw0: HID v8.00 Device [syz0] on syz0 [ 926.651160][T31116] SELinux: policydb version 576 does not match my version range 15-35 [ 926.659526][T31116] SELinux: failed to load policy [ 926.680046][T30381] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 926.745863][T31136] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 926.770489][T31138] netlink: 268 bytes leftover after parsing attributes in process `syz.8.9070'. [ 926.788331][T31140] netlink: 224 bytes leftover after parsing attributes in process `syz.0.9074'. [ 926.840107][T31140] team0: entered promiscuous mode [ 926.845216][T31140] team_slave_0: entered promiscuous mode [ 926.851057][T31140] team_slave_1: entered promiscuous mode [ 926.903528][T31139] team0: left promiscuous mode [ 926.908306][T31139] team_slave_0: left promiscuous mode [ 926.914043][T31139] team_slave_1: left promiscuous mode [ 926.985276][T31129] loop7: detected capacity change from 0 to 32768 [ 927.004053][T31153] netlink: 'syz.8.9079': attribute type 7 has an invalid length. [ 927.012106][T31153] netlink: 8 bytes leftover after parsing attributes in process `syz.8.9079'. [ 927.037184][T27296] hid-generic 0000:0000:0000.0044: hidraw0: HID v8.00 Device [syz0] on syz0 [ 927.050746][T31129] loop7: p1 p2 p3 < > p4 < p5 p6 > [ 927.056199][T31129] loop7: p1 start 460800 is beyond EOD, truncated [ 927.062751][T31129] loop7: p2 size 83886080 extends beyond EOD, truncated [ 927.071776][T31159] netlink: 28 bytes leftover after parsing attributes in process `syz.8.9082'. [ 927.080752][T31159] netlink: 28 bytes leftover after parsing attributes in process `syz.8.9082'. [ 927.094232][T31129] loop7: p5 start 460800 is beyond EOD, truncated [ 927.100733][T31129] loop7: p6 size 83886080 extends beyond EOD, truncated [ 927.136639][T31163] netlink: 'syz.0.9084': attribute type 6 has an invalid length. [ 927.235958][T31170] netlink: 'syz.0.9088': attribute type 6 has an invalid length. [ 927.239150][T31174] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 927.317117][T27296] hid-generic 0000:0000:0000.0045: hidraw0: HID v8.00 Device [syz0] on syz0 [ 927.381292][T31189] lo speed is unknown, defaulting to 1000 [ 927.405498][T31189] lo speed is unknown, defaulting to 1000 [ 927.417245][T31189] lo speed is unknown, defaulting to 1000 [ 927.450842][T31189] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 927.481007][T31189] lo speed is unknown, defaulting to 1000 [ 927.486987][T31189] lo speed is unknown, defaulting to 1000 [ 927.514460][T31189] lo speed is unknown, defaulting to 1000 [ 927.530305][T31189] lo speed is unknown, defaulting to 1000 [ 927.546467][T31189] lo speed is unknown, defaulting to 1000 [ 927.562527][T31196] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 927.729188][ T1049] hid-generic 0000:0000:0000.0046: hidraw0: HID v8.00 Device [syz0] on syz0 [ 927.761439][T31215] lo speed is unknown, defaulting to 1000 [ 927.788499][T31219] loop0: detected capacity change from 0 to 512 [ 927.811945][T31220] loop1: detected capacity change from 0 to 1024 [ 927.812304][T31219] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 927.824684][T31220] EXT4-fs: inline encryption not supported [ 927.834513][T31220] EXT4-fs: Ignoring removed i_version option [ 927.840338][T31219] EXT4-fs (loop0): orphan cleanup on readonly fs [ 927.840558][T31220] EXT4-fs: Ignoring removed bh option [ 927.855272][T31219] EXT4-fs error (device loop0): ext4_do_update_inode:5632: inode #16: comm syz.0.9109: corrupted inode contents [ 927.867174][T31224] wg2: entered promiscuous mode [ 927.867997][T31219] EXT4-fs (loop0): Remounting filesystem read-only [ 927.872079][T31224] wg2: entered allmulticast mode [ 927.883891][T31219] EXT4-fs (loop0): 1 truncate cleaned up [ 927.889636][T26975] EXT4-fs (loop0): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 927.897449][T31227] FAULT_INJECTION: forcing a failure. [ 927.897449][T31227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 927.900198][T26975] EXT4-fs (loop0): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 927.901069][T26975] EXT4-fs (loop0): Quota write (off=8, len=24) cancelled because transaction is not started [ 927.913376][T31227] CPU: 1 UID: 0 PID: 31227 Comm: syz.4.9111 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 927.913403][T31227] Tainted: [W]=WARN [ 927.913408][T31227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 927.913485][T31227] Call Trace: [ 927.913492][T31227] [ 927.913501][T31227] __dump_stack+0x1d/0x30 [ 927.913523][T31227] dump_stack_lvl+0xe8/0x140 [ 927.913565][T31227] dump_stack+0x15/0x1b [ 927.913581][T31227] should_fail_ex+0x265/0x280 [ 927.913616][T31227] should_fail+0xb/0x20 [ 927.913631][T31227] should_fail_usercopy+0x1a/0x20 [ 927.913665][T31227] _copy_from_user+0x1c/0xb0 [ 927.913755][T31227] ucma_write+0xd9/0x250 [ 927.913777][T31227] ? __pfx_ucma_write+0x10/0x10 [ 927.913807][T31227] vfs_write+0x269/0x960 [ 927.913846][T31227] ? __rcu_read_unlock+0x4f/0x70 [ 927.913876][T31227] ? __fget_files+0x184/0x1c0 [ 927.913908][T31227] ksys_write+0xda/0x1a0 [ 927.913931][T31227] __x64_sys_write+0x40/0x50 [ 927.914013][T31227] x64_sys_call+0x2802/0x3000 [ 927.914035][T31227] do_syscall_64+0xd2/0x200 [ 927.914100][T31227] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 927.914126][T31227] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 927.914223][T31227] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 927.914272][T31227] RIP: 0033:0x7f45e6d3efc9 [ 927.914287][T31227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 927.914372][T31227] RSP: 002b:00007f45e57a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 927.914390][T31227] RAX: ffffffffffffffda RBX: 00007f45e6f95fa0 RCX: 00007f45e6d3efc9 [ 927.914403][T31227] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000003 [ 927.914415][T31227] RBP: 00007f45e57a7090 R08: 0000000000000000 R09: 0000000000000000 [ 927.914468][T31227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 927.914480][T31227] R13: 00007f45e6f96038 R14: 00007f45e6f95fa0 R15: 00007ffc82645518 [ 927.914498][T31227] [ 927.960899][T31203] loop8: detected capacity change from 0 to 32768 [ 927.963211][T31219] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 927.965960][T31220] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 928.027914][T31232] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9113'. [ 928.071211][T30911] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 