last executing test programs: 2m13.771855084s ago: executing program 32 (id=85): r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010027bd7000fbd3df2502000000050004000100000005000400010000001400020076657468315f746f5f7465616d0000000900030073797a32000000000900010073"], 0x68}, 0x1, 0x0, 0x0, 0x4000145}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0xfffffff9, 0x7fff, 0x16, "0062ba7d82000000000000000000f7ffffff00"}) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='kfree\x00', r6, 0x0, 0x20}, 0x18) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000980)=@newqdisc={0x468, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r4, {0x0, 0xd}, {0xffff, 0xffff}, {0x0, 0xfff2}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x43c, 0x2, [@TCA_TBF_RATE64={0xc, 0x4, 0x5ec888eb7598db49}, @TCA_TBF_PARMS={0x28, 0x1, {{0x3, 0x1, 0x8, 0x4, 0xff, 0x6}, {0x4, 0x0, 0x3, 0xa159, 0x1000, 0x7}, 0x3, 0x8, 0x41e}}, @TCA_TBF_PTAB={0x404, 0x3, [0x104, 0x2, 0xc, 0xfff, 0x0, 0x8ba, 0xa1, 0x4d91, 0x7fffffff, 0x63c4, 0x0, 0x7ffd, 0x400, 0x255, 0x6, 0xc, 0xd81, 0x3, 0xa, 0xa, 0x7, 0x6, 0xc, 0x200, 0xfffffffd, 0x5, 0xb96, 0x7, 0x0, 0xffffffff, 0x200, 0x3, 0x80000001, 0x7c, 0xfefffffc, 0x5, 0x3, 0x2, 0x8, 0x6, 0x1, 0xd, 0x80, 0x400, 0x80, 0x90000010, 0x3800000, 0x0, 0xfffff30b, 0x0, 0xf6, 0x81, 0xfffffffa, 0x80, 0x101, 0x3f, 0xfffffbff, 0x36a5, 0x4, 0x6, 0x200, 0x1ba, 0x9, 0xab, 0x6, 0xfffffff7, 0x6, 0x0, 0x3, 0x1, 0x963, 0x1ff, 0x2, 0xfffffffd, 0x6, 0x5, 0x0, 0x3, 0x0, 0xb09, 0x3ff, 0xa, 0x8000, 0x4, 0x8, 0x1000, 0x101, 0x5, 0x3, 0x6, 0x9, 0x3, 0x1, 0x8762, 0x10008e, 0x80000005, 0xfffff76b, 0x0, 0x4, 0x4255c4e9, 0xb53, 0x5, 0x800, 0x4, 0x955, 0x5, 0x6cdf139e, 0x9, 0x3, 0x5, 0x10001, 0xff, 0x80000001, 0xed2, 0x5, 0xfffffffa, 0x10002, 0x18d0, 0x0, 0x3, 0x9486, 0x80, 0x5, 0x80000000, 0xdb, 0x3, 0x80, 0xffbf7ffc, 0x5, 0x8, 0x7, 0x1, 0x2, 0x8008, 0x2, 0x8, 0x2, 0x81, 0x3, 0x1, 0x6bf, 0x7, 0xea, 0x4, 0xc1, 0x2, 0x40, 0x5, 0x27f, 0x200, 0x7, 0x40, 0x7, 0x4, 0x7, 0xff, 0x400, 0x8, 0x7fffffff, 0xfffffff8, 0x8, 0xfffffff4, 0x8, 0xc, 0x96, 0x6, 0x104, 0x62cc, 0x2, 0x7, 0x2eb7, 0x10001, 0xcbf, 0x10000, 0x101, 0x9, 0xfffffffa, 0x1, 0x8, 0x7, 0x8001, 0xf, 0x5, 0x8, 0x8d, 0xffffffff, 0x2, 0x7, 0x1, 0x61, 0xffffffff, 0x494, 0xb, 0x1, 0x1, 0xd1, 0xd, 0x9, 0x1002, 0xffffffff, 0x6, 0x3, 0xfffffffb, 0xffff, 0xff, 0x5, 0xe, 0x401, 0x2, 0x8cc5, 0x8, 0x159, 0xfffffff7, 0x81, 0x382ae49d, 0x9, 0xffffffff, 0xffff, 0xdf3b, 0x8d, 0x6, 0xfffffef7, 0x89c3, 0x6319da67, 0x5, 0x9, 0x2, 0xfffff801, 0x2, 0x5, 0x5, 0x7, 0x7, 0x7f, 0x7, 0x1, 0x0, 0xffffffff, 0xdfed, 0xb, 0x77, 0x7, 0xff, 0xb331, 0x9, 0x6, 0x9, 0x7, 0x5, 0x400, 0x10001, 0x1, 0x800, 0x6000, 0xfe000000, 0xfffffffd]}]}}]}, 0x468}}, 0x0) r7 = syz_open_pts(r2, 0x0) fcntl$setlease(r2, 0x400, 0x2) ioctl$TIOCSSOFTCAR(r7, 0x541a, &(0x7f0000000080)=0x2) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BLKDISCARDZEROES(r8, 0x127c, &(0x7f00000000c0)) 1m48.868870001s ago: executing program 2 (id=432): pwritev(0xffffffffffffffff, 0x0, 0x0, 0xbec, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r2, 0x1, 0xc, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfe, 0x0, 0x7ffc0002}]}) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYRES16], 0x14}}, 0x4004800) write$UHID_CREATE(r3, &(0x7f0000000080)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/15, 0xf, 0xa0, 0x6, 0x3, 0x5, 0x1635}}, 0x120) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x17, &(0x7f0000000ac0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008520000004000000185500000d000000000000000000000040d1760f010001008520000005000000950000000000000018470000fbffffff0000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2000, 0x0) msgrcv(r5, &(0x7f0000001080)={0x0, ""/1}, 0x2000, 0x2, 0x3000) msgctl$IPC_SET(r5, 0x1, &(0x7f00000004c0)={{0x0, 0xee00, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xb, 0x6f76, 0x7, 0x0, 0x1, 0x8, 0x7f, 0x3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'ipvlan1\x00'}) 1m47.376355818s ago: executing program 2 (id=448): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x81, 0xfffff024}, {0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r2, 0x0, 0x401}, 0x11) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000100)={0x4, 0xfffffffd, 0x0, 'queue1\x00', 0xfffffffa}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue0\x00'}) sendmmsg(r0, &(0x7f0000000180), 0x4000190, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00"/13], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000010"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000140)={0x0, 0xc, 0x0, 0x0, 0x0, "810000cc2b000000000000fa25ffff00ffffff"}) syz_emit_ethernet(0xbe, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c20000000800450000b000000000002f9078ac1e0001e0000001780100000000000000dbdd9ede7e2313a7a23925f03dbbcf5cde982cab6b38bf7b463ae5f42c35dd1d6a7710ebcf55344ae76b375fa62e3502b74659d7dbde072d61b6238412ad5f1a0a4f358515e45cea781c9e9b26806f68dd72b3bd460f4ebd662f8cd823dfd0d963970deffa6dd57d8176d2b54e3bc06c34c945e45e27e747494b407f256d9ddc3e6e1f7c5f7b4c5e69c1dd7200000000000000"], 0x0) r7 = syz_open_pts(r6, 0x141601) ioctl$TIOCCBRK(r7, 0x5428) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r5, 0x0, 0x4b}, 0x18) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), r8) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}, 0x1, 0x0, 0x0, 0x4008040}, 0x0) 1m47.193341172s ago: executing program 33 (id=448): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x81, 0xfffff024}, {0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r2, 0x0, 0x401}, 0x11) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000100)={0x4, 0xfffffffd, 0x0, 'queue1\x00', 0xfffffffa}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue0\x00'}) sendmmsg(r0, &(0x7f0000000180), 0x4000190, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00"/13], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000010"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000140)={0x0, 0xc, 0x0, 0x0, 0x0, "810000cc2b000000000000fa25ffff00ffffff"}) syz_emit_ethernet(0xbe, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c20000000800450000b000000000002f9078ac1e0001e0000001780100000000000000dbdd9ede7e2313a7a23925f03dbbcf5cde982cab6b38bf7b463ae5f42c35dd1d6a7710ebcf55344ae76b375fa62e3502b74659d7dbde072d61b6238412ad5f1a0a4f358515e45cea781c9e9b26806f68dd72b3bd460f4ebd662f8cd823dfd0d963970deffa6dd57d8176d2b54e3bc06c34c945e45e27e747494b407f256d9ddc3e6e1f7c5f7b4c5e69c1dd7200000000000000"], 0x0) r7 = syz_open_pts(r6, 0x141601) ioctl$TIOCCBRK(r7, 0x5428) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r5, 0x0, 0x4b}, 0x18) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), r8) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}, 0x1, 0x0, 0x0, 0x4008040}, 0x0) 1m42.946855104s ago: executing program 34 (id=482): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0x42, 0x4, 0x12f0, 0xffffffff, 0x98, 0x0, 0x98, 0xffffffff, 0xffffffff, 0x1258, 0x1258, 0x1258, 0xffffffff, 0x5, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'netpci0\x00', 'nr0\x00', {}, {}, 0x0, 0x2}, 0x74000002, 0x70, 0x98, 0x1ba, {0x46010000, 0x2c000000000000}}, @REJECT={0x28}}, {{@ip={@empty, @remote, 0xff, 0x0, 'veth0_to_batadv\x00', 'team_slave_1\x00'}, 0x287, 0x10e8, 0x1128, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0x0, 0x1, 0x0, 0x0, './cgroup.cpu/syz1\x00', 0x0, {0x4000000000000000}}}, @common=@unspec=@limit={{0x48}, {0xfffffffe, 0x7, 0x0, 0x2, 0x0, 0x0, 0x2}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x3, {0x8}}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x1ff, 0x2, 0x1}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x1350) syz_io_uring_setup(0x65f7, &(0x7f00000002c0)={0x0, 0x403594, 0x200, 0x1103, 0x21e}, &(0x7f0000000240), &(0x7f0000000340)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x20) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001500)=ANY=[@ANYRES32, @ANYRES32], 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000f80)=ANY=[@ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES64], 0x20) r1 = bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@ifindex, 0xffffffffffffffff, 0x37, 0x2010, 0x0, @value=r1}, 0x20) gettid() r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000000085000000730000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='mm_page_free\x00', r2, 0x0, 0x1}, 0x18) r3 = socket(0x11, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'gre0\x00', 0x0}) bind$packet(r3, &(0x7f0000000180)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r3, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="02017d29012918000e3580009f0001140000002f0600ac141414e0000003808a8972bd0b72e41082b1a3d2061fd7fdfe4b88942a31f48597e36e039b1c599db6e466749c2d4c8303a0f7fbda34fb8825f80200e3c0aba61f63047d2900ffffca88faca"], 0xdd12}], 0x1}, 0x0) 1m34.840192587s ago: executing program 35 (id=550): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000218c0000000c0a01030000000000000000070000090900020073797a31000000000900010073797a3000000000600003805c000080080003400000000250000b802c0001800a0001006c696d69740000001c0002800c00024000000000000000000c0001400000000000000003200001800a000100"], 0x110}}, 0x0) 1m33.635762791s ago: executing program 36 (id=566): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newtaction={0x18, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x20048005}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000191c0)=ANY=[@ANYBLOB="010000000b00000005001000030000", @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000002"], 0x48) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[], 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$lock(r5, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r5, 0x26, &(0x7f0000000280)={0x1, 0x0, 0x9, 0x9}) fcntl$lock(r5, 0x7, &(0x7f0000000140)={0x1, 0x1, 0x7, 0x5}) r6 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r5, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000005c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fcdbdf2507000000040001801c00018008000100", @ANYRES32=r4, @ANYBLOB="080003800100000008000300020000003c3000", @ANYRES32, @ANYBLOB="1400020070696d7265673000000000000000000008000100", @ANYRES32=r4, @ANYBLOB="1400020077673000000000000000000000000000140001800800030002000000080003000200"], 0x84}, 0x1, 0x0, 0x0, 0x40040}, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r7, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x8) writev(r6, &(0x7f0000000180)=[{&(0x7f00000002c0)='=', 0x1}], 0x1) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r8, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000"], 0x48) 1m30.360077418s ago: executing program 9 (id=611): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4734}}, 0x10) socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$sock(r1, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 1m28.364378644s ago: executing program 37 (id=654): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) socket$inet_mptcp(0x2, 0x1, 0x106) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f000008c000/0x3000)=nil], 0x0, &(0x7f0000002240), 0x0) 1m28.15562035s ago: executing program 9 (id=657): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/power/image_size', 0x129a82, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@getqdisc={0x24, 0x26, 0x1, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xb}, {0xa, 0xa}}}, 0x24}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f00000003c0)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000006"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4039, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x81, 0x8}, 0x9092, 0x0, 0x43a1bd76, 0x9, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) fcntl$lock(r1, 0x5, &(0x7f0000000000)={0x2, 0x1, 0xe8, 0x6}) 1m28.144261491s ago: executing program 38 (id=657): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/power/image_size', 0x129a82, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@getqdisc={0x24, 0x26, 0x1, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xb}, {0xa, 0xa}}}, 0x24}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f00000003c0)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000006"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4039, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x81, 0x8}, 0x9092, 0x0, 0x43a1bd76, 0x9, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) fcntl$lock(r1, 0x5, &(0x7f0000000000)={0x2, 0x1, 0xe8, 0x6}) 1m27.180315986s ago: executing program 39 (id=672): r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x57, 0x20000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x20, &(0x7f0000000400)={&(0x7f0000000380)=""/5, 0x5, 0x0, &(0x7f00000003c0)=""/26, 0x1a}}, 0x10) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x8, r0}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xb, 0x2b, &(0x7f0000000100)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x79dc}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7ff}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1a28}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ldst={0x3, 0x0, 0x1, 0xa, 0x0, 0x1, 0xfffffffffffffffc}], &(0x7f0000000280)='syzkaller\x00', 0x2, 0xb, &(0x7f00000002c0)=""/11, 0x1e00, 0x5, '\x00', r2, @fallback=0x20, r0, 0x8, &(0x7f0000000340)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, r3, r0, 0x0, &(0x7f0000000500)=[r0, r4, 0xffffffffffffffff, r0, r0], 0x0, 0x10, 0x100}, 0x94) r6 = pidfd_getfd(r0, r5, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x18214000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x81}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4e861}, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000700)={0x1, 0x5, [@random="941ff814a00d", @empty, @random="4573d5a2fe50", @empty, @empty]}) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, &(0x7f0000000740)) setxattr$trusted_overlay_upper(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), &(0x7f0000000800)={0x0, 0xfb, 0x88, 0x0, 0x9, "f22039b6745e97a6b253dcd9d99b0354", "9f3b59ea63a2cabc571b2c21fdad5a1787d992c307f01cdff1165c5b1df1a749f5404ea9806d6ba77f69601aa1fa2cec35cd737d415e0971b4a367f4ee3404584a77e29d2d03aa31bade5a3e1dc9f850b0836eb5bbd85c3cfc7bba7170994d049ef60547baec3f13d8941bcbccd55cd70b21c4"}, 0x88, 0x2) socket$caif_seqpacket(0x25, 0x5, 