928.082140][T30519] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 928.189881][T31232] hsr_slave_0: left promiscuous mode [ 928.195770][T31232] hsr_slave_1: left promiscuous mode [ 928.210360][T31203] loop8: p1 p2 p3 < > p4 < p5 p6 > [ 928.215676][T31203] loop8: p1 start 460800 is beyond EOD, truncated [ 928.222149][T31203] loop8: p2 size 83886080 extends beyond EOD, truncated [ 928.230890][T31203] loop8: p5 start 460800 is beyond EOD, truncated [ 928.237323][T31203] loop8: p6 size 83886080 extends beyond EOD, truncated [ 928.255090][T31236] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 928.339032][T31249] netlink: 224 bytes leftover after parsing attributes in process `syz.4.9121'. [ 928.378909][T31249] team0: entered promiscuous mode [ 928.384042][T31249] team_slave_0: entered promiscuous mode [ 928.389904][T31249] team_slave_1: entered promiscuous mode [ 928.419211][T26131] hid-generic 0000:0000:0000.0047: hidraw0: HID v8.00 Device [syz0] on syz0 [ 928.429633][T31248] team0: left promiscuous mode [ 928.434484][T31248] team_slave_0: left promiscuous mode [ 928.436776][T31266] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9128'. [ 928.439942][T31248] team_slave_1: left promiscuous mode [ 928.440274][T31267] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9128'. [ 928.484392][T31269] netlink: 'syz.1.9129': attribute type 7 has an invalid length. [ 928.539479][T31276] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 928.616632][T31281] wg2: left promiscuous mode [ 928.621312][T31281] wg2: left allmulticast mode [ 928.690419][T31292] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 928.742962][T31292] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 928.812420][T31292] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 928.862606][T31292] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 928.923709][T31295] netlink: 'syz.0.9140': attribute type 7 has an invalid length. [ 928.933050][T26973] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 928.942245][T26973] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 928.954347][T26973] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 928.962860][T26973] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 929.012793][T31305] wg2: left promiscuous mode [ 929.017440][T31305] wg2: left allmulticast mode [ 929.069156][T31316] x_tables: duplicate underflow at hook 1 [ 929.092359][T31318] netlink: 'syz.4.9151': attribute type 7 has an invalid length. [ 929.128913][T31327] lo speed is unknown, defaulting to 1000 [ 929.155610][T31327] loop0: detected capacity change from 0 to 1024 [ 929.162649][T31327] EXT4-fs: inline encryption not supported [ 929.168585][T31327] EXT4-fs: Ignoring removed i_version option [ 929.174624][T31327] EXT4-fs: Ignoring removed bh option [ 929.191524][T31327] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 929.218469][T31331] netlink: 'syz.4.9153': attribute type 6 has an invalid length. [ 929.225381][T30911] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 929.259352][T31337] FAULT_INJECTION: forcing a failure. [ 929.259352][T31337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 929.272555][T31337] CPU: 1 UID: 0 PID: 31337 Comm: syz.8.9157 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 929.272583][T31337] Tainted: [W]=WARN [ 929.272591][T31337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 929.272603][T31337] Call Trace: [ 929.272666][T31337] [ 929.272675][T31337] __dump_stack+0x1d/0x30 [ 929.272697][T31337] dump_stack_lvl+0xe8/0x140 [ 929.272717][T31337] dump_stack+0x15/0x1b [ 929.272747][T31337] should_fail_ex+0x265/0x280 [ 929.272776][T31337] should_fail+0xb/0x20 [ 929.272792][T31337] should_fail_usercopy+0x1a/0x20 [ 929.272812][T31337] _copy_to_user+0x20/0xa0 [ 929.272835][T31337] simple_read_from_buffer+0xb5/0x130 [ 929.272893][T31337] proc_fail_nth_read+0x10e/0x150 [ 929.272919][T31337] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 929.272941][T31337] vfs_read+0x1a8/0x770 [ 929.273019][T31337] ? __rcu_read_unlock+0x4f/0x70 [ 929.273090][T31337] ? __fget_files+0x184/0x1c0 [ 929.273115][T31337] ksys_read+0xda/0x1a0 [ 929.273135][T31337] __x64_sys_read+0x40/0x50 [ 929.273207][T31337] x64_sys_call+0x27c0/0x3000 [ 929.273227][T31337] do_syscall_64+0xd2/0x200 [ 929.273271][T31337] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 929.273296][T31337] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 929.273371][T31337] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 929.273389][T31337] RIP: 0033:0x7fb41f6ad9dc [ 929.273410][T31337] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 929.273428][T31337] RSP: 002b:00007fb41e10f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 929.273446][T31337] RAX: ffffffffffffffda RBX: 00007fb41f905fa0 RCX: 00007fb41f6ad9dc [ 929.273459][T31337] RDX: 000000000000000f RSI: 00007fb41e10f0a0 RDI: 0000000000000004 [ 929.273481][T31337] RBP: 00007fb41e10f090 R08: 0000000000000000 R09: 0000000000000000 [ 929.273494][T31337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 929.273583][T31337] R13: 00007fb41f906038 R14: 00007fb41f905fa0 R15: 00007fffbd9b6768 [ 929.273598][T31337] [ 929.535665][T31348] FAULT_INJECTION: forcing a failure. [ 929.535665][T31348] name failslab, interval 1, probability 0, space 0, times 0 [ 929.548452][T31348] CPU: 1 UID: 0 PID: 31348 Comm: syz.1.9162 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 929.548567][T31348] Tainted: [W]=WARN [ 929.548589][T31348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 929.548598][T31348] Call Trace: [ 929.548603][T31348] [ 929.548609][T31348] __dump_stack+0x1d/0x30 [ 929.548627][T31348] dump_stack_lvl+0xe8/0x140 [ 929.548642][T31348] dump_stack+0x15/0x1b [ 929.548655][T31348] should_fail_ex+0x265/0x280 [ 929.548817][T31348] should_failslab+0x8c/0xb0 [ 929.548904][T31348] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 929.548949][T31348] ? sidtab_sid2str_get+0xa0/0x130 [ 929.548972][T31348] kmemdup_noprof+0x2b/0x70 [ 929.548996][T31348] sidtab_sid2str_get+0xa0/0x130 [ 929.549017][T31348] security_sid_to_context_core+0x1eb/0x2e0 [ 929.549039][T31348] security_sid_to_context+0x27/0x40 [ 929.549059][T31348] selinux_lsmprop_to_secctx+0x67/0xf0 [ 929.549147][T31348] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 929.549164][T31348] audit_log_subj_ctx+0xa4/0x3e0 [ 929.549181][T31348] ? skb_put+0xa9/0xf0 [ 929.549312][T31348] audit_log_task_context+0x48/0x70 [ 929.549329][T31348] audit_log_task+0xf4/0x250 [ 929.549353][T31348] ? kstrtouint+0x76/0xc0 [ 929.549387][T31348] audit_seccomp+0x61/0x100 [ 929.549435][T31348] ? __seccomp_filter+0x82d/0x1250 [ 929.549455][T31348] __seccomp_filter+0x83e/0x1250 [ 929.549475][T31348] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 929.549506][T31348] ? vfs_write+0x7e8/0x960 [ 929.549526][T31348] __secure_computing+0x82/0x150 [ 929.549545][T31348] syscall_trace_enter+0xcf/0x1e0 [ 929.549566][T31348] do_syscall_64+0xac/0x200 [ 929.549614][T31348] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 929.549634][T31348] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 929.549655][T31348] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 929.549715][T31348] RIP: 0033:0x7fe5d3a4efc9 [ 929.549727][T31348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 929.549741][T31348] RSP: 002b:00007fe5d24b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000033 [ 929.549852][T31348] RAX: ffffffffffffffda RBX: 00007fe5d3ca5fa0 RCX: 00007fe5d3a4efc9 [ 929.549862][T31348] RDX: 00002000000001c0 RSI: 0000000000000000 RDI: 0000000000000003 [ 929.549872][T31348] RBP: 00007fe5d24b7090 R08: 0000000000000000 R09: 0000000000000000 [ 929.549958][T31348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 929.549968][T31348] R13: 00007fe5d3ca6038 R14: 00007fe5d3ca5fa0 R15: 00007fff7b9d2178 [ 929.549982][T31348] [ 929.801773][T31348] audit_panic: 1009 callbacks suppressed [ 929.801785][T31348] audit: error in audit_log_subj_ctx [ 929.814079][ T29] audit: type=1400 audit(2147484577.779:63076): avc: denied { execute_no_trans } for pid=31344 comm="syz.0.9161" path="/33/file0" dev="tmpfs" ino=188 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 929.839918][ T29] audit: type=1326 audit(2147484577.509:63075): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=31346 comm="syz.1.9162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=51 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 929.861004][ T29] audit: type=1326 audit(2147484577.809:63077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31346 comm="syz.1.9162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7fe5d3a4d9dc code=0x7ffc0000 [ 929.884443][ T29] audit: type=1326 audit(2147484577.809:63078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31346 comm="syz.1.9162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fe5d3a4da7f code=0x7ffc0000 [ 929.908094][ T29] audit: type=1326 audit(2147484577.809:63079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31346 comm="syz.1.9162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fe5d3a4dc2a code=0x7ffc0000 [ 929.931877][ T29] audit: type=1326 audit(2147484577.809:63080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31346 comm="syz.1.9162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 929.955554][ T29] audit: type=1326 audit(2147484577.809:63081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31346 comm="syz.1.9162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe5d3a4efc9 code=0x7ffc0000 [ 930.007503][T31353] lo speed is unknown, defaulting to 1000 [ 930.020396][T31368] netlink: 'syz.4.9170': attribute type 3 has an invalid length. [ 930.026099][T31363] loop1: detected capacity change from 0 to 1024 [ 930.041931][T31365] wg2: entered promiscuous mode [ 930.046892][T31365] wg2: entered allmulticast mode [ 930.052542][T31363] EXT4-fs: inline encryption not supported [ 930.067760][T31363] EXT4-fs: Ignoring removed i_version option [ 930.073821][T31363] EXT4-fs: Ignoring removed bh option [ 930.107230][T31363] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 930.107298][T31375] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 930.166729][T30519] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 930.178390][T31375] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 930.185233][ T29] audit: type=1326 audit(2147484578.159:63082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31383 comm="syz.0.9177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3eb325efc9 code=0x7ffc0000 [ 930.212200][ T29] audit: type=1326 audit(2147484578.159:63083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31383 comm="syz.0.9177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3eb325efc9 code=0x7ffc0000 [ 930.236051][ T3372] hid-generic 0000:0000:0000.0048: hidraw0: HID v8.00 Device [syz0] on syz0 [ 930.271204][T31375] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 930.351195][T31375] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 930.414952][T31406] netlink: 'syz.7.9186': attribute type 7 has an invalid length. [ 930.454947][T31408] x_tables: duplicate underflow at hook 1 [ 930.477054][T31414] FAULT_INJECTION: forcing a failure. [ 930.477054][T31414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 930.490342][T31414] CPU: 1 UID: 0 PID: 31414 Comm: syz.0.9190 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 930.490413][T31414] Tainted: [W]=WARN [ 930.490420][T31414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 930.490500][T31414] Call Trace: [ 930.490505][T31414] [ 930.490511][T31414] __dump_stack+0x1d/0x30 [ 930.490533][T31414] dump_stack_lvl+0xe8/0x140 [ 930.490554][T31414] dump_stack+0x15/0x1b [ 930.490570][T31414] should_fail_ex+0x265/0x280 [ 930.490619][T31414] should_fail+0xb/0x20 [ 930.490635][T31414] should_fail_usercopy+0x1a/0x20 [ 930.490686][T31414] _copy_from_user+0x1c/0xb0 [ 930.490788][T31414] ___sys_sendmsg+0xc1/0x1d0 [ 930.490897][T31414] __x64_sys_sendmsg+0xd4/0x160 [ 930.490932][T31414] x64_sys_call+0x191e/0x3000 [ 930.490954][T31414] do_syscall_64+0xd2/0x200 [ 930.490972][T31414] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 930.491057][T31414] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 930.491086][T31414] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 930.491180][T31414] RIP: 0033:0x7f3eb325efc9 [ 930.491194][T31414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 930.491208][T31414] RSP: 002b:00007f3eb1cc7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 930.491224][T31414] RAX: ffffffffffffffda RBX: 00007f3eb34b5fa0 RCX: 00007f3eb325efc9 [ 930.491239][T31414] RDX: 0000000000008000 RSI: 0000200000000580 RDI: 0000000000000004 [ 930.491249][T31414] RBP: 00007f3eb1cc7090 R08: 0000000000000000 R09: 0000000000000000 [ 930.491261][T31414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 930.491293][T31414] R13: 00007f3eb34b6038 R14: 00007f3eb34b5fa0 R15: 00007ffdb7e24dd8 [ 930.491308][T31414] [ 930.733268][T31431] netlink: 'syz.0.9198': attribute type 7 has an invalid length. [ 930.758117][T31433] wg2: left promiscuous mode [ 930.762801][T31433] wg2: left allmulticast mode [ 930.792681][T31436] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 930.813589][T31440] vlan2: entered allmulticast mode [ 930.823824][T31442] loop0: detected capacity change from 0 to 1024 [ 930.841480][T31442] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 930.908373][T31449] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 930.944799][T31454] lo speed is unknown, defaulting to 1000 [ 930.952375][T31454] lo speed is unknown, defaulting to 1000 [ 930.958670][T31454] lo speed is unknown, defaulting to 1000 [ 930.991332][T31454] infiniband sz1: set active [ 930.996050][T31454] infiniband sz1: added lo [ 931.002455][ T4021] lo speed is unknown, defaulting to 1000 [ 931.011882][T31459] wg2: entered promiscuous mode [ 931.016759][T31459] wg2: entered allmulticast mode [ 931.020288][T31454] RDS/IB: sz1: added [ 931.025914][T31454] smc: adding ib device sz1 with port count 1 [ 931.032312][T31454] smc: ib device sz1 port 1 has no pnetid [ 931.038852][ T4021] lo speed is unknown, defaulting to 1000 [ 931.045296][T31454] lo speed is unknown, defaulting to 1000 [ 931.054507][T31464] netlink: 'syz.8.9211': attribute type 7 has an invalid length. [ 931.079771][T31454] lo speed is unknown, defaulting to 1000 [ 931.116139][T31454] lo speed is unknown, defaulting to 1000 [ 931.129018][ T1049] hid-generic 0000:0000:0000.0049: hidraw0: HID v8.00 Device [syz0] on syz0 [ 931.165942][T31454] lo speed is unknown, defaulting to 1000 [ 931.172046][T31476] wg2: left promiscuous mode [ 931.176655][T31476] wg2: left allmulticast mode [ 931.201216][T31476] wg2: entered promiscuous mode [ 931.206099][T31476] wg2: entered allmulticast mode [ 931.212516][T31454] lo speed is unknown, defaulting to 1000 [ 931.281513][T31485] wg2: entered promiscuous mode [ 931.286425][T31485] wg2: entered allmulticast mode [ 931.302486][T31490] $H: renamed from bond0 (while UP) [ 931.309430][T31490] $H: entered promiscuous mode [ 931.314487][T31490] bond_slave_0: entered promiscuous mode [ 931.320245][T31490] bond_slave_1: entered promiscuous mode [ 931.330809][T31494] FAULT_INJECTION: forcing a failure. [ 931.330809][T31494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 931.344061][T31494] CPU: 0 UID: 0 PID: 31494 Comm: syz.8.9224 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 931.344132][T31494] Tainted: [W]=WARN [ 931.344139][T31494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 931.344151][T31494] Call Trace: [ 931.344159][T31494] [ 931.344165][T31494] __dump_stack+0x1d/0x30 [ 931.344253][T31494] dump_stack_lvl+0xe8/0x140 [ 931.344290][T31494] dump_stack+0x15/0x1b [ 931.344307][T31494] should_fail_ex+0x265/0x280 [ 931.344345][T31494] should_fail+0xb/0x20 [ 931.344358][T31494] should_fail_usercopy+0x1a/0x20 [ 931.344375][T31494] copy_to_user_nofault+0x7f/0x120 [ 931.344408][T31494] bpf_probe_write_user+0x83/0xc0 [ 931.344430][T31494] bpf_prog_f26ae291ee3ebee3+0x41/0x49 [ 931.344446][T31494] bpf_trace_run2+0x107/0x1c0 [ 931.344485][T31494] __bpf_trace_sys_enter+0x10/0x30 [ 931.344506][T31494] trace_sys_enter+0x86/0xf0 [ 931.344529][T31494] syscall_trace_enter+0x13e/0x1e0 [ 931.344628][T31494] do_syscall_64+0xac/0x200 [ 931.344646][T31494] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 931.344677][T31494] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 931.344701][T31494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 931.344720][T31494] RIP: 0033:0x7fb41f6aefc9 [ 931.344759][T31494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 931.344798][T31494] RSP: 002b:00007fb41e10f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 931.344817][T31494] RAX: ffffffffffffffda RBX: 00007fb41f905fa0 RCX: 00007fb41f6aefc9 [ 931.344829][T31494] RDX: 0000200000001600 RSI: 0000000000004c0a RDI: 0000000000000006 [ 931.344840][T31494] RBP: 00007fb41e10f090 R08: 0000000000000000 R09: 0000000000000000 [ 931.344850][T31494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 931.344860][T31494] R13: 00007fb41f906038 R14: 00007fb41f905fa0 R15: 00007fffbd9b6768 [ 931.344875][T31494] [ 931.372952][T31494] loop9: detected capacity change from 0 to 7 [ 931.550102][T31506] Buffer I/O error on dev loop9, logical block 0, async page read [ 931.558018][T31506] Buffer I/O error on dev loop9, logical block 0, async page read [ 931.558038][T31505] wg2: left promiscuous mode [ 931.565943][T31506] loop9: unable to read partition table [ 931.570541][T31505] wg2: left allmulticast mode [ 931.581987][T31494] Buffer I/O error on dev loop9, logical block 0, async page read [ 931.590299][T31494] Buffer I/O error on dev loop9, logical block 0, async page read [ 931.598117][T31494] loop9: unable to read partition table [ 931.603885][T31494] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 931.603885][T31494] ) failed (rc=-5) [ 931.617224][T31505] wg2: entered promiscuous mode [ 931.622175][T31505] wg2: entered allmulticast mode [ 931.668447][T31515] wg2: left promiscuous mode [ 931.673228][T31515] wg2: left allmulticast mode [ 931.682695][T30911] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 931.693368][T31515] wg2: entered promiscuous mode [ 931.698370][T31515] wg2: entered allmulticast mode [ 931.740651][T31519] __nla_validate_parse: 13 callbacks suppressed [ 931.740671][T31519] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9234'. [ 931.792115][T31519] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=31519 comm=syz.0.9234 [ 931.839841][T31536] netlink: 'syz.7.9243': attribute type 3 has an invalid length. [ 931.840684][T31519] hub 9-0:1.0: USB hub found [ 931.847611][T31536] netlink: 132 bytes leftover after parsing attributes in process `syz.7.9243'. [ 931.849671][T31536] loop7: detected capacity change from 0 to 256 [ 931.870884][T31519] hub 9-0:1.0: 8 ports detected [ 931.933436][T31541] loop8: detected capacity change from 0 to 1024 [ 931.933879][T31542] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 931.967712][T31541] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 931.969323][T31548] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 932.014426][T31550] loop0: detected capacity change from 0 to 512 [ 932.021185][T31550] ext2: Unknown parameter 'pcr' [ 932.027460][T31542] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 