0x2) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000a00)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000900)={0xb4, 0x2, 0x6, 0x201, 0x0, 0x0, {0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x48, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x8}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x8}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x7}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x18}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000a80)={0x1, &(0x7f0000000a40)=[{0x5, 0x7, 0x9, 0x2}]}) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b00), r0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x24, r7, 0x300, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4c000}, 0x20000040) acct(&(0x7f0000000c00)='./file0\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000cc0)={{r4}, &(0x7f0000000c40), &(0x7f0000000c80)=r5}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x4, 0x0, r1, 0xc0000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x3, 0x4}, 0x50) r8 = accept(r6, &(0x7f0000000d80)=@l2tp6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000e00)=0x80) sendmmsg(r8, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000e40)="db5b9a0450d36998f7919ef04f1b378b087ef2fb6aa947d92b8fb85d93c904fa213be1351625f8841864cef6b277690c511637cc12ae13ebbbd13802eda543f037ac149af76d54a09bc33923407c139a3b826272f884a9da537114c42d745d070bb07e5235ec3bc68eb00f8e09d3c7d341e9f8100fa9a2ce66fb9f20f7c842adc0f8a9949f94350d76bb269c3812df21be8a71753ca7bc6293dc7cd0e959f308e116907645de45844a65138cd8db73c40192502bad1f7b00126cd364007cd26d05f9", 0xc2}, {&(0x7f0000000f40)="f4da957d1110b1506f623701bb46f4deb4e415946c7d56ca68ffe3165fcc8f058ae85717fdadb6c50acbec0d971beca337d81fba6514abea063dca610a820a530e427378d9a9670f55ba19180c2d1d12e5835426b88f00e744de2f279e4d1f9ebe4bf0", 0x63}, {&(0x7f0000000fc0)="034d194d15c30c7b340080bd475f0cadc55a8f922568e9866d8fc90dde22309f853d63fdb3d2421802be7949dab616203420161133f6903bb8dcf7d69c8f5cef6a2aeb3dae859ffce7f39ed87e97d70970703c931b031ddf", 0x58}, {&(0x7f0000001040)="0819e97741fb6ea8b14641ed846f69d5cfdea59fd0b77a05dae442d179846a74933988240598e37982065830a14bf72e12b8760f7696a328aea8013945bcd100cb052e99169708b737845cad597903dc4fcaee44ed4a85506901a8599251a6e955139ac09203324fb24054e2929f080445c8dc1171e351d097d9cbfb3d2562e9bb351bac419efdc1c72cec8239140737dd2ef38bdf218e1223a46aa9cb9f14b5f03aa1aaec5834bd60f770c9a5b352d7a70e930f632f77e9689277fe3c2f5c6de9a50fba4156d9d6d7facbdf93b679b7fe5b0f983c6de5d825d80e6d4769d62812416b54", 0xe4}, {&(0x7f0000001140)="58a119b1e88ba56123d0012c48ba82332fe65eea67d5130dec22f1e266cdbbe7da49e5313ae9f27546cfc3ea21792fa1b298e9f255877cdcbe766ba2dfc211348ea01566a4437108144ee6aa9de9320c", 0x50}, {&(0x7f00000011c0)="b6d683d73832f4a169869e806a6afcf092fa4a546574cf3201ceba0d604a65f77c0642f80d39eac58614e0255d6471288b1acfcff9634be8ef16917c5c26579356e558d77d4e888f2def9d49bec594986b1b26ea45dee9cda1ef11411bd02fcd26e4289c09e2cc5b3f033c2f91f04a2560b09da954f9cb85a71e00b7c133a076563d58aa3e3b2fbf0c40c5283942", 0x8e}], 0x6, &(0x7f0000001300)=[{0x1010, 0x10b, 0xffffff0d, "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"}, {0x20, 0x116, 0x8, "6af1a7b93c324c28584557da"}, {0xc8, 0x3a, 0x3, "a228bfef90c66a778f7420de2bf5e1d4128f14d22d358a4186df81a6c00fc0232ef809f73f5cb02d0d7507b654cb2ce1facd18bb740feb0f400c080303b527480a69bc42d03e4dd338ec86841bf9c6da33e7ce3c6a3b7dee9e1d433fa1a1938454893c1619fd4a2ded7681ec177de860664a9dca758e84e52059058ecc3b894a9ed976f40b29c8ad8dde511e78fa180f089dd710525723f2b69af670ab5c4796440b2cceeb979b4e0e8cb359316e314696069b337d463a61"}], 0x10f8}}, {{&(0x7f0000002400)=@ethernet={0x6, @remote}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002480)="fbc887c08132", 0x6}, {&(0x7f00000024c0)="f9a84ca72c1633932933bef00066738b76f2b1f3a298de4bbe6252fff817f430bb092b73c4c127b126d1472c4cc658e83527ce403c20924072b7082e1c384885a1de1aae", 0x44}, {&(0x7f0000002540)="119d7f8e0d5c8a8f0e90f58040fddc113032312ce7880c88168bac527aa5a3d5b59b8e8834dd5afb5d640380d78a73f1a011dc521b3054c9dbfe61ed4b4a21e5a80f3add63311f776a10235159b04850f427822b9b853a6ce775f342c2468428d66abad2047c4737d5cb60", 0x6b}, {&(0x7f00000025c0)="33064d4b3b946a2a56273480e8f1ad97d85fa879c243cfd7ce1198609fa017887e9f0650d12884e72007520bd185b20e0818636c14898f6e701544a1ed756ed9e32fd9cd8bb23701b9831f2c6e4febeccd93dc66e02c4a5b15967a4d6dc0bd545a03f40dc2e3e5", 0x67}], 0x4, &(0x7f0000002680)=[{0x68, 0x104, 0x7ff, "d5321d06fba68fe29175a698a52f41199398a18fa72981c04f6ea53ce1233c6544272434f60e0c8d45123c148a070fdd4aaea99d9a60fe527bf81689cddde19ed0441ed536601e877eea592cded4a7f87a"}, {0x28, 0xb6c866977cebd9a2, 0xffffff7f, "2ac9a2855480af827d2621dcdc108b5c37845bbb8f2700"}, {0x90, 0x0, 0x0, "0604d25b94fb90166dfc3a02a33455e3dfc28959487319cf99784881771e158d5844986ee07d703fe9a4347ed52532e06648c8ead195ebcb476ddc81c3fc8da56d14672589b48ca6940d9ccb0c534650e39576a6ec5976abeb8a40e3676715fa279140033c42cebd06e544f61696406a45314ac2552ea583eb44d0"}, {0xd8, 0x10a, 0x9, "33b03cf1a4e9b1034c31c5aa06a04f4d92ac2b160ebce1fadf2a3076acb3d9c9c9d069144f74a10468e3be98291f682d9e5bb4ba5b46cf3ebec500ddb02234138c12f1f414d66248302fe097e7394f903f8c924c3f120a53b01cd445413480cc5578ce98e6c1a5accf32f8bebe9c05516198d56f72482129dcc691b7451e369140fde03500981605c3a8ee8ddee4ab863c68e8a2ddd858cfe36c14a0e354a5d81c4f7103bc731730f2e07374ec38bb7bd12c35ee55647d346dbdc97ae7623ba60f1da11e25d2b823"}, {0x100, 0x112, 0x4, "575420f4e2bd0123e712bddec125d738f8f273eab5b3518e92bb962b71c2b6afb47c1c56be0f03ad140919d4ee8e452303cd4fafb2cdc8d22ca17598a17b99b9624af9bd4c1e18d5c0331b1ce5f03b071a04f93e96ae869162312f30d2053818bc56e1e25107e4952e19adbf9ab69a5e1908145f3add01a2abf305e210da23aeca430ac914065a810512b4ee35f51f221d08f2d8b83a95caaf6de6d0dba94e15c83c3d22a3c8e935771fe2f293145eeedde8ab87d32939ba103f61e3b897909378d84b8a65f3e6627833acb31a0ba5c3e7d2fb0ab72d77dce6f0377a824f6578159f68f68b41fa9466"}], 0x2f8}}, {{&(0x7f0000002980)=@sco, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002a00)="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", 0xff}, {&(0x7f0000002b00)="5a74f2532464faed1bd277627c5a200a9e7b4a80be77d879efb5267d42c11afd29db18a18048d9245ff0801e003350242d32b2638f95000814e02f533eed81c3f2237f091338578f6cdee24a3996cf77f65c3fc65d621554d0d877d12557486f4c284477dce59b53a43167fb7622390b04c0eac00945e0996ac9d4b8bbe92114a51f68d36891e034b53fbf9a79092a872668611ff9c55e69aa41a4ac7ed8665f1eb7", 0xa2}, {&(0x7f0000002bc0)="d6e4f043fceea9992b79dbe536f853462899f377cfbd4f326b5b83592ac6f7718cf2c5d2bd360e0bfa02e60ba2dac17a60d901bb91891abc996858c6339a2c9da372701af373c59256c2b42d1728d9ae4fa2f1637db54002ff9d41f332f9b908f8016195ed90704e1e05d7", 0x6b}, {&(0x7f0000002c40)="123616f80e4b09af5f0e032d4943588c8ae2a12f6f0a822efec9cc270ee48b544b4e3363e5c923d7521a0bea7d9b0a19a29a0a184f6e8cf6cfbc3479c3be878947feaff2913160e7f4491a578430bed598684510cd9a1819a0d51ebc7c9961caa8a5790823eb2054c2f3cb6cffa8c76c2b1b393c7158ba4a4e224ee964203b46696e7b2c91e11122f2ebbb92c9fd72de61f9a78618405d41293dca14be9bfbf2058695fa2c01eb521c00e62e16dd93825f73bbbb2acf3e17bcbb93bfeb5971fc2c66e38a82d1ef1ae87b831ebd342282cb3056c5f7a39ac0b3ce4eef4ede8129d76f124eb6fc7993e2f14f", 0xeb}], 0x4, &(0x7f0000002d80)=[{0xb8, 0xc5, 0x5, "b97355d9c992a6db4d17a8212d451183345d8c5181362b7f5eb2e98e89c9bf387cef4dec789874188c0abbad769fbd32ab86b5b84977bd7e0133fe37206851c7e72c41c85251ef18a29df231cad7d337b0dbaeacf89d0e63a9c2634f6a24f5007b3f930f40bfff83c0955c61ef1be558b2034bf17f9d68136b3e55f543f09a325b2afcc01c425052880e893ca312dc87a04459a2c60b996fc45b5b88bb3288263d383cc30e"}, {0x78, 0x109, 0x6, "e6df72ceea22e99f5d69e6c83f3af233d7c7548ba5545426f3a3f7d2a5dca8650ac24464bd461840c2918993f1a50b452696417c918fc0703848473f8b35ae0d0591dd95ad530392b3ea222d0d6b2a085ae5a0895c27a5043851fde84d605a2c5f"}, {0x70, 0x119, 0x1, "23a2231451b35ef5d8ed2b83f1bc08786f82f7e290f2d2a98cf15fe9b2688c519d11702bccd45b8434055a3ada3a344135fed5615b84c1a1353ac9b4e6dda813ec1136a1636323c211c5a507e9171209d0677db4684e8c0521353f"}, {0x110, 0x110, 0x6, "71adfe517f5465678bebbe5860e0c18ca54cfdc506d96cb0dd4857cbbdb567d06311e8430995573cf957b9a576e0406347fbd6a081d4dc966e0a5803853d02d3c2b1881848f345d4bfb12bd994ac3a9bfb43f270c4e1c5ade13ef119218f41c9a0502cb3e0e9d8f951e583754f836f08b704f73b2317a700ce79728509a0f44909f897632ba87f047d050623143c81079cdc441444185174424f0db87c0d4bb39e5b9817c76c4f60547efad6a6c1e04873362a262eb222278c7dbb47be7145c1121caa189f3f15e52bfc6e43ec3493181a178f12e691c4ce88f016460cd10a0714f7177bfecc6f8f33f450341956482597c1b01493fbd08647cafb975a313c"}, {0x68, 0x10a, 0x4, "8d6d6dd6c84630aaf762b69af611e368beeaf679c9328974d18ec51857c884537a3b889694899e813ebf953ba6a3bae5bbbb08109bd640de868fe6e141d460570467baf3a0225a85c5fd7997e55b5940fe07211d84"}, {0x28, 0x10d, 0x8, "35f0c72ebd346bc86ae5aace79eb8348bdad410c31820c96"}, {0x110, 0x0, 0xb, "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"}, {0x88, 0x0, 0x2, "e553911d91c28f26b6dca31000652f0d16c48cb1930e75cce9078f993d63f398a16b9dc0602ccb2e46208309524442d6ee13a7a295a04036d9fef775546170ecbabe0bd6f0d6d35deef1d4e159c6e871b68843ea53ddffeba74fced6723eb8301ed9ca42cfe4048bffd74c2c3d5571f21a"}, {0x68, 0x3a, 0x6, "9a66beb439761b32adb3c750613e7a0b4a07f7efd4fdd44c6aa76a0b6669ac19c2ea17b37119af311a4211f9d4a3583d2ef001bad6e33aad61900695fe5b719b7d9b80a3075d90ae7258e3800bc9d785c986"}, {0x78, 0x115, 0x3, "e47f84395889224b8b6a3ab172dfe1b5a52ff5d130336885be47b9049e557d0c8a9c15511a6cc3850e99e7645b078b0e385b7f6252c3b2c3d92103720364870de10acaf40652689b898a2a2bf4d125290596ba5be73a059891dd74ed34fe467b10"}], 0x5b8}}], 0x3, 0x4008094) read$ptp(r0, &(0x7f0000003400)=""/101, 0x65) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000003480), &(0x7f00000034c0)=0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000003600)={@ifindex=r2, 0x9, 0x1, 0x101, &(0x7f0000003500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000003540)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000035c0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003640)={@cgroup=r0, r5, 0x9, 0x2010, 0x0, @value=r0, @void, @void, @void, r9}, 0x20) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f00000036c0), r0) sendmsg$NL80211_CMD_SET_WIPHY(r6, &(0x7f0000003780)={&(0x7f0000003680)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003740)={&(0x7f0000003700)={0x24, r10, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0x101}, @NL80211_ATTR_WIPHY_ANTENNA_RX={0x8, 0x6a, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044000}, 0x14) recvmsg(r8, &(0x7f0000004c80)={&(0x7f00000037c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000004c00)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000004840)=""/145, 0x91}, {&(0x7f0000004900)=""/227, 0xe3}, {&(0x7f0000004a00)=""/78, 0x4e}, {&(0x7f0000004a80)=""/241, 0xf1}, {&(0x7f0000004b80)=""/104, 0x68}], 0x6}, 0x2040) sendmsg$NFT_MSG_GETRULE(r8, &(0x7f0000004d80)={&(0x7f0000004cc0), 0xc, &(0x7f0000004d40)={&(0x7f0000004d00)={0x20, 0x7, 0xa, 0x3157512b0d9eaddc, 0x0, 0x0, {0xa}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0xc0}, 0x4000080) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000004ec0)={&(0x7f0000004dc0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000004e80)={&(0x7f0000004e40)={0x1c, r10, 0x4, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x45) 1m25.916164845s ago: executing program 40 (id=679): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000280)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 1m23.791213841s ago: executing program 41 (id=686): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = mq_open(&(0x7f0000001880)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\x1c`\xbd\xe1e\x80\x7f\xd2&l0\xc1b\xac\x8b\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL%Jw\x99y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3\x05\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\x81W\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xc8\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xc7\xa7\x82\xb9V}`\xb7\xfc@\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v>\x9b\n0\xb2 h\xad5\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\'/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f9\xce\x1eYV\xa2\xc4\x03PV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x9b\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xc3\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xd1\x06F\xef\xbd\xeb\xf0\'\f\f\x003\xecp\x18\x9e\x1d\xeaH\xdaQ%+\xf4\xae\xab0\b\x17W\xba\xaf4E\xe62\xefm\xdd+\xb2\x1b:\xc0cc\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x97s\x03`\xba\xf1\xdb\x05\xe5C)\x8f\xbchyL1:\xc2\xea\x8a\xfc\tq\xfa\xec&\xc7\xde\xf4\xf2\xb9\xe1\xa1\x80)1\xbe@Bt\xb7\xce\xc9\xee\xa8v\t\xfa,\xa2\x9a\xa3\\\xfbM\xb5\xfd\xa9\xe3\x9f\xf7\x85\x87w\x1d]& 8\xb5\xba\xea\xad\xa9\xd4V\xf1\xe9\xaaT\xc8\xff\xaf\xef\x91\xca\x9c\x80\xbeYd]\xfb\x1a\x96?\xb6\xd7{X\xa1H\xeb\xce\xd7\xb7\xf7\x15\xd6\x88\x91\xef{\xf8K@\xb6ch\x1e\x16\xd5m@\xa8\x91\xa5\xc5@\xa7\x00\xab\xc5\xc8\xc8\x9c\xe3:\xac\x1eG\xa0e\'/\x15G\x8e\xe5\x16\xd5S ]\xf8\xa1\xa46\x9a\xf0d!\xc8\x81S\xbc\x18\xdf\xa0\xfek\xb0(\xf7\xba5\x8e\xe5A\xd5l\xfbp\xcb\xa8\xf0b\x91\xc4\xd3+)Sy\x81\xe3\r%C\x03enM\xf1\xdf\xe3b\xb7\x9b\f\x82\xb1z\xcf^\x06\xcd\xa2\x96\xe3\xd5\xbd@1\xbe\x02\xad\\\x89\xd0\xe0\xa8\x11\xb4B\\\x14\\\xed5\x9c\xd7n\x8d\xec\xb5\xcc\xf8q\x00'/1189, 0x42, 0x4, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xa, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r1) 1m21.171493826s ago: executing program 2 (id=658): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, 0x0, &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x3a) 1m21.114619471s ago: executing program 2 (id=695): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x28}, 0x1c) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000004740)={0x0, 0x0, &(0x7f0000004700)={&(0x7f0000004640)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x48001}, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r5 = syz_clone(0x88180000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r6) mount(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r7 = syz_open_procfs(r5, &(0x7f0000000100)='stack\x00') pread64(r7, &(0x7f0000000400)=""/15, 0xf, 0x2) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010100000000000000000200000205000100070000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) 1m20.967893522s ago: executing program 2 (id=696): epoll_create1(0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20000010}, 0x4040011) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) kexec_load(0x1000000, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) 1m20.239598979s ago: executing program 1 (id=700): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) clock_nanosleep(0xb, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4734}}, 0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$kcm(0xa, 0x2, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000100)={{0x84, @remote, 0x4e24, 0x3, 'lblc\x00', 0x16, 0x2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x0, 0x101c8, 0x12d61, 0x12d58}}, 0x44) sendmsg$sock(r4, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 1m20.196498462s ago: executing program 1 (id=703): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, 0x0, &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x3a) 1m20.129101157s ago: executing program 1 (id=704): capset(&(0x7f0000000380)={0x20071026}, &(0x7f0000000040)={0x200000, 0x40200003, 0x151, 0x5, 0x7, 0x8}) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x70c80, 0x181) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00'}) openat$cgroup_ro(r0, &(0x7f0000000240)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) 1m20.128779237s ago: executing program 1 (id=705): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a0000000300000008"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x28}, 0x1c) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000004740)={0x0, 0x0, &(0x7f0000004700)={&(0x7f0000004640)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x48001}, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r5 = syz_clone(0x88180000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r6) mount(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r7 = syz_open_procfs(r5, &(0x7f0000000100)='stack\x00') pread64(r7, &(0x7f0000000400)=""/15, 0xf, 0x2) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010100000000000000000200000205000100070000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) 1m19.698527411s ago: executing program 1 (id=713): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) clock_nanosleep(0xb, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4734}}, 0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$kcm(0xa, 0x2, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000100)={{0x84, @remote, 0x4e24, 0x3, 'lblc\x00', 0x16, 0x2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x0, 0x101c8, 0x12d61, 0x12d58}}, 0x44) sendmsg$sock(r4, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 1m19.474072599s ago: executing program 2 (id=719): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="911003000000000895"], &(0x7f0000000280)='GPL\x00'}, 0x94) 1m19.420985273s ago: executing program 42 (id=719): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="911003000000000895"], &(0x7f0000000280)='GPL\x00'}, 0x94) 1m19.06667762s ago: executing program 1 (id=729): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) fsetxattr$security_selinux(r1, &(0x7f0000000080), &(0x7f0000000000)='system_u:object_r:var_auth_t:s0\x00', 0x63, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) lstat(&(0x7f00000003c0)='./cgroup.cpu/cgroup.procs\x00', &(0x7f00000004c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000e00000f300ff0e07006b17704ec68a1e762d101a3323753a30f586d2aa9e16526e4ca3cf543e7624cc2dcbb0e9789ed2a068508d517e1dfe5953007aa069c1ca2516c7b6e7ff5aefbf2a80d7f5258d2d401d3484418156414da1d8a4a7ff320c79d3e68d5bf171730f7ca2a4fc95d105596db394e4cb75898a7f7f17677f830c98d594b9f13e34d403b645a873c1a24d1902c60e68c6acf4108c7d03a1b05de812bf4aa0c522c6c9e2c19cc5aa8cdc9002813a8eacaa95043b1c1c286efd425df31559ba8d66d4c727dbb58c0c", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x18) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x208a022, 0x0, 0x1, 0x0, &(0x7f0000000000)) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 1m19.063717391s ago: executing program 43 (id=729): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) fsetxattr$security_selinux(r1, &(0x7f0000000080), &(0x7f0000000000)='system_u:object_r:var_auth_t:s0\x00', 0x63, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) lstat(&(0x7f00000003c0)='./cgroup.cpu/cgroup.procs\x00', &(0x7f00000004c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000e00000f300ff0e07006b17704ec68a1e762d101a3323753a30f586d2aa9e16526e4ca3cf543e7624cc2dcbb0e9789ed2a068508d517e1dfe5953007aa069c1ca2516c7b6e7ff5aefbf2a80d7f5258d2d401d3484418156414da1d8a4a7ff320c79d3e68d5bf171730f7ca2a4fc95d105596db394e4cb75898a7f7f17677f830c98d594b9f13e34d403b645a873c1a24d1902c60e68c6acf4108c7d03a1b05de812bf4aa0c522c6c9e2c19cc5aa8cdc9002813a8eacaa95043b1c1c286efd425df31559ba8d66d4c727dbb58c0c", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x18) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x208a022, 0x0, 0x1, 0x0, &(0x7f0000000000)) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 1m14.455028111s ago: executing program 5 (id=776): r0 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = open_tree(0xffffffffffffff9c, 0x0, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x6a1c2, 0x30) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x18) rt_sigprocmask(0x2, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) r2 = socket(0xa, 0x2400000001, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r2) r3 = gettid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x5, &(0x7f0000000400)={0x2, 0xffffffff, 0x1}) rt_tgsigqueueinfo(r4, r3, 0x1b, &(0x7f0000000280)={0xc, 0x0, 0x4}) stat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x3f, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0x10b8}, 0x106) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000004000000", @ANYRESOCT=r4], &(0x7f0000000340)='syzkaller\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r7}, 0x10) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',ver{ion=9p2000,\x00']) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x5) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="1a244316d341f6c2205ee56a1943dbca000000fbdf4f4913705a28bc13a2d1ef4bb08866482b6a42af446ba574b1bfe415a5fb360ccaeb9cff5567aaf28c9e21d9dd30bf8cf01cfe9c6cb299af446c751db3309297446b0b1290f740d56360f6f053b49bf0a431ba5273cfa3c864ea5546b74326623f6f31e8cca2ee5046f6ac5d18b101fd639f593a54e3ab2b7f", @ANYRES32=0x0, @ANYRES32], 0x3c}}, 0x0) 1m14.451178581s ago: executing program 9 (id=730): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x50) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000cc0)={'syztnl0\x00', &(0x7f0000000c40)={'syztnl2\x00', 0x0, 0x4, 0x9a, 0xff, 0x6, 0x14, @dev={0xfe, 0x80, '\x00', 0x2e}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x20, 0x10, 0x9, 0x6}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000d00)={@loopback, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000f40)={0x664, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {}, [{{0x8}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xb88}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x290, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x2, 0x1, 0x0, 0x1}, {0x1000, 0xd, 0x6, 0x100}, {0x7, 0x4, 0x4, 0x6}, {0x3, 0x9, 0x0, 0x7}, {0x10, 0x0, 0xcb, 0x101}, {0x67, 0x2, 0x8, 0x2}, {0x9, 0x54, 0x8}, {0x5, 0x8, 0xb7, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x854}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xb2, 0xce, 0x4, 0x1}]}}}]}}, {{0x8}, {0x58, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x2731, 0x0, 0x3, 0x7fff}, {0x2, 0x2, 0x80, 0x80000000}, {0x4, 0x1, 0x4a, 0x4}, {0x7fff, 0xf3, 0x2}]}}}]}}, {{0x8}, {0x19c, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x2, 0x1e, 0xd, 0x10000}, {0x8000, 0x2, 0x6, 0x800}, {0x8, 0x65, 0x5, 0x2}, {0x8, 0x50, 0x1}, {0x7, 0x0, 0x1, 0x6}, {0x5, 0x2b, 0x4, 0x7468}, {0x6, 0xf, 0xaa, 0x736}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}]}}]}, 0x664}, 0x1, 0x0, 0x0, 0x8000}, 0x24004001) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000f00)='kfree\x00', r8}, 0x18) r9 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x8, 0x0, 0x401}, 0xc) setsockopt$MRT6_FLUSH(r9, 0x29, 0xd4, &(0x7f0000000080)=0xc, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018114000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r10, 0xc4089434, &(0x7f0000000500)={0x0, 0xfffffffffffffff9, 0x1, [0x2, 0x2, 0x1, 0xfffffffffffffff5, 0xfffffffffffffff7], [0x8, 0x7, 0x0, 0x1ff, 0x4c2, 0x5, 0xfffffffffffffffe, 0x27, 0x9, 0xffffffffffffffff, 0x5e, 0x3, 0x7d, 0x1, 0x4, 0x70b0c941, 0xfffffffffffffff8, 0x293b, 0x200, 0xd452, 0xa, 0xa, 0xd721, 0x3, 0xc54, 0x0, 0x0, 0x8001, 0x2, 0x9, 0x7bc235da, 0x8, 0x1, 0x2, 0x4, 0x7, 0xffffffffffffff80, 0x7, 0x5, 0x4, 0x101, 0x2, 0x8, 0xfffffffffffffff4, 0x0, 0x5, 0xa, 0x40, 0x7, 0xa, 0x336, 0x9, 0x1, 0x4, 0x4, 0x6, 0x1d03, 0x9, 0x0, 0x6, 0x1, 0x6, 0x0, 0x22, 0x5, 0x6e8, 0x5, 0x7, 0x3, 0x2, 0x401, 0x1, 0x1, 0x0, 0x6, 0x4, 0x8, 0x9, 0xffffffff80000000, 0x2, 0x1, 0x4, 0xb, 0x20003, 0x6, 0x8000, 0xffffffff00000001, 0x9e1, 0x1, 0xf, 0x6, 0x7fff, 0x80, 0x8000000000008000, 0x5c, 0x8, 0x1ff, 0x4, 0x6, 0x7, 0xfe, 0x1, 0x0, 0x9, 0xffffffffffffffff, 0x80000000, 0xfffffffffffffffe, 0x3, 0x1a66, 0x6, 0xe, 0x5, 0xffffffffffffff81, 0xe, 0x33, 0x79, 0xf, 0x4, 0xc0e, 0x20000000000001, 0x5]}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x80002, 0x0) 1m14.387747966s ago: executing program 5 (id=778): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020e0000150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120000000200fcffffff0000000006003300000000000000000000000000fe8000000000000000000000000000aa00000000000000000000000000000000040003"], 0xa8}}, 0x40000) 1m14.357807408s ago: executing program 5 (id=781): socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6a040000) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB="1ca900006800e978c76be5c59107ae6e0a0000000000000004000400"], 0x1c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000005200000825bd7000ffdbdf25020000009dc610aa12f025900e426d38effe01ddea69806eac534c91ff367edb2f7f9d328f48a468ef160c202fe9e781e1adb7eb60d48c197f7658d5d5a0a7764aaf3fef1a3d8be7f100d284a78153c63ea0170950dfb65dfdaf6694cc9b4e43f0247eb97c19da595c94ab817727a3b4590961e7644b8ee93937b6500d7a1331bad76be8a272b6a983285e1cfe4865e560ccc2456e57fbc50d71ae8f1e52e4572c918b698017824976087dcb", @ANYRES8=r0], 0x14}}, 0x4000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xfffffffffffffda3, &(0x7f0000000180)={&(0x7f0000000880)=ANY=[@ANYBLOB="20000814bf37669bc2b0000000e49527f70000000000000008000100010000001a54412bcf434d93848779193889799a634e0e2d6bdf8eb6ba3b5a06d727ea8e5affff7c6419911526b2ebc6bfb979f24173b5f6d65336682e83ec36017728ba8a7791db54a2090da7fb9eaa7bd8871b0c7d0b149ce88bb3761855d0db90e1fd903fd5804f60ecb130cc55c97e392c0086f15515fc514df1c100d74d76b428039d3ddbbb0babce115318"], 0x20}}, 0x4000000) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r3 = socket$qrtr(0x2a, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="39508b12f28f814e00000000000000000700000a0500010007000000"], 0x1c}, 0x1, 0x0, 0x0, 0x24044811}, 0x40000) connect$qrtr(r3, &(0x7f00000001c0)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) syz_io_uring_setup(0x497, &(0x7f0000000140)={0x0, 0xc69f, 0x400, 0x3, 0x34e}, &(0x7f00000004c0), &(0x7f0000000480)) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r6, 0x0, 0x1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r7 = syz_io_uring_setup(0xa4d, &(0x7f0000000480)={0x0, 0x0, 0x80, 0x1, 0x24f}, &(0x7f00000000c0)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x0, 0x0}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x42, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, {0x2}}) io_uring_enter(r7, 0x47bc, 0x0, 0x0, 0x0, 0x0) 1m14.07826173s ago: executing program 9 (id=783): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x28}, 0x1c) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000004740)={0x0, 0x0, &(0x7f0000004700)={&(0x7f0000004640)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x48001}, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r5 = syz_clone(0x88180000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r6) mount(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r7 = syz_open_procfs(r5, &(0x7f0000000100)='stack\x00') pread64(r7, &(0x7f0000000400)=""/15, 0xf, 0x2) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010100000000000000000200000205000100070000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) 1m14.039751014s ago: executing program 5 (id=784): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, 0x0, &(0x7f00000003c0)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x28}, 0x1c) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000004740)={0x0, 0x0, &(0x7f0000004700)={&(0x7f0000004640)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x48001}, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$eJzs3T9oJFUcB/DvzO565m6RUxtB/AMiooFwdoJNbBQCEoKIoEJExEZJhJhgl1jZWGitksomiJ3RUtIEG0WwipoiNoIGC4OFFiu7k0hMVqNu3Dkynw9MZibz3vzesPN9u83sBmisq0mmk7SSTCbpJCmON7i7Wq4e7q5PbM8nvd4TPxWDdtV+5ajflSRrSR5KslUWeamdrGw+s/fLzmP3vbncuff9zacnxnqRh/b3dh8/eG/2jY9mHlz54qsfZotMp/un6zp/xZD/tYvklv+j2HWiaNc9Av6Judc+/Lqf+1uT3DPIfydlqhfvraUbtjp54N2/6vv2j1/ePs6xAuev1+v03wPXekDjlEm6KcqpJNV2WU5NVZ/hv2ldLl9eXHp18sXF5YUX6p6pgPPSTXYf/eTSx1dO5P/7VpV/4OLq5//JuY1v+9sHrbpHA4zFHdWqn//J51bvj/xD48g/NJf8Q3PJPzSX/ENzyT80l/zDBdb5+8PyD80l/9Bc8g/NdTz/AECz9C7V/QQyUJe65x8AAAAAAAAAAAAAAAAAAOC09Ynt+aNlXDU/eyfZfyRJe1j91uD3iJMbB38v/1z0m/2hqLqN5Nm7RjzBiD6o+enrm76rt/7nd9Zbf3UhWXs9ybV2+/T9Vxzef//dzWcc7zw/YoF/qTix//BT461/0m8b9daf2Uk+7c8/14bNP2VuG6yHzz/ds79i+Uyv/DriCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABib3wMAAP//+kBtTA==") r5 = syz_clone(0x88180000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r6) mount(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r7 = syz_open_procfs(r5, &(0x7f0000000100)='stack\x00') pread64(r7, &(0x7f0000000400)=""/15, 0xf, 0x2) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010100000000000000000200000205000100070000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) 1m13.843340038s ago: executing program 5 (id=786): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x141081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00', 0x800005}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000100)={0x1f00, 0x0, {0x1, 0x0, 0x0, 0x0, 0x80000}, 0x100}) 1m13.8190381s ago: executing program 9 (id=788): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@rights={{0x18, 0x1, 0x1, [r1, r2]}}], 0x18, 0x841}, 0x84) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 1m13.397224574s ago: executing program 5 (id=791): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/power/image_size', 0x129a82, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4039, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x81, 0x8}, 0x9092, 0x0, 0x43a1bd76, 0x9, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x2, 0x1, 0xe8, 0x6}) 1m13.355784357s ago: executing program 44 (id=791): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/power/image_size', 0x129a82, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4039, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x81, 0x8}, 0x9092, 0x0, 0x43a1bd76, 0x9, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x2, 0x1, 0xe8, 0x6}) 1m12.464395217s ago: executing program 9 (id=797): openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000002"], 0x48) r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000280)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 1m12.464165517s ago: executing program 45 (id=797): openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000002"], 0x48) r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000280)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 1m9.507227688s ago: executing program 8 (id=822): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0), 0x4) r4 = fcntl$dupfd(r3, 0x406, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[], 0x14}}, 0x4000) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000002c40)=ANY=[], 0x40c}, 0x1, 0x0, 0x0, 0x90}, 0x8000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x100000, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}, {@cache_mmap}], [{@uid_gt={'uid>', r5}}, {@audit}, {@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'R'}}, {@smackfshat={'smackfshat', 0x3d, 'GPL\x00'}}, {@subj_user={'subj_user', 0x3d, '!