932.029743][T31550] loop0: detected capacity change from 0 to 512 [ 932.045307][T31551] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 932.054884][T31551] netlink: 36 bytes leftover after parsing attributes in process `syz.8.9245'. [ 932.062820][T31550] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 932.063860][T31551] netlink: 16 bytes leftover after parsing attributes in process `syz.8.9245'. [ 932.076424][T31550] ext4 filesystem being mounted at /55/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 932.085237][T31551] netlink: 36 bytes leftover after parsing attributes in process `syz.8.9245'. [ 932.105069][T31551] netlink: 36 bytes leftover after parsing attributes in process `syz.8.9245'. [ 932.124956][T31550] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 932.151674][T31542] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 932.192052][T31542] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 932.246720][T26975] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 932.257802][T26975] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 932.269302][T26975] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 932.280230][T26975] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 932.351814][T31573] netlink: 12 bytes leftover after parsing attributes in process `syz.7.9255'. [ 932.373427][T31575] wg2: left promiscuous mode [ 932.378087][T31575] wg2: left allmulticast mode [ 932.388967][T31575] wg2: entered promiscuous mode [ 932.393906][T31575] wg2: entered allmulticast mode [ 932.414104][T31578] wg2: left promiscuous mode [ 932.418861][T31578] wg2: left allmulticast mode [ 932.432006][T31578] wg2: entered promiscuous mode [ 932.436894][T31578] wg2: entered allmulticast mode [ 932.594834][T31582] loop7: detected capacity change from 0 to 32768 [ 932.650182][T31582] loop7: p1 p2 p3 < > p4 < p5 p6 > [ 932.655485][T31582] loop7: p1 start 460800 is beyond EOD, truncated [ 932.661960][T31582] loop7: p2 size 83886080 extends beyond EOD, truncated [ 932.670610][T31582] loop7: p5 start 460800 is beyond EOD, truncated [ 932.677026][T31582] loop7: p6 size 83886080 extends beyond EOD, truncated [ 932.761260][T30381] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 932.782393][T31588] lo speed is unknown, defaulting to 1000 [ 932.788483][T31588] lo speed is unknown, defaulting to 1000 [ 932.835081][T31591] loop7: detected capacity change from 0 to 1024 [ 932.842211][T31591] EXT4-fs: inline encryption not supported [ 932.848043][T31591] EXT4-fs: Ignoring removed i_version option [ 932.854129][T31591] EXT4-fs: Ignoring removed bh option [ 932.871956][T31591] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 932.902637][T30582] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 932.924086][T31599] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 932.993203][T31612] vlan2: entered allmulticast mode [ 933.023564][T26131] hid_parser_main: 193 callbacks suppressed [ 933.023583][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.036952][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.044357][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.069342][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.076876][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.084449][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.091935][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.099311][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.106743][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.114145][T26131] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 933.123221][T26131] hid-generic 0000:0000:0000.004A: hidraw0: HID v8.00 Device [syz0] on syz0 [ 933.151419][T31626] lo speed is unknown, defaulting to 1000 [ 933.161489][T31626] lo speed is unknown, defaulting to 1000 [ 933.185342][T31633] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9281'. [ 933.223105][T31637] loop7: detected capacity change from 0 to 1024 [ 933.229759][T31637] EXT4-fs: inline encryption not supported [ 933.254592][T31641] loop0: detected capacity change from 0 to 512 [ 933.260986][T31637] EXT4-fs: Ignoring removed i_version option [ 933.266982][T31637] EXT4-fs: Ignoring removed bh option [ 933.272405][T31641] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 933.294640][T31641] EXT4-fs (loop0): 1 truncate cleaned up [ 933.305468][T31641] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 933.319883][T31637] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 933.322590][T31647] vlan2: entered allmulticast mode [ 933.355643][T30911] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 933.367050][T30582] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 933.409444][T31657] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 933.424432][T31657] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 933.443728][T31669] program syz.1.9294 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 933.471596][T31667] 9pnet: Could not find request transport: fd0x0000000000000005( [ 933.505692][T31677] netlink: 224 bytes leftover after parsing attributes in process `syz.8.9298'. [ 933.514943][T31678] netlink: 224 bytes leftover after parsing attributes in process `syz.1.9297'. [ 933.570362][T31672] serio: Serial port ptm0 [ 933.643513][T31682] !60X: renamed from caif0 [ 933.650327][T31682] !60X: entered allmulticast mode [ 933.655728][T31682] A link change request failed with some changes committed already. Interface !60X may have been left with an inconsistent configuration, please check. [ 933.681130][T31688] lo speed is unknown, defaulting to 1000 [ 933.687076][T31688] lo speed is unknown, defaulting to 1000 [ 933.729249][T31689] loop1: detected capacity change from 0 to 1024 [ 933.736104][T31689] EXT4-fs: inline encryption not supported [ 933.741992][T31689] EXT4-fs: Ignoring removed i_version option [ 933.748035][T31689] EXT4-fs: Ignoring removed bh option [ 933.761409][T31689] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 933.788214][T30519] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 933.810851][T31694] loop1: detected capacity change from 0 to 512 [ 933.817527][T31694] ext2: Unknown parameter 'pcr' [ 933.819396][T31696] program syz.8.9304 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 933.826235][T31694] loop1: detected capacity change from 0 to 512 [ 933.841020][ T7347] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 933.871256][T31694] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 