/}@.@:]'}}]}}) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$UHID_CREATE2(r6, 0x0, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xd07, 0x7fff}, 0x100b28, 0x6, 0x80, 0x1, 0xb, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x40, 0x9, 0x7ffc0002}]}) ioprio_get$uid(0x3, 0x0) 1m9.256314587s ago: executing program 8 (id=825): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8ff20c2c10f0093d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) sched_rr_get_interval(0x0, &(0x7f00000000c0)) 1m9.208285911s ago: executing program 8 (id=826): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newtaction={0x18, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x20048005}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000191c0)=ANY=[@ANYBLOB="010000000b0000000500", @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000002"], 0x48) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[], 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$lock(r5, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r5, 0x26, 0x0) fcntl$lock(r5, 0x7, &(0x7f0000000140)={0x1, 0x1, 0x7, 0x5}) r6 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r5, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000005c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB, @ANYRES32=r4, @ANYBLOB, @ANYRES32, @ANYBLOB="1400020070696d7265673000000000000000000008000100", @ANYRES32=r4, @ANYBLOB="1400020077673000000000000000000000000000140001800800030002000000080003000200"], 0x84}, 0x1, 0x0, 0x0, 0x40040}, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r7, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x8) writev(r6, &(0x7f0000000180)=[{&(0x7f00000002c0)='=', 0x1}], 0x1) sendto$inet6(r7, 0x0, 0xfc00, 0x700, 0x0, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r8, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000"], 0x48) 1m9.122062988s ago: executing program 8 (id=828): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, 0x0, &(0x7f00000003c0)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x28}, 0x1c) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000004740)={0x0, 0x0, &(0x7f0000004700)={&(0x7f0000004640)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x48001}, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r5 = syz_clone(0x88180000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r6) mount(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r7 = syz_open_procfs(r5, &(0x7f0000000100)='stack\x00') pread64(r7, &(0x7f0000000400)=""/15, 0xf, 0x2) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000306010100000000000000000200000205000100070000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) 1m8.871404807s ago: executing program 8 (id=832): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) r1 = socket(0x1, 0x803, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400"], 0x50) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@xdp, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000040)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000200)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x0, 0x1170, 0x1170, 0x0, 0x1170, 0x298, 0x1398, 0x1398, 0x298, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @private2={0xfc, 0x2, '\x00', 0x1}, [0xffffffff, 0xff000000], [0x0, 0x0, 0x0, 0xffffff00], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x2e, 0x0, 0x0, 0x46}, 0x0, 0x188, 0x1a8, 0x0, {}, [@common=@inet=@socket2={{0x28}, 0x1}, @common=@unspec=@conntrack1={{0xb8}, {{@ipv4=@loopback, [0x0, 0xff000000, 0xffffff00, 0xff], @ipv6=@private1, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}, [0xffffff00, 0xffffff00], @ipv4=@local, [0xffffffff, 0xffffff00, 0x0, 0xffff00], 0x0, 0x8, 0x8, 0x4e22, 0x4e21, 0x4e23, 0x4e20, 0x100, 0x1240}, 0x81, 0x41}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) r7 = syz_open_dev$usbfs(&(0x7f0000000080), 0x74, 0x101301) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000003c0)={'veth0_vlan\x00', &(0x7f0000000340)=@ethtool_coalesce={0xf, 0x2, 0x730, 0x59, 0x2, 0xfffc, 0x9f34, 0x2, 0xbdb4, 0x80000000, 0xb, 0x459, 0x80000000, 0x8, 0x4f6797b1, 0x8001, 0xa9, 0xa, 0x5, 0xcf, 0x80007, 0x2f6, 0x10}}) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000600)="e5f1fddfe175759743a2d6055bef6ad67f4806ff6ac3a93555c1b5b84294df29b09e92680ca8bd3dc842c3147716237f0ad0c3ab59f41083aeb894e76f3c7fc753f2fca40d24553fdd9396171c35ecfd0932f37aa306040bd37f78526b319e572be0ae8b40f01b3835c385e789683bed9c65ccd19545b738fb470ef7c7247c631882fe3cee1ad627ad729a685446e0c1b6ca16a98bececc6ed604084f0", 0x9d}, {0x0}, {0x0}], 0x3}, 0x20000044) 1m6.632900272s ago: executing program 8 (id=863): socket$can_raw(0x1d, 0x3, 0x1) r0 = syz_io_uring_setup(0x2050, &(0x7f0000001480)={0x0, 0x200b360, 0x400, 0x7, 0x40224}, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x6, 0x0, 0x3a) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r4, 0x1, 0x1e, 0x0, &(0x7f0000000100)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x118, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x10, 0x0, r0, 0x0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x530}, 0x0, 0x1000}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x50, 0x0, 0x5, 0x2, &(0x7f0000000580)="b0f5914152e33c0e28c8f95cbb7be7cb58dbfb271202cbb027dce09afad6a0a723ed1efb32bd03ed8a4ad7b3ba35f20d7f86f18525f0788881ad4fbb4d9c2f9abb86e6c4a6ccb616ac0d297933c2f2841a85f38e562ae2823a62b765e47fde8eac41610189999b0e85639bb348c9b15f5a8dbb4c3ca5855e3e4d18ff0c60b52ce1543a4afda438dabee1d826f4905022eb1671762ee6ede6b7b797eb0321dd67658b47a25a8082ec0b69d3d4c1b3b57ee188f0b315fe9245f448a962bed61bad2d23b0f917d91b5588afa351bfda92a7a650d0c2cb4093895187a614d9b62b8eb74fb4b41cd95d5dda36683f0d8951abc202d9abe46d4b97", 0x401, 0x0, 0x0, {0x3, r6}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r5}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='ceph\x00', 0x0, &(0x7f0000000080)="010000000037a788a11d1f000000000000006923c63a4541062101b60a2156566de77062086575a59ea9cb", 0x2b, r10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000f00)='kfree\x00', r11, 0x0, 0x34}, 0x18) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="a0010000100001000000000000000000fc010000000000000000000000000000000000000000000000000000000000000000ecdf00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x1a0}}, 0x0) timer_create(0x0, 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f02, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r13, 0x0, 0x1075}, 0x18) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) brk(0x200000ffc000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1m6.606240314s ago: executing program 46 (id=863): socket$can_raw(0x1d, 0x3, 0x1) r0 = syz_io_uring_setup(0x2050, &(0x7f0000001480)={0x0, 0x200b360, 0x400, 0x7, 0x40224}, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x6, 0x0, 0x3a) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r4, 0x1, 0x1e, 0x0, &(0x7f0000000100)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x118, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x10, 0x0, r0, 0x0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x530}, 0x0, 0x1000}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x50, 0x0, 0x5, 0x2, &(0x7f0000000580)="b0f5914152e33c0e28c8f95cbb7be7cb58dbfb271202cbb027dce09afad6a0a723ed1efb32bd03ed8a4ad7b3ba35f20d7f86f18525f0788881ad4fbb4d9c2f9abb86e6c4a6ccb616ac0d297933c2f2841a85f38e562ae2823a62b765e47fde8eac41610189999b0e85639bb348c9b15f5a8dbb4c3ca5855e3e4d18ff0c60b52ce1543a4afda438dabee1d826f4905022eb1671762ee6ede6b7b797eb0321dd67658b47a25a8082ec0b69d3d4c1b3b57ee188f0b315fe9245f448a962bed61bad2d23b0f917d91b5588afa351bfda92a7a650d0c2cb4093895187a614d9b62b8eb74fb4b41cd95d5dda36683f0d8951abc202d9abe46d4b97", 0x401, 0x0, 0x0, {0x3, r6}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r5}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='ceph\x00', 0x0, &(0x7f0000000080)="010000000037a788a11d1f000000000000006923c63a4541062101b60a2156566de77062086575a59ea9cb", 0x2b, r10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000f00)='kfree\x00', r11, 0x0, 0x34}, 0x18) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="a0010000100001000000000000000000fc010000000000000000000000000000000000000000000000000000000000000000ecdf00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x1a0}}, 0x0) timer_create(0x0, 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f02, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r13, 0x0, 0x1075}, 0x18) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) brk(0x200000ffc000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 705.116165ms ago: executing program 4 (id=1181): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x8}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0000002000090002000000ffdbdf250200000008000800", @ANYRES32=r2], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 661.259239ms ago: executing program 4 (id=1185): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000711823000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r2 = socket(0x848000000015, 0x805, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000001095000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_clone3(&(0x7f00000006c0)={0x81002800, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000000200), {0x1a}, &(0x7f0000000500)=""/222, 0xde, &(0x7f0000000600)=""/184, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) fcntl$lock(r0, 0x24, &(0x7f0000000740)={0x2, 0x1, 0x5, 0xfffffffffffffff6, r4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0x3}, 0x18) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000001000000850000000e000000850000000500000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000780)='xprtrdma_nomrs_err\x00', r6, 0x0, 0x4804}, 0x18) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x18) socket$nl_route(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0x201100, 0x4c) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14140f000000000000fdffff7fffffffff0000ffffffff00000000000000000d0001006564703a73"], 0x54}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r9, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c76657273696f6e3d3970323030302c02"]) write$P9_RVERSION(r10, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRESHEX=r10], 0x15) 555.224377ms ago: executing program 4 (id=1188): bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="5500000020007fafb72d13b2a4a2719302000000030b43026c26236925000400fe7f0080bd2dca8a9848a3c728f1c46b7b31afdc1338d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade", 0x55}], 0x1}, 0x80) 453.986265ms ago: executing program 6 (id=1197): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}, 0x100, 0x0, 0x0, 0x0, 0x54}, 0x9c) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000040)=0xa, 0x4) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x3b, &(0x7f0000000480)=ANY=[], 0xf0) 422.872057ms ago: executing program 3 (id=1198): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000711823000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r2 = socket(0x848000000015, 0x805, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000001095000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_clone3(&(0x7f00000006c0)={0x81002800, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000000200), {0x1a}, &(0x7f0000000500)=""/222, 0xde, &(0x7f0000000600)=""/184, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) fcntl$lock(r0, 0x24, &(0x7f0000000740)={0x2, 0x1, 0x5, 0xfffffffffffffff6, r4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0x3}, 0x18) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000001000000850000000e000000850000000500000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000780)='xprtrdma_nomrs_err\x00', r6, 0x0, 0x4804}, 0x18) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x18) socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0x201100, 0x4c) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14140f000000000000fdffff7fffffffff0000ffffffff00000000000000000d0001006564703a73"], 0x54}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r9, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c76657273696f6e3d3970323030302c02"]) write$P9_RVERSION(r10, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRESHEX=r10], 0x15) 357.662072ms ago: executing program 6 (id=1200): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x1, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x2b24d, 0x11a20}, [@IFLA_IFNAME={0x14, 0x3, 'netdevsim0\x00'}, @IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0xe0, 0xd4, 0x1}}]}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc1}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newtaction={0x68, 0x30, 0xffff, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ife={0x50, 0x1, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0xffffffff}}}, @TCA_IFE_METALST={0x8, 0x6, [@IFE_META_TCINDEX={0x4, 0x2, @void}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x6, 0x2, {0x42}}}]}, 0x38}}, 0x0) sendmsg$GTP_CMD_ECHOREQ(r2, 0x0, 0x40000) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'veth1_vlan\x00', 0x400}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x890}, 0x800) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) rename(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') semctl$IPC_INFO(0x0, 0x1, 0x3, &(0x7f00000004c0)=""/217) 308.907076ms ago: executing program 3 (id=1204): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x6, 0x2, {0x42}}}]}, 0x38}}, 0x0) sendmsg$GTP_CMD_ECHOREQ(r0, 0x0, 0x40000) setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'veth1_vlan\x00', 0x400}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x890}, 0x800) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) rename(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') semctl$IPC_INFO(0x0, 0x1, 0x3, &(0x7f00000004c0)=""/217) 287.711478ms ago: executing program 3 (id=1206): r0 = socket(0xa, 0x5, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a400020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bond0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'vlan1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES16=r1, @ANYBLOB="400d0000000000003000128008000100687372002400028008000200", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRESOCT=r2], 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000140)={@mcast1, 0x6d, r3}) 286.329728ms ago: executing program 7 (id=1207): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, 0x0, &(0x7f0000001700)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) setsockopt$packet_int(r0, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r2, 0x0, 0x5}, 0x18) r3 = syz_socket_connect_nvme_tcp() close(r3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = io_uring_setup(0x780, &(0x7f0000000040)={0x0, 0x20c89f, 0x1c881, 0x1, 0xd1}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x5, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000ad00000066"], 0x0, 0x8}, 0x94) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0xff, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100, 0x0, 0xfffffffc, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) io_uring_enter(r4, 0x0, 0x1000002, 0x37, 0x0, 0x0) 252.142491ms ago: executing program 6 (id=1209): timer_getoverrun(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x1ffffffffffffffd}, 0x18) r1 = syz_io_uring_setup(0x57f9, &(0x7f0000000400)={0x0, 0x5dfc, 0x80, 0x0, 0xbd7f5fff}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f00000002c0)=0x9, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_MKDIRAT={0x25, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000037c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071117100000000008510000002000000850000000500000095040000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) io_uring_enter(r1, 0x5535, 0x3acd, 0x22, 0x0, 0x0) 251.579961ms ago: executing program 7 (id=1210): socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socket$pptp(0x18, 0x1, 0x2) pipe(&(0x7f00000000c0)) pselect6(0x40, &(0x7f00000001c0)={0xa000000, 0x0, 0x20000000000, 0xfffffffffffffffd, 0x0, 0x0, 0x1000001000, 0x49}, 0x0, &(0x7f00000002c0)={0x3ff, 0x7, 0xffffffffffffffff, 0x9, 0x0, 0xf, 0x80000006}, 0x0, 0x0) 238.891611ms ago: executing program 7 (id=1211): mknod(&(0x7f0000000000)='./file0\x00', 0x40, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x4) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="8bd2b9634916e8113d02b86801a272e0a59f687be2574bb1eaf6de9f42", 0x1d}, {&(0x7f00000000c0)="6a335612c6a62ff7e1b6684dad6f6c59bf06a003cf6a14fe40979fd674df395b6f44d728feb528fbbd35b7e6e1de76db4070e35a776a47cc2f5456761b897fa423fe6256cac4b77f1cdc76a746af5bafb767c3ad5e9d7c6dd1028c8239d93d075eae3c083a9daf54bde13de82bde5ecd33fd8bbf26ec8680706020801cd6d4f4a1e898ad36309777d568efaf78", 0x8d}], 0x2, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) io_uring_enter(0xffffffffffffffff, 0xfcd, 0x77e8, 0x40, &(0x7f0000000200)={[0x6]}, 0x8) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000240)=0x5, 0x97, 0x6) r1 = syz_pidfd_open(0xffffffffffffffff, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000280)={0x3, {{0x2, 0x4e24, @remote}}, 0x1, 0x9, [{{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e24, @private=0xa010102}}, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e20, @empty}}]}, 0x510) rename(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='./file0\x00') r3 = signalfd(r1, &(0x7f0000000840)={[0x6]}, 0x8) sendmsg$NFT_BATCH(r3, &(0x7f00000009c0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000980)={&(0x7f00000008c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELSETELEM={0x28, 0xe, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELSETELEM={0x40, 0xe, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x90}, 0x1, 0x0, 0x0, 0x240440c5}, 0x4048048) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000a40), r3) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, r4, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20048890}, 0xd0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000d40)={'gretap0\x00', &(0x7f0000000cc0)={'syztnl0\x00', 0x0, 0x8000, 0x20, 0x7, 0x0, {{0xe, 0x4, 0x0, 0x2, 0x38, 0x68, 0x0, 0x7, 0x4, 0x0, @rand_addr=0x64010100, @remote, {[@timestamp_addr={0x44, 0x24, 0xca, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x11}, 0x1}, {@multicast1}, {@broadcast, 0x7fff}, {@multicast2, 0x7}]}]}}}}}) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000e00)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0x2, '\x00', 0x0, r3, 0x5, 0x2, 0x4}, 0x50) r7 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000e80)={{0x1, 0x1, 0x18, r3, {0xffffff01}}, './file0\x00'}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x18, 0xe, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffe01, 0x0, 0x0, 0x0, 0x2}, [@map_fd={0x18, 0x9, 0x1, 0x0, r3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000bc0)='GPL\x00', 0x6, 0x8d, &(0x7f0000000c00)=""/141, 0x41000, 0x25, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000d80)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000dc0)={0x1, 0x7, 0x2, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000ec0)=[r3, r3, r6, r7, r8, r0, r0, r0], &(0x7f0000000f00)=[{0x1, 0x3, 0x5, 0x3}, {0x5, 0x5, 0x1, 0x3}, {0x1, 0x4, 0x1, 0x1}, {0x0, 0x1, 0x2, 0x9}, {0x4, 0x5, 0x6, 0xb}], 0x10, 0x800}, 0x94) mmap$qrtrtun(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r8, 0x6) fsetxattr$security_ima(r9, &(0x7f0000001040), &(0x7f0000001080)=@sha1={0x1, "f4b14f8dbaa19d0d70b76b7eb4c25d0e834f1269"}, 0x15, 0x3) chroot(&(0x7f00000010c0)='./file0\x00') setxattr$trusted_overlay_origin(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140), &(0x7f0000001180), 0x2, 0x1) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001200), r3) sendmsg$NL80211_CMD_STOP_NAN(r3, &(0x7f00000012c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x14, r10, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) mlockall(0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000001300)={0x0, 0x2, 0x9, 0x2, 0x1}, &(0x7f0000001340)=0x14) setsockopt$inet_sctp_SCTP_AUTH_KEY(r8, 0x84, 0x17, &(0x7f0000001380)={r11, 0x9, 0x9a, "1a154a7a4aa8eb3d009c3445e6603c47d3e186e2b4bb508b39cf941619acf67609bdbdcb7b794bbc619f86fba227c17d4230fd391243dd99f1fe04f65f19a0371c91e7e92dcc6e0876a53dd06c4f1c29099779e14687d139a20d70107c08020776e49d321ffd4d22886251bdd8869c82de7a3d6af8f676b6445dd27257814ce77ac8f55ffe075d7d168f64b4a89209984d2b25b415605085f7ab"}, 0xa2) getsockopt$sock_buf(r2, 0x1, 0x1c, &(0x7f0000001440)=""/139, &(0x7f0000001500)=0x8b) bpf$MAP_CREATE(0x0, &(0x7f0000001540)=@base={0x14, 0x5, 0x6, 0x5, 0x500a8, r7, 0x1, '\x00', r5, r8, 0x1, 0x2, 0x4, 0x0, @void, @value, @value=r8}, 0x50) 208.621844ms ago: executing program 0 (id=1212): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', r3}, 0x18) 208.271484ms ago: executing program 7 (id=1213): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc97c, 0x1, @perf_config_ext={0x2, 0x3}, 0x0, 0xa88, 0x8409, 0x5, 0x0, 0x3c, 0xfffe, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x40000011}) 207.874844ms ago: executing program 3 (id=1214): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000711823000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r2 = socket(0x848000000015, 0x805, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000001095000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_clone3(&(0x7f00000006c0)={0x81002800, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000000200), {0x1a}, &(0x7f0000000500)=""/222, 0xde, &(0x7f0000000600)=""/184, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) fcntl$lock(r0, 0x24, &(0x7f0000000740)={0x2, 0x1, 0x5, 0xfffffffffffffff6, r4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0x3}, 0x18) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000001000000850000000e000000850000000500000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000780)='xprtrdma_nomrs_err\x00', r6, 0x0, 0x4804}, 0x18) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x18) socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0x201100, 0x4c) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14140f000000000000fdffff7fffffffff0000ffffffff00000000000000000d0001006564703a73"], 0x54}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r9, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c76657273696f6e3d3970323030302c02"]) write$P9_RVERSION(r10, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRESHEX=r10], 0x15) 185.723536ms ago: executing program 6 (id=1215): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', r3}, 0x18) (fail_nth: 1) 184.583776ms ago: executing program 4 (id=1216): sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)="ac497f36b085fe052ebba132f25bcc7e82aef7b75af2ffe45803e94434500be29e0450956928ebfbe86c3822bd02b3be4318fe64fb", 0x35}, 0x1, 0x0, 0x0, 0x24000090}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4000010) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000001c0)={'nat\x00', 0x0, 0x0, 0x0, [0xfffffffffffffff7, 0x7fff, 0x67, 0x4, 0x27dcf042, 0x1]}, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff9ce}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x2204098, &(0x7f0000001080)=ANY=[], 0x1, 0x554, &(0x7f0000003580)="$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") open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x1018}, './file0\x00'}) 175.688416ms ago: executing program 7 (id=1217): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd27, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xb, 0xfff3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0xca, 0x9}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000840)=@newtfilter={0x54, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x3}, {}, {0x4, 0xe}}, [@filter_kind_options=@f_u32={{0x8}, {0x28, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0xc, 0x7, 0x1, 0x3d3f, 0x0, 0xfff, 0x3, 0x58f, [{0xebd, 0x1, 0x206, 0x7}]}}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x24040084) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000980)={@private0, 0x0}, &(0x7f0000000ac0)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r5) getsockname$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000370426bd70000000000000000000", @ANYRES32=r6, @ANYBLOB="91410400000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmmsg$inet(r4, &(0x7f00000018c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @multicast1}}}], 0x20}}], 0x1, 0x4880) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000c80)=ANY=[@ANYBLOB="ec000000", @ANYRES16=0x0, @ANYBLOB="040025bd7000fbdbdf25190000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0c00018008000100", @ANYRES32=0x0, @ANYBLOB="6c00018008000300060000000800030002000000140002006d6163766c616e30000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020070696d7265673100000000000000000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="0800030003000000540001800800030003000000083f0000001400029712e15750eb4d4f57006d6163766c616e30000000000000000008000100000000bd15bd5d43f2c2199860f30a2fba61c43e6b70638a7c75d0dadef95fae2136c5a71912118b8b5d322729af8b362cfdb834", @ANYRES32=r6, @ANYBLOB="0800030001000000140002006e6574706369300000000000000000000800030002000000"], 0xec}, 0x1, 0x0, 0x0, 0x80040}, 0x80) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r7, 0x0, 0xfffffffffffffffd}, 0x18) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r8) sendmsg$NL80211_CMD_GET_WIPHY(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0103000000000000000001"], 0x30}, 0x1, 0x0, 0x0, 0x4000004}, 0x44) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) bind$netlink(r10, &(0x7f0000000580)={0x10, 0x0, 0x25dfdbfb, 0x4000000}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone3(&(0x7f0000000500)={0xa000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0, {0x6}, &(0x7f0000000380)=""/132, 0x84, &(0x7f0000000440)=""/163, &(0x7f0000000100)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r13, 0x6, 0x1c, 0x0, &(0x7f0000000140)) fcntl$setownex(r11, 0xf, &(0x7f0000000180)={0x0, r12}) ioctl$sock_SIOCETHTOOL(r11, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_cmd={0x0, 0x80000000, 0xffffffff, 0x9, 0xf, 0x3, 0x3, 0xfc, 0x0, 0xff, 0x0, 0x0, 0x6, 0xff, 0x0, 0x5}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000340)={'tunl0\x00', 0x0}) 174.515197ms ago: executing program 0 (id=1218): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000500)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x6, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x27, &(0x7f0000000000)=""/114}, 0xa8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb43, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x5a, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000081000d007c2197759c1424e775b5bb0a67f706045fa0e1a409ecd32f17ea359dd4d1875a4e8b97fa2856048f8b4de837d00343e78bae93fe87c7fb858a5800"/90], 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRESDEC=r3, @ANYBLOB="000000ad6e87ce6193c58e000800000085000000b60000009528e9c4ddec32a40ac75c4d2b0efeb490348f056fa499943e8a0f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', r5}, 0x18) 114.004431ms ago: executing program 6 (id=1219): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e00000000000000", @ANYRES32, @ANYBLOB="008512aa7e000000b70800000000396f7b8af8ff00000000bfa2000000000000b70400000000000085000000240000009500"/65], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) syz_io_uring_setup(0x14f5, &(0x7f0000000400)={0x0, 0xd144, 0x1000, 0xffffffff, 0x289}, &(0x7f00000001c0)=0x0, &(0x7f0000000140)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r2 = fsopen(&(0x7f0000000080)='mqueue\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000040)='\x00', &(0x7f00000001c0)='dE\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000400)='\xd5@=\b\a:\x993\x00b\x1fU\xe8b\xe0K\xa8\x18:\xab\xbdV\xe3\xb9\xfb\xfd\xe3\xcb\x8f\x84\x0e<{>\xde\xfdj\xe0R\xd3\xee\x82Z\x87\xd6\x8a\x85syZ\xb1|\xf6\x8c\xa9\xd67\x91C\x10+S\x01g\x90\t}\xe4\xa9\xa6\xa3_E\xb7\xe0\x17\xd6S\n\x06\x9f\x83\x80\xa5(kA&\"\xf51T?