933.886089][T31694] ext4 filesystem being mounted at /81/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 933.897130][ T7347] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 933.906413][ T7347] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 933.915519][ T7347] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 933.924487][T31701] loop8: detected capacity change from 0 to 512 [ 933.944935][T31701] ext2: Unknown parameter 'pcr' [ 933.957695][T31694] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 933.969595][T31701] loop8: detected capacity change from 0 to 512 [ 933.998969][T31706] 9pnet: Could not find request transport: fd0x0000000000000005( [ 934.018331][T31709] wg2: left promiscuous mode [ 934.023106][T31709] wg2: left allmulticast mode [ 934.034229][T31701] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 934.047404][T31701] ext4 filesystem being mounted at /96/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 934.069707][T31709] wg2: entered promiscuous mode [ 934.071407][T31717] SELinux: policydb string SELinux does not match my string SE Linux [ 934.074742][T31709] wg2: entered allmulticast mode [ 934.085940][T31717] SELinux: failed to load policy [ 934.092777][ T4021] IPVS: starting estimator thread 0... [ 934.121010][T31722] x_tables: duplicate underflow at hook 1 [ 934.132273][T31701] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 934.168620][T31729] vlan2: entered allmulticast mode [ 934.179895][T31719] IPVS: using max 2640 ests per chain, 132000 per kthread [ 934.198360][T31734] netlink: 'syz.1.9318': attribute type 6 has an invalid length. [ 934.215748][T31738] loop7: detected capacity change from 0 to 512 [ 934.223821][T31738] ext2: Unknown parameter 'pcr' [ 934.234117][T31738] loop7: detected capacity change from 0 to 512 [ 934.253078][T31738] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 934.261989][T31745] loop8: detected capacity change from 0 to 1024 [ 934.274891][T31736] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 934.277331][T31738] ext4 filesystem being mounted at /67/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 934.284854][T31745] EXT4-fs: Ignoring removed orlov option [ 934.325325][T31738] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 934.330696][T31745] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 934.358555][T31753] wg2: left promiscuous mode [ 934.363213][T31753] wg2: left allmulticast mode [ 934.375151][T31753] wg2: entered promiscuous mode [ 934.380215][T31753] wg2: entered allmulticast mode [ 934.412479][T31758] loop7: detected capacity change from 0 to 512 [ 934.419420][T31758] ext2: Unknown parameter 'pcr' [ 934.428464][T31758] loop7: detected capacity change from 0 to 512 [ 934.458546][T31765] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 934.477556][T31758] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 934.487002][T31769] FAULT_INJECTION: forcing a failure. [ 934.487002][T31769] name failslab, interval 1, probability 0, space 0, times 0 [ 934.502738][T31769] CPU: 0 UID: 0 PID: 31769 Comm: syz.1.9331 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 934.502769][T31769] Tainted: [W]=WARN [ 934.502776][T31769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 934.502789][T31769] Call Trace: [ 934.502873][T31769] [ 934.502880][T31769] __dump_stack+0x1d/0x30 [ 934.502947][T31769] dump_stack_lvl+0xe8/0x140 [ 934.502967][T31769] dump_stack+0x15/0x1b [ 934.502982][T31769] should_fail_ex+0x265/0x280 [ 934.503070][T31769] should_failslab+0x8c/0xb0 [ 934.503096][T31769] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 934.503181][T31769] ? sidtab_sid2str_get+0xa0/0x130 [ 934.503211][T31769] kmemdup_noprof+0x2b/0x70 [ 934.503235][T31769] sidtab_sid2str_get+0xa0/0x130 [ 934.503334][T31769] security_sid_to_context_core+0x1eb/0x2e0 [ 934.503364][T31769] security_sid_to_context+0x27/0x40 [ 934.503460][T31769] selinux_lsmprop_to_secctx+0x67/0xf0 [ 934.503506][T31769] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 934.503525][T31769] audit_log_subj_ctx+0xa4/0x3e0 [ 934.503577][T31769] ? skb_put+0xa9/0xf0 [ 934.503632][T31769] audit_log_task_context+0x48/0x70 [ 934.503699][T31769] audit_log_task+0xf4/0x250 [ 934.503726][T31769] ? kstrtouint+0x76/0xc0 [ 934.503795][T31769] audit_seccomp+0x61/0x100 [ 934.503877][T31769] ? __seccomp_filter+0x82d/0x1250 [ 934.503901][T31769] __seccomp_filter+0x83e/0x1250 [ 934.503927][T31769] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 934.504024][T31769] ? vfs_write+0x7e8/0x960 [ 934.504043][T31769] ? __rcu_read_unlock+0x4f/0x70 [ 934.504084][T31769] ? __fget_files+0x184/0x1c0 [ 934.504107][T31769] __secure_computing+0x82/0x150 [ 934.504132][T31769] syscall_trace_enter+0xcf/0x1e0 [ 934.504175][T31769] do_syscall_64+0xac/0x200 [ 934.504194][T31769] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 934.504286][T31769] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 934.504357][T31769] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 934.504423][T31769] RIP: 0033:0x7fe5d3a4efc9 [ 934.504436][T31769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 934.504451][T31769] RSP: 002b:00007fe5d24b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 934.504468][T31769] RAX: ffffffffffffffda RBX: 00007fe5d3ca5fa0 RCX: 00007fe5d3a4efc9 [ 934.504478][T31769] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000000d5 [ 934.504501][T31769] RBP: 00007fe5d24b7090 R08: 0000000000000000 R09: 0000000000000000 [ 934.504513][T31769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 934.504535][T31769] R13: 00007fe5d3ca6038 R14: 00007fe5d3ca5fa0 R15: 00007fff7b9d2178 [ 934.504550][T31769] [ 934.510263][T31772] netlink: 'syz.4.9332': attribute type 6 has an invalid length. [ 934.528611][T31758] ext4 filesystem being mounted at /69/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 934.825146][T31782] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 934.841439][T31784] wg2: left promiscuous mode [ 934.846063][T31784] wg2: left allmulticast mode [ 934.853231][T30381] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 934.870345][T31784] wg2: entered promiscuous mode [ 934.875229][T31784] wg2: entered allmulticast mode [ 934.882298][T31758] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 934.920915][ T29] kauditd_printk_skb: 581 callbacks suppressed [ 934.920928][ T29] audit: type=1326 audit(2147484582.899:63664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 