\x95\xbc\xffC\x9d\x9ar-\xd4\x9e\xa9\xa4)\x11(\xbb:z(\xf7)\xbf.\x8aO\xf4\xdb', &(0x7f0000000600)='dU|\xcbM\xe6\x91q\b', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000100000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) r4 = syz_open_dev$mouse(&(0x7f0000000240), 0x2, 0x238001) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000380)={r5, 0x9}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) prctl$PR_SET_NAME(0xf, &(0x7f00000003c0)='\x00') r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="60010000100013072cbd7000fcdbdf25fc020000000000000000000000000000fc02000000000000c6000000000000000000844d6cf858d3b8a10be521520800204e210002020000003b000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x880}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r7 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0x8}, 0x4010, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r8, @ANYRESOCT=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, 0x0, &(0x7f0000000240)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000900), 0x0) 113.309652ms ago: executing program 3 (id=1220): r0 = socket$inet6(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000e40)=[{{&(0x7f0000000100)={0xa, 0xfffb, 0x1000406, @mcast2, 0x5}, 0x1c, &(0x7f0000000000)=[{&(0x7f00000000c0)="800010430577d401", 0x8}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="14"], 0x18}}], 0x1, 0x4000880) setuid(0xee01) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=@newqdisc={0x68, 0x14, 0xf0b, 0x70bd25, 0x0, {0x2, 0x0, 0x0, 0x0, {0x10, 0x7}, {0x0, 0x8}, {0x1, 0xffe0}}, [@TCA_STAB={0x44, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x7e}}, {0x4}}, {{0x1c, 0x1, {0xa, 0xa5, 0x18, 0x88, 0x2, 0x0, 0x3}}, {0x4}}]}]}, 0x68}}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00"/14], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x100000001}, 0x6144, 0x2, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff7}, 0x94) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x32, r0, 0xffffd000) mremap(&(0x7f0000ffe000/0x2000)=nil, 0xf7ff, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e20, @private=0xa010103}]}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) shmctl$SHM_LOCK(0x0, 0xb) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000200)={r5, 0x9}, 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r5, 0x8}, &(0x7f00000001c0)=0x8) recvfrom$inet6(r0, &(0x7f0000000200)=""/180, 0xb4, 0x10060, 0x0, 0x0) 112.592212ms ago: executing program 4 (id=1221): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, 0x0, &(0x7f0000001700)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) setsockopt$packet_int(r0, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r2, 0x0, 0x5}, 0x18) r3 = syz_socket_connect_nvme_tcp() close(r3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = io_uring_setup(0x780, &(0x7f0000000040)={0x0, 0x20c89f, 0x1c881, 0x1, 0xd1}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x5, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000ad00000066"], 0x0, 0x8}, 0x94) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0xff, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100, 0x0, 0xfffffffc, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4af584f73552a348) io_uring_enter(r4, 0x0, 0x1000002, 0x37, 0x0, 0x0) 112.271962ms ago: executing program 0 (id=1222): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x8}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x50) sendmsg$nl_generic(r1, 0x0, 0x4000) 83.169744ms ago: executing program 3 (id=1223): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e00000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = syz_io_uring_setup(0x14f5, &(0x7f0000000400)={0x0, 0xd144, 0x1000, 0xffffffff, 0x289}, &(0x7f00000001c0)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r1, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='0'], 0x30}}) io_uring_enter(r2, 0x3516, 0xddd6, 0x4, 0x0, 0x0) (fail_nth: 1) 81.874024ms ago: executing program 7 (id=1224): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000400)="cd", 0x1, 0x8010, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffe}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000700), &(0x7f0000000140)=0x8) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r3}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r4, &(0x7f0000000100)=""/44, 0xbb) r5 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) bind$802154_raw(r5, &(0x7f0000000080)={0x24, @short={0x2, 0x2, 0xffff}}, 0x14) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000020180)={'#! ', './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x1000a) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r6, 0x0) 81.344534ms ago: executing program 6 (id=1225): accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000000000285"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000640)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000019200)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0xfffffffffffffffe}, 0x18) io_pgetevents(0x0, 0x2, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x437, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r6, 0x5f501}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TOS={0x5, 0x4, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x40004) sendmmsg$inet(r3, &(0x7f0000000b80)=[{{&(0x7f0000000000)={0x2, 0x4e1c, @local}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @loopback}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x38}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4000) 54.456526ms ago: executing program 0 (id=1226): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0x60, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0d00000002000000040000000640000005000000", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="040000000000000000ee0000"], 0x50) 53.756166ms ago: executing program 4 (id=1227): bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="5500000020007fafb72d13b2a4a2719302000000030b43026c26236925000400fe7f0080bd2dca8a9848a3c728f1c46b7b31afdc1338d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade", 0x55}], 0x1}, 0x80) 356.82µs ago: executing program 0 (id=1228): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x40000011}) 0s ago: executing program 0 (id=1229): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, 0x0, &(0x7f0000001700)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) setsockopt$packet_int(r0, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r2, 0x0, 0x5}, 0x18) r3 = syz_socket_connect_nvme_tcp() close(r3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = io_uring_setup(0x780, &(0x7f0000000040)={0x0, 0x20c89f, 0x1c881, 0x1, 0xd1}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x5, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000ad00000066"], 0x0, 0x8}, 0x94) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0xff, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100, 0x0, 0xfffffffc, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f0000000000)=r5}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4af584f73552a348) io_uring_enter(r4, 0x0, 0x1000002, 0x37, 0x0, 0x0) kernel console output (not intermixed with test programs): rface activated: batadv_slave_0 [ 92.122731][ T5947] veth1_macvtap: entered promiscuous mode [ 92.135110][ T5947] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 92.150884][ T5947] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 92.158692][ T5988] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.171745][ T5859] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 92.184013][ T190] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.191062][ T190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.203775][ T43] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.218569][ T43] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.234853][ T43] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.245056][ T43] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.246854][ T391] IPVS: stop unused estimator thread 0... [ 92.254350][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.266537][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.269702][ T391] IPVS: stop unused estimator thread 0... [ 92.290849][ T43] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.326804][ T43] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.337110][ T43] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.352718][ T43] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.414299][ T6106] loop2: detected capacity change from 0 to 128 [ 92.437004][ T6110] lo speed is unknown, defaulting to 1000 [ 92.452252][ T6110] lo speed is unknown, defaulting to 1000 [ 92.467939][ T6106] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 92.480473][ T6110] lo speed is unknown, defaulting to 1000 [ 92.486438][ T6106] ext4 filesystem being mounted at /1/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 92.513007][ T5988] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.533903][ T6110] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 92.559380][ T5859] EXT4-fs error (device loop2): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 92.564410][ T6110] lo speed is unknown, defaulting to 1000 [ 92.578472][ T5859] EXT4-fs error (device loop2): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 92.580327][ T6110] lo speed is unknown, defaulting to 1000 [ 92.599905][ T6110] lo speed is unknown, defaulting to 1000 [ 92.606087][ T6110] lo speed is unknown, defaulting to 1000 [ 92.612531][ T6110] lo speed is unknown, defaulting to 1000 [ 92.627774][ T6117] netlink: 'syz.1.694': attribute type 4 has an invalid length. [ 92.635455][ T6117] __nla_validate_parse: 1 callbacks suppressed [ 92.635469][ T6117] netlink: 17 bytes leftover after parsing attributes in process `syz.1.694'. [ 92.726485][ T5859] EXT4-fs error (device loop2): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 92.793377][ T5859] EXT4-fs error (device loop2): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 92.882079][ T5988] veth0_vlan: entered promiscuous mode [ 92.898224][ T5988] veth1_vlan: entered promiscuous mode [ 92.913841][ T5859] EXT4-fs error (device loop2): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 92.964171][ T5988] veth0_macvtap: entered promiscuous mode [ 92.982493][ T5988] veth1_macvtap: entered promiscuous mode [ 92.996811][ T5988] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 93.005544][ T5988] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 93.013177][ T5859] EXT4-fs error (device loop2): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 93.031685][ T5859] EXT4-fs error (device loop2): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 93.056715][ T388] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.068665][ T5859] EXT4-fs error (device loop2): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 93.085459][ T388] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.126932][ T388] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.137206][ T5859] EXT4-fs error (device loop2): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 93.154421][ T3522] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.163664][ T5859] EXT4-fs error (device loop2): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 93.191954][ T6127] lo speed is unknown, defaulting to 1000 [ 93.330327][ T6133] loop3: detected capacity change from 0 to 4096 [ 93.337274][ T6133] EXT4-fs: Ignoring removed nomblk_io_submit option [ 93.346467][ T6133] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 93.347228][ T6148] capability: warning: `syz.1.704' uses deprecated v2 capabilities in a way that may be insecure [ 93.377081][ T6142] FAULT_INJECTION: forcing a failure. [ 93.377081][ T6142] name failslab, interval 1, probability 0, space 0, times 0 [ 93.389834][ T6142] CPU: 1 UID: 0 PID: 6142 Comm: syz.0.702 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 93.389902][ T6142] Tainted: [W]=WARN [ 93.389906][ T6142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 93.389913][ T6142] Call Trace: [ 93.389917][ T6142] [ 93.389921][ T6142] __dump_stack+0x1d/0x30 [ 93.389989][ T6142] dump_stack_lvl+0xe8/0x140 [ 93.390036][ T6142] dump_stack+0x15/0x1b [ 93.390047][ T6142] should_fail_ex+0x265/0x280 [ 93.390108][ T6142] should_failslab+0x8c/0xb0 [ 93.390120][ T6142] __kmalloc_node_track_caller_noprof+0xb9/0x5b0 [ 93.390182][ T6142] ? sidtab_sid2str_get+0xa0/0x130 [ 93.390254][ T6142] kmemdup_noprof+0x2b/0x70 [ 93.390342][ T6142] sidtab_sid2str_get+0xa0/0x130 [ 93.390372][ T6142] security_sid_to_context_core+0x1eb/0x2e0 [ 93.390527][ T6142] security_sid_to_context+0x27/0x40 [ 93.390616][ T6142] avc_audit_post_callback+0x10f/0x520 [ 93.390645][ T6142] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 93.390677][ T6142] common_lsm_audit+0x1bb/0x230 [ 93.390766][ T6142] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 93.390824][ T6142] slow_avc_audit+0x104/0x140 [ 93.390880][ T6142] avc_has_perm+0x13a/0x180 [ 93.390897][ T6142] selinux_kernel_load_data+0x128/0x140 [ 93.390926][ T6142] security_kernel_load_data+0x3e/0x80 [ 93.390955][ T6142] __se_sys_kexec_load+0x38/0x160 [ 93.390984][ T6142] __x64_sys_kexec_load+0x55/0x70 [ 93.391008][ T6142] x64_sys_call+0x2e77/0x3000 [ 93.391031][ T6142] do_syscall_64+0xd8/0x2c0 [ 93.391061][ T6142] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.391206][ T6142] RIP: 0033:0x7f83d437f749 [ 93.391219][ T6142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.391236][ T6142] RSP: 002b:00007f83d2ddf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 93.391255][ T6142] RAX: ffffffffffffffda RBX: 00007f83d45d5fa0 RCX: 00007f83d437f749 [ 93.391267][ T6142] RDX: 0000200000000140 RSI: 0000000000000001 RDI: 0000000000000000 [ 93.391278][ T6142] RBP: 00007f83d2ddf090 R08: 0000000000000000 R09: 0000000000000000 [ 93.391291][ T6142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.391322][ T6142] R13: 00007f83d45d6038 R14: 00007f83d45d5fa0 R15: 00007ffeb9507968 [ 93.391340][ T6142] [ 93.641741][ T6152] loop1: detected capacity change from 0 to 128 [ 93.656199][ T6152] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 93.669164][ T6155] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 93.694426][ T6152] ext4 filesystem being mounted at /10/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 93.741364][ T6157] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 93.772999][ T6164] xt_hashlimit: max too large, truncated to 1048576 [ 93.822816][ T5849] EXT4-fs error (device loop1): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 93.837676][ T5849] EXT4-fs error (device loop1): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 93.841119][ T5988] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 93.854582][ T5849] EXT4-fs error (device loop1): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 93.878312][ T5849] EXT4-fs error (device loop1): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 93.892604][ T5849] EXT4-fs error (device loop1): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 93.911476][ T5849] EXT4-fs error (device loop1): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 93.926165][ T5849] EXT4-fs error (device loop1): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 93.954199][ T5849] EXT4-fs error (device loop1): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 93.965977][ T6176] loop5: detected capacity change from 0 to 1024 [ 93.978694][ T5859] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 93.991181][ T6179] loop0: detected capacity change from 0 to 512 [ 93.997743][ T5849] EXT4-fs error (device loop1): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 93.998607][ T6176] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 94.011369][ T5849] EXT4-fs error (device loop1): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 94.074311][ T391] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.131166][ T6194] xt_hashlimit: max too large, truncated to 1048576 [ 94.157834][ T6197] loop3: detected capacity change from 0 to 512 [ 94.170965][ T6197] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 94.213308][ T6197] ext4 filesystem being mounted at /3/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 94.256731][ T6202] lo speed is unknown, defaulting to 1000 [ 94.314095][ T6202] chnl_net:caif_netlink_parms(): no params data found [ 94.346365][ T6202] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.353540][ T6202] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.360721][ T6202] bridge_slave_0: entered allmulticast mode [ 94.367508][ T6202] bridge_slave_0: entered promiscuous mode [ 94.374611][ T6202] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.381670][ T6202] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.388807][ T6202] bridge_slave_1: entered allmulticast mode [ 94.395124][ T6202] bridge_slave_1: entered promiscuous mode [ 94.413350][ T5849] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 94.418340][ T5988] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 94.435026][ T6202] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.453877][ T6202] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.493341][ T6202] team0: Port device team_slave_0 added [ 94.500003][ T6202] team0: Port device team_slave_1 added [ 94.512952][ T6230] serio: Serial port ptm0 [ 94.524065][ T6202] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 94.531070][ T6202] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 94.557070][ T6202] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 94.571028][ T391] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.582336][ T6202] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 94.589339][ T6202] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 94.615298][ T6202] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 94.645420][ T6202] hsr_slave_0: entered promiscuous mode [ 94.651565][ T6202] hsr_slave_1: entered promiscuous mode [ 94.657341][ T6202] debugfs: 'hsr0' already exists in 'hsr' [ 94.663091][ T6202] Cannot create hsr debugfs directory [ 94.684302][ T391] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.703899][ T6227] lo speed is unknown, defaulting to 1000 [ 94.742799][ T391] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.780189][ T6242] xt_hashlimit: max too large, truncated to 1048576 [ 94.813512][ T6227] chnl_net:caif_netlink_parms(): no params data found [ 94.822891][ T5905] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 94.839041][ T6246] loop3: detected capacity change from 0 to 512 [ 94.853381][ T6246] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 94.862829][ T6250] netlink: 'syz.5.734': attribute type 10 has an invalid length. [ 94.871478][ T391] bridge_slave_1: left allmulticast mode [ 94.877144][ T391] bridge_slave_1: left promiscuous mode [ 94.882850][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.886405][ T6246] EXT4-fs error (device loop3): ext4_get_branch:178: inode #13: block 1024: comm syz.3.733: invalid block [ 94.901707][ T6246] EXT4-fs (loop3): Remounting filesystem read-only [ 94.901740][ T391] bridge_slave_0: left allmulticast mode [ 94.908353][ T6246] EXT4-fs (loop3): 1 truncate cleaned up [ 94.913958][ T391] bridge_slave_0: left promiscuous mode [ 94.925235][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.929231][ T6246] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 95.002727][ T391] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 95.012579][ T391] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 95.021792][ T391] bond0 (unregistering): Released all slaves [ 95.034291][ T6250] syz_tun: entered promiscuous mode [ 95.042344][ T6250] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 95.068111][ T6256] netlink: 'syz.5.735': attribute type 10 has an invalid length. [ 95.068297][ T6227] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.083045][ T6227] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.093164][ T6227] bridge_slave_0: entered allmulticast mode [ 95.100027][ T6227] bridge_slave_0: entered promiscuous mode [ 95.107507][ T6227] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.114637][ T6227] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.121999][ T6227] bridge_slave_1: entered allmulticast mode [ 95.128314][ T6227] bridge_slave_1: entered promiscuous mode [ 95.138485][ T391] hsr_slave_0: left promiscuous mode [ 95.144342][ T391] hsr_slave_1: left promiscuous mode [ 95.150829][ T391] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 95.158203][ T391] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 95.165970][ T391] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 95.173500][ T391] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 95.184314][ T391] veth1_macvtap: left promiscuous mode [ 95.192384][ T391] veth0_macvtap: left promiscuous mode [ 95.198097][ T391] veth1_vlan: left promiscuous mode [ 95.207953][ T391] veth0_vlan: left promiscuous mode [ 95.276055][ T391] team0 (unregistering): Port device team_slave_1 removed [ 95.287091][ T391] team0 (unregistering): Port device team_slave_0 removed [ 95.334087][ T6227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 95.345119][ T6246] lo speed is unknown, defaulting to 1000 [ 95.353182][ T6227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 95.434989][ T6227] team0: Port device team_slave_0 added [ 95.492206][ T6227] team0: Port device team_slave_1 added [ 95.535885][ T6227] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 95.542858][ T6227] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 95.568867][ T6227] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 95.587881][ T6227] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 95.594889][ T6227] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 95.620843][ T6227] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 95.681341][ T6202] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 95.690462][ T6202] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 95.711148][ T6202] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 95.735388][ T6202] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 95.752276][ T6227] hsr_slave_0: entered promiscuous mode [ 95.759508][ T6227] hsr_slave_1: entered promiscuous mode [ 95.765730][ T6227] debugfs: 'hsr0' already exists in 'hsr' [ 95.771511][ T6227] Cannot create hsr debugfs directory [ 95.882614][ T391] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 95.906783][ T6202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.916084][ T5988] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 95.937246][ T391] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 95.956914][ T6283] netlink: 4 bytes leftover after parsing attributes in process `syz.3.742'. [ 95.957364][ T6202] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.993603][ T412] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.000690][ T412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.010647][ T6283] xt_hashlimit: max too large, truncated to 1048576 [ 96.018262][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.025385][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.059145][ T391] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 96.113754][ T6290] FAULT_INJECTION: forcing a failure. [ 96.113754][ T6290] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 96.126991][ T6290] CPU: 0 UID: 0 PID: 6290 Comm: syz.5.744 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 96.127097][ T6290] Tainted: [W]=WARN [ 96.127104][ T6290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 96.127117][ T6290] Call Trace: [ 96.127123][ T6290] [ 96.127130][ T6290] __dump_stack+0x1d/0x30 [ 96.127154][ T6290] dump_stack_lvl+0xe8/0x140 [ 96.127232][ T6290] dump_stack+0x15/0x1b [ 96.127252][ T6290] should_fail_ex+0x265/0x280 [ 96.127275][ T6290] should_fail_alloc_page+0xf2/0x100 [ 96.127296][ T6290] __alloc_frozen_pages_noprof+0x109/0x360 [ 96.127329][ T6290] alloc_pages_mpol+0xb3/0x260 [ 96.127425][ T6290] vma_alloc_folio_noprof+0x1aa/0x300 [ 96.127452][ T6290] handle_mm_fault+0xef5/0x2c60 [ 96.127558][ T6290] do_user_addr_fault+0x630/0x1080 [ 96.127591][ T6290] exc_page_fault+0x62/0xa0 [ 96.127615][ T6290] asm_exc_page_fault+0x26/0x30 [ 96.127632][ T6290] RIP: 0033:0x7f733995cc5b [ 96.127725][ T6290] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 96.127754][ T6290] RSP: 002b:00007f733840ce10 EFLAGS: 00010246 [ 96.127768][ T6290] RAX: 00007f733840ef30 RBX: 00007f7339bda640 RCX: 0000000000000000 [ 96.127779][ T6290] RDX: 00007f733840ef78 RSI: 00007f7339a10df8 RDI: 00007f733840ce30 [ 96.127789][ T6290] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 96.127800][ T6290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.127810][ T6290] R13: 00007f7339c06038 R14: 00007f7339c05fa0 R15: 00007ffccf7789e8 [ 96.127885][ T6290] [ 96.127906][ T6290] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 96.187249][ T6295] loop3: detected capacity change from 0 to 1024 [ 96.319290][ T6295] EXT4-fs: Ignoring removed nomblk_io_submit option [ 96.331176][ T6295] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 96.349877][ T391] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 96.371724][ T29] kauditd_printk_skb: 143 callbacks suppressed [ 96.371790][ T29] audit: type=1400 audit(1765732829.035:2519): avc: denied { create } for pid=6293 comm="syz.3.746" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 96.444666][ T29] audit: type=1400 audit(1765732829.095:2520): avc: denied { rename } for pid=6293 comm="syz.3.746" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 96.487736][ T29] audit: type=1400 audit(1765732829.095:2521): avc: denied { unlink } for pid=6293 comm="syz.3.746" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="loop3" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 96.531398][ T29] audit: type=1400 audit(1765732829.095:2522): avc: denied { mounton } for pid=6293 comm="syz.3.746" path="/11/bus/file0" dev="loop3" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 96.554411][ T29] audit: type=1400 audit(1765732829.095:2523): avc: denied { bind } for pid=6297 comm="syz.5.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 96.573724][ T29] audit: type=1400 audit(1765732829.095:2524): avc: denied { name_bind } for pid=6297 comm="syz.5.747" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 96.594215][ T29] audit: type=1400 audit(1765732829.095:2525): avc: denied { node_bind } for pid=6297 comm="syz.5.747" saddr=ff02::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 96.596355][ T6202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.615908][ T29] audit: type=1326 audit(1765732829.095:2526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6297 comm="syz.5.747" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73399af749 code=0x7ffc0000 [ 96.645785][ T29] audit: type=1326 audit(1765732829.095:2527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6297 comm="syz.5.747" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73399af749 code=0x7ffc0000 [ 96.669275][ T29] audit: type=1326 audit(1765732829.095:2528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6297 comm="syz.5.747" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7f73399af749 code=0x7ffc0000 [ 96.799843][ T391] bridge_slave_1: left allmulticast mode [ 96.800824][ T5988] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 96.805487][ T391] bridge_slave_1: left promiscuous mode [ 96.820215][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.821947][ T6318] serio: Serial port ptm0 [ 96.839125][ T391] bridge_slave_0: left allmulticast mode [ 96.844788][ T391] bridge_slave_0: left promiscuous mode [ 96.850448][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.937277][ T6329] netlink: 4 bytes leftover after parsing attributes in process `syz.0.751'. [ 96.971583][ T391] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 96.988974][ T391] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 96.999283][ T391] bond0 (unregistering): Released all slaves [ 97.013525][ T6322] xt_hashlimit: max too large, truncated to 1048576 [ 97.023615][ T6227] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 97.033056][ T6227] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 97.124684][ T6335] lo speed is unknown, defaulting to 1000 [ 97.191406][ T6227] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 97.287362][ T391] hsr_slave_0: left promiscuous mode [ 97.313987][ T391] hsr_slave_1: left promiscuous mode [ 97.332245][ T391] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 97.339653][ T391] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 97.420996][ T391] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 97.428411][ T391] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 97.471608][ T6349] FAULT_INJECTION: forcing a failure. [ 97.471608][ T6349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 97.484696][ T6349] CPU: 0 UID: 0 PID: 6349 Comm: syz.5.757 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 97.484724][ T6349] Tainted: [W]=WARN [ 97.484732][ T6349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 97.484742][ T6349] Call Trace: [ 97.484748][ T6349] [ 97.484756][ T6349] __dump_stack+0x1d/0x30 [ 97.484846][ T6349] dump_stack_lvl+0xe8/0x140 [ 97.484949][ T6349] dump_stack+0x15/0x1b [ 97.484967][ T6349] should_fail_ex+0x265/0x280 [ 97.485020][ T6349] should_fail+0xb/0x20 [ 97.485042][ T6349] should_fail_usercopy+0x1a/0x20 [ 97.485064][ T6349] _copy_from_user+0x1c/0xb0 [ 97.485133][ T6349] __copy_msghdr+0x244/0x300 [ 97.485158][ T6349] ___sys_sendmsg+0x109/0x1d0 [ 97.485198][ T6349] __x64_sys_sendmsg+0xd4/0x160 [ 97.485231][ T6349] x64_sys_call+0x17ba/0x3000 [ 97.485294][ T6349] do_syscall_64+0xd8/0x2c0 [ 97.485335][ T6349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.485358][ T6349] RIP: 0033:0x7f73399af749 [ 97.485374][ T6349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.485393][ T6349] RSP: 002b:00007f733840f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 97.485410][ T6349] RAX: ffffffffffffffda RBX: 00007f7339c05fa0 RCX: 00007f73399af749 [ 97.485427][ T6349] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000004 [ 97.485473][ T6349] RBP: 00007f733840f090 R08: 0000000000000000 R09: 0000000000000000 [ 97.485553][ T6349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.485566][ T6349] R13: 00007f7339c06038 R14: 00007f7339c05fa0 R15: 00007ffccf7789e8 [ 97.485584][ T6349] [ 97.692743][ T391] veth1_macvtap: left promiscuous mode [ 97.698282][ T391] veth0_macvtap: left promiscuous mode [ 97.703971][ T391] veth1_vlan: left promiscuous mode [ 97.709575][ T391] veth0_vlan: left promiscuous mode [ 97.853086][ T391] team0 (unregistering): Port device team_slave_1 removed [ 97.869668][ T391] team0 (unregistering): Port device team_slave_0 removed [ 97.935512][ T6227] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 98.008978][ T6202] veth0_vlan: entered promiscuous mode [ 98.045413][ T6202] veth1_vlan: entered promiscuous mode [ 98.080972][ T6202] veth0_macvtap: entered promiscuous mode [ 98.106759][ T6202] veth1_macvtap: entered promiscuous mode [ 98.128052][ T6227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.159510][ T6202] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 98.195748][ T6227] 8021q: adding VLAN 0 to HW filter on device team0 [ 98.226466][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.233544][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.304354][ T6202] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 98.330515][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.337627][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.348767][ T6374] FAULT_INJECTION: forcing a failure. [ 98.348767][ T6374] name failslab, interval 1, probability 0, space 0, times 0 [ 98.361633][ T6374] CPU: 1 UID: 0 PID: 6374 Comm: syz.0.762 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 98.361710][ T6374] Tainted: [W]=WARN [ 98.361717][ T6374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 98.361730][ T6374] Call Trace: [ 98.361735][ T6374] [ 98.361741][ T6374] __dump_stack+0x1d/0x30 [ 98.361766][ T6374] dump_stack_lvl+0xe8/0x140 [ 98.361861][ T6374] dump_stack+0x15/0x1b [ 98.361882][ T6374] should_fail_ex+0x265/0x280 [ 98.361906][ T6374] should_failslab+0x8c/0xb0 [ 98.361930][ T6374] __kmalloc_noprof+0xb9/0x5a0 [ 98.362023][ T6374] ? copy_splice_read+0xc2/0x660 [ 98.362044][ T6374] copy_splice_read+0xc2/0x660 [ 98.362069][ T6374] ? __pfx_copy_splice_read+0x10/0x10 [ 98.362089][ T6374] splice_direct_to_actor+0x26f/0x680 [ 98.362111][ T6374] ? __pfx_direct_splice_actor+0x10/0x10 [ 98.362164][ T6374] do_splice_direct+0xda/0x150 [ 98.362184][ T6374] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 98.362211][ T6374] do_sendfile+0x380/0x650 [ 98.362242][ T6374] __x64_sys_sendfile64+0x105/0x150 [ 98.362269][ T6374] x64_sys_call+0x2db1/0x3000 [ 98.362294][ T6374] do_syscall_64+0xd8/0x2c0 [ 98.362368][ T6374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.362403][ T6374] RIP: 0033:0x7f83d437f749 [ 98.362416][ T6374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.362434][ T6374] RSP: 002b:00007f83d2ddf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 98.362454][ T6374] RAX: ffffffffffffffda RBX: 00007f83d45d5fa0 RCX: 00007f83d437f749 [ 98.362468][ T6374] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 98.362480][ T6374] RBP: 00007f83d2ddf090 R08: 0000000000000000 R09: 0000000000000000 [ 98.362495][ T6374] R10: 000000007ffff088 R11: 0000000000000246 R12: 0000000000000001 [ 98.362506][ T6374] R13: 00007f83d45d6038 R14: 00007f83d45d5fa0 R15: 00007ffeb9507968 [ 98.362520][ T6374] [ 98.598489][ T31] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.615119][ T31] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.639508][ T31] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.666535][ T3978] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.700209][ T6383] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 98.750837][ T6227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 98.841177][ T6386] netlink: 8 bytes leftover after parsing attributes in process `syz.3.764'. [ 98.854874][ T6411] siw: device registration error -23 [ 98.891397][ T6416] netlink: 8 bytes leftover after parsing attributes in process `syz.7.770'. [ 98.902631][ T6416] netlink: 44 bytes leftover after parsing attributes in process `syz.7.770'. [ 98.906945][ T6227] veth0_vlan: entered promiscuous mode [ 98.921472][ T6227] veth1_vlan: entered promiscuous mode [ 98.939194][ T6227] veth0_macvtap: entered promiscuous mode [ 98.946074][ T6227] veth1_macvtap: entered promiscuous mode [ 98.964242][ T6227] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 98.984270][ T6227] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 98.994842][ T31] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.018628][ T31] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.031367][ T31] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.055326][ T31] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.215460][ T6443] pim6reg: entered allmulticast mode [ 99.255663][ T6450] loop7: detected capacity change from 0 to 512 [ 99.262418][ T6450] EXT4-fs: Ignoring removed i_version option [ 99.268413][ T6450] EXT4-fs: Ignoring removed bh option [ 99.276068][ T6443] pim6reg: left allmulticast mode [ 99.295841][ T6450] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 99.323284][ T6450] ext4 filesystem being mounted at /10/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 99.326305][ T6440] lo speed is unknown, defaulting to 1000 [ 99.334591][ T6446] netlink: 28 bytes leftover after parsing attributes in process `syz.0.779'. [ 99.415145][ T6458] loop9: detected capacity change from 0 to 128 [ 99.429725][ T6458] EXT4-fs (loop9): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 99.490249][ T6458] ext4 filesystem being mounted at /1/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 99.494545][ T6466] loop5: detected capacity change from 0 to 128 [ 99.540634][ T6466] EXT4-fs (loop5): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 99.554109][ T6466] ext4 filesystem being mounted at /27/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 99.608516][ T6462] lo speed is unknown, defaulting to 1000 [ 99.705497][ T6227] EXT4-fs error (device loop9): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 99.710381][ T6202] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 99.730607][ T5905] EXT4-fs error (device loop5): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 99.749207][ T6227] EXT4-fs error (device loop9): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 99.775449][ T6227] EXT4-fs error (device loop9): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 99.788797][ T6227] EXT4-fs error (device loop9): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 99.803650][ T5905] EXT4-fs error (device loop5): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 99.804367][ T6227] EXT4-fs error (device loop9): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 99.851315][ T5905] EXT4-fs error (device loop5): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 99.851606][ T5905] EXT4-fs error (device loop5): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 99.852068][ T5905] EXT4-fs error (device loop5): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 99.863266][ T5905] EXT4-fs error (device loop5): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 99.899340][ T6227] EXT4-fs error (device loop9): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 99.910252][ T6478] tipc: Started in network mode [ 99.924401][ T6478] tipc: Node identity 7f000001, cluster identity 4711 [ 99.925354][ T6478] tipc: Enabled bearer , priority 10 [ 99.931107][ T6478] tipc: Enabled bearer , priority 10 [ 99.931910][ T5905] EXT4-fs error (device loop5): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 99.932132][ T5905] EXT4-fs error (device loop5): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 99.932532][ T5905] EXT4-fs error (device loop5): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 99.932722][ T5905] EXT4-fs error (device loop5): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 99.959544][ T6227] EXT4-fs error (device loop9): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 99.966000][ T6227] EXT4-fs error (device loop9): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 99.966167][ T6227] EXT4-fs error (device loop9): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 99.966425][ T6227] EXT4-fs error (device loop9): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 100.059041][ T5905] bond0: (slave syz_tun): Releasing backup interface [ 100.105830][ T5905] EXT4-fs (loop5): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 100.114723][ T391] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.155779][ T391] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.237483][ T391] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.316566][ T391] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.336395][ T6484] lo speed is unknown, defaulting to 1000 [ 100.518443][ T391] bridge_slave_1: left allmulticast mode [ 100.524166][ T391] bridge_slave_1: left promiscuous mode [ 100.529882][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.537765][ T391] bridge_slave_0: left allmulticast mode [ 100.543495][ T391] bridge_slave_0: left promiscuous mode [ 100.549181][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.559834][ T6497] sg_write: data in/out 178/8 bytes for SCSI command 0xfe-- guessing data in; [ 100.559834][ T6497] program syz.0.793 not setting count and/or reply_len properly [ 100.660656][ T391] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 100.670631][ T391] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 100.680309][ T391] bond0 (unregistering): Released all slaves [ 100.716386][ T6484] chnl_net:caif_netlink_parms(): no params data found [ 100.768232][ T6484] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.775432][ T6484] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.776023][ T6504] loop3: detected capacity change from 0 to 512 [ 100.782701][ T6484] bridge_slave_0: entered allmulticast mode [ 100.795224][ T6484] bridge_slave_0: entered promiscuous mode [ 100.796043][ T6484] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.808241][ T6484] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.815398][ T6484] bridge_slave_1: entered allmulticast mode [ 100.821988][ T6484] bridge_slave_1: entered promiscuous mode [ 100.822080][ T6504] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 100.837311][ T6504] EXT4-fs (loop3): orphan cleanup on readonly fs [ 100.844102][ T391] hsr_slave_0: left promiscuous mode [ 100.845148][ T6504] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.794: corrupted inode contents [ 100.861253][ T391] hsr_slave_1: left promiscuous mode [ 100.866677][ T6504] EXT4-fs error (device loop3): ext4_dirty_inode:6502: inode #16: comm syz.3.794: mark_inode_dirty error [ 100.866916][ T391] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 100.882354][ T6504] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.794: corrupted inode contents [ 100.885379][ T391] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 100.897297][ T6504] EXT4-fs error (device loop3): __ext4_ext_dirty:206: inode #16: comm syz.3.794: mark_inode_dirty error [ 100.915957][ T6504] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.794: corrupted inode contents [ 100.928196][ T391] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 100.935