934.952531][ T29] audit: type=1326 audit(2147484582.899:63665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 934.976146][ T29] audit: type=1326 audit(2147484582.899:63666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 934.999865][ T29] audit: type=1326 audit(2147484582.899:63667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 935.023553][ T29] audit: type=1326 audit(2147484582.899:63668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 935.047207][ T29] audit: type=1326 audit(2147484582.899:63669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 935.070877][ T29] audit: type=1326 audit(2147484582.899:63670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 935.094752][ T29] audit: type=1326 audit(2147484582.899:63671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 935.118339][ T29] audit: type=1326 audit(2147484582.899:63672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 935.141953][ T29] audit: type=1326 audit(2147484582.899:63673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31793 comm="syz.8.9340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb41f6aefc9 code=0x7ffc0000 [ 935.166802][T31800] wg2: left promiscuous mode [ 935.171537][T31800] wg2: left allmulticast mode [ 935.177610][T31798] wg2: left promiscuous mode [ 935.182240][T31798] wg2: left allmulticast mode [ 935.191280][T31803] wg2: entered promiscuous mode [ 935.196133][T31803] wg2: entered allmulticast mode [ 935.197816][T31811] netlink: 'syz.8.9346': attribute type 6 has an invalid length. [ 935.229159][T31821] loop7: detected capacity change from 0 to 512 [ 935.235524][T31800] wg2: entered promiscuous mode [ 935.240719][T31800] wg2: entered allmulticast mode [ 935.241031][T31821] ext2: Unknown parameter 'pcr' [ 935.265341][T31821] loop7: detected capacity change from 0 to 512 [ 935.283879][T31821] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 935.304994][T31821] ext4 filesystem being mounted at /71/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 935.330921][T31821] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 935.367194][T31835] netlink: 'syz.7.9354': attribute type 3 has an invalid length. [ 935.376615][T31835] loop7: detected capacity change from 0 to 256 [ 935.442226][T31844] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 935.521578][T31844] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 935.532961][T31860] wg2: left promiscuous mode [ 935.537580][T31860] wg2: left allmulticast mode [ 935.546832][T31860] wg2: entered promiscuous mode [ 935.551767][T31860] wg2: entered allmulticast mode [ 935.562731][T31844] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 935.614434][T31870] loop8: detected capacity change from 0 to 512 [ 935.621768][T31870] ext2: Unknown parameter 'pcr' [ 935.627980][T31844] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 935.630537][T31870] loop8: detected capacity change from 0 to 512 [ 935.653875][T31870] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 935.668263][T31870] ext4 filesystem being mounted at /109/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 935.693296][T31870] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 935.708979][T31875] FAULT_INJECTION: forcing a failure. [ 935.708979][T31875] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 935.722086][T31875] CPU: 0 UID: 0 PID: 31875 Comm: syz.8.9368 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 935.722113][T31875] Tainted: [W]=WARN [ 935.722145][T31875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 935.722157][T31875] Call Trace: [ 935.722187][T31875] [ 935.722193][T31875] __dump_stack+0x1d/0x30 [ 935.722212][T31875] dump_stack_lvl+0xe8/0x140 [ 935.722232][T31875] dump_stack+0x15/0x1b [ 935.722248][T31863] loop1: detected capacity change from 0 to 32768 [ 935.722249][T31875] should_fail_ex+0x265/0x280 [ 935.722280][T31875] should_fail+0xb/0x20 [ 935.722300][T31875] should_fail_usercopy+0x1a/0x20 [ 935.722388][T31875] _copy_from_user+0x1c/0xb0 [ 935.722411][T31875] ___sys_sendmsg+0xc1/0x1d0 [ 935.722452][T31875] __x64_sys_sendmsg+0xd4/0x160 [ 935.722550][T31875] x64_sys_call+0x191e/0x3000 [ 935.722572][T31875] do_syscall_64+0xd2/0x200 [ 935.722589][T31875] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 935.722631][T31875] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 935.722658][T31875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 935.722678][T31875] RIP: 0033:0x7fb41f6aefc9 [ 935.722693][T31875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 935.722710][T31875] RSP: 002b:00007fb41e10f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 935.722758][T31875] RAX: ffffffffffffffda RBX: 00007fb41f905fa0 RCX: 00007fb41f6aefc9 [ 935.722770][T31875] RDX: 0000000004040084 RSI: 0000200000000c80 RDI: 0000000000000004 [ 935.722811][T31875] RBP: 00007fb41e10f090 R08: 0000000000000000 R09: 0000000000000000 [ 935.722823][T31875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.722835][T31875] R13: 00007fb41f906038 R14: 00007fb41f905fa0 R15: 00007fffbd9b6768 [ 935.722853][T31875] [ 935.931074][T31863] loop1: p1 p2 p3 < > p4 < p5 p6 > [ 935.936326][T31863] loop1: p1 start 460800 is beyond EOD, truncated [ 935.942819][T31863] loop1: p2 size 83886080 extends beyond EOD, truncated [ 935.951021][T31863] loop1: p5 start 460800 is beyond EOD, truncated [ 935.957486][T31863] loop1: p6 size 83886080 extends beyond EOD, truncated [ 936.065448][T31891] loop8: detected capacity change from 0 to 1024 [ 936.072023][T31886] loop1: detected capacity change from 0 to 8192 [ 936.091959][T31891] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 936.110259][T31886] loop1: p1 p2 < > p3 p4 < p5 > [ 936.115364][T31886] loop1: partition table partially beyond EOD, truncated [ 936.122585][T31886] loop1: p1 size 100663296 extends beyond EOD, truncated [ 936.130161][T31886] loop1: p2 start 591104 is beyond EOD, truncated [ 936.136576][T31886] loop1: p3 start 33572980 is beyond EOD, truncated [ 936.143673][T31886] loop1: p5 size 100663296 extends beyond EOD, truncated [ 936.157496][T31895] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 936.570527][T31931] loop1: detected capacity change from 0 to 512 [ 936.584378][T31931] ext2: Unknown parameter 'pcr' [ 936.601057][T31931] loop1: detected capacity change from 0 to 512 [ 936.613262][T31931] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 936.641177][T31931] ext4 filesystem being mounted at /110/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 936.682767][T31931] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 936.719504][T26978] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 936.733657][T26978] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 936.751022][T26978] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 936.766320][T26978] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 936.818186][T31957] FAULT_INJECTION: forcing a failure. [ 936.818186][T31957] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 936.831518][T31957] CPU: 0 UID: 0 PID: 31957 Comm: syz.7.9400 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 936.831546][T31957] Tainted: [W]=WARN [ 936.831552][T31957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 936.831598][T31957] Call Trace: [ 936.831606][T31957] [ 936.831615][T31957] __dump_stack+0x1d/0x30 [ 936.831635][T31957] dump_stack_lvl+0xe8/0x140 [ 936.831678][T31957] dump_stack+0x15/0x1b [ 936.831695][T31957] should_fail_ex+0x265/0x280 [ 936.831726][T31957] should_fail+0xb/0x20 [ 936.831786][T31957] should_fail_usercopy+0x1a/0x20 [ 936.831806][T31957] _copy_from_iter+0xd2/0xe80 [ 936.831882][T31957] ? __build_skb_around+0x1ab/0x200 [ 936.831906][T31957] ? __alloc_skb+0x223/0x320 [ 936.831933][T31957] netlink_sendmsg+0x471/0x6b0 [ 936.831954][T31957] ? __pfx_netlink_sendmsg+0x10/0x10 [ 936.832012][T31957] __sock_sendmsg+0x145/0x180 [ 936.832089][T31957] ____sys_sendmsg+0x31e/0x4e0 [ 936.832120][T31957] ___sys_sendmsg+0x17b/0x1d0 [ 936.832207][T31957] __x64_sys_sendmsg+0xd4/0x160 [ 936.832239][T31957] x64_sys_call+0x191e/0x3000 [ 936.832366][T31957] do_syscall_64+0xd2/0x200 [ 936.832407][T31957] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 936.832513][T31957] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 936.832575][T31957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 936.832635][T31957] RIP: 0033:0x7f138730efc9 [ 936.832648][T31957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 936.832663][T31957] RSP: 002b:00007f1385d77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 936.832713][T31957] RAX: ffffffffffffffda RBX: 00007f1387565fa0 RCX: 00007f138730efc9 [ 936.832726][T31957] RDX: 0000000006048800 RSI: 0000200000000080 RDI: 0000000000000003 [ 936.832809][T31957] RBP: 00007f1385d77090 R08: 0000000000000000 R09: 0000000000000000 [ 936.832822][T31957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 936.832836][T31957] R13: 00007f1387566038 R14: 00007f1387565fa0 R15: 00007ffc7ada35a8 [ 936.832854][T31957] [ 936.836596][T31958] serio: Serial port ptm0 [ 937.057799][T31966] wg2: left promiscuous mode [ 937.062518][T31966] wg2: left allmulticast mode [ 937.068454][T30381] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 937.091936][T31966] wg2: entered promiscuous mode [ 937.096948][T31966] wg2: entered allmulticast mode [ 937.130371][T31976] x_tables: duplicate underflow at hook 1 [ 937.138621][T31974] loop8: detected capacity change from 0 to 1024 [ 937.148031][T31974] EXT4-fs: Ignoring removed orlov option [ 937.161492][T31974] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 937.194641][T31979] loop7: detected capacity change from 0 to 512 [ 937.219100][T31979] ext2: Unknown parameter 'pcr' [ 937.232708][T31979] loop7: detected capacity change from 0 to 512 [ 937.253993][T31979] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 937.267013][T31979] ext4 filesystem being mounted at /81/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 937.295529][T31979] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 937.421000][T31980] ================================================================== [ 937.429098][T31980] BUG: KCSAN: data-race in vfs_fsync_range / writeback_single_inode [ 937.437087][T31980] [ 937.439402][T31980] write to 0xffff8881076a8a50 of 4 bytes by task 31974 on cpu 0: [ 937.447122][T31980] writeback_single_inode+0x150/0x3f0 [ 937.452499][T31980] sync_inode_metadata+0x5b/0x90 [ 937.457441][T31980] generic_buffers_fsync_noflush+0xd9/0x120 [ 937.463329][T31980] ext4_sync_file+0x1ab/0x690 [ 937.467996][T31980] vfs_fsync_range+0x10d/0x130 [ 937.472765][T31980] ext4_buffered_write_iter+0x34f/0x3c0 [ 937.478309][T31980] ext4_file_write_iter+0x387/0xf60 [ 937.483587][T31980] iter_file_splice_write+0x666/0xa60 [ 937.488969][T31980] direct_splice_actor+0x156/0x2a0 [ 937.494082][T31980] splice_direct_to_actor+0x312/0x680 [ 937.499448][T31980] do_splice_direct+0xda/0x150 [ 937.504214][T31980] do_sendfile+0x380/0x650 [ 937.508636][T31980] __x64_sys_sendfile64+0x105/0x150 [ 937.513844][T31980] x64_sys_call+0x2bb4/0x3000 [ 937.518606][T31980] do_syscall_64+0xd2/0x200 [ 937.523104][T31980] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 937.529037][T31980] [ 937.531351][T31980] read to 0xffff8881076a8a50 of 4 bytes by task 31980 on cpu 1: [ 937.538965][T31980] vfs_fsync_range+0x9b/0x130 [ 937.543645][T31980] ext4_buffered_write_iter+0x34f/0x3c0 [ 937.549184][T31980] ext4_file_write_iter+0x387/0xf60 [ 937.554376][T31980] iter_file_splice_write+0x666/0xa60 [ 937.559827][T31980] direct_splice_actor+0x156/0x2a0 [ 937.564934][T31980] splice_direct_to_actor+0x312/0x680 [ 937.570383][T31980] do_splice_direct+0xda/0x150 [ 937.575234][T31980] do_sendfile+0x380/0x650 [ 937.579648][T31980] __x64_sys_sendfile64+0x105/0x150 [ 937.584859][T31980] x64_sys_call+0x2bb4/0x3000 [ 937.589533][T31980] do_syscall_64+0xd2/0x200 [ 937.594028][T31980] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 937.599910][T31980] [ 937.602219][T31980] value changed: 0x00000070 -> 0x00000002 [ 937.607929][T31980] [ 937.610238][T31980] Reported by Kernel Concurrency Sanitizer on: [ 937.616369][T31980] CPU: 1 UID: 0 PID: 31980 Comm: syz.8.9404 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 937.627820][T31980] Tainted: [W]=WARN [ 937.631614][T31980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 937.641659][T31980] ================================================================== [ 937.729080][T30381] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 937.806874][T31988] loop7: detected capacity change from 0 to 32768 [ 937.850532][T31988] loop7: p1 p2 p3 < > p4 < p5 p6 > [ 937.855757][T31988] loop7: p1 start 460800 is beyond EOD, truncated [ 937.862182][T31988] loop7: p2 size 83886080 extends beyond EOD, truncated [ 937.870466][T31988] loop7: p5 start 460800 is beyond EOD, truncated [ 937.876944][T31988] loop7: p6 size 83886080 extends beyond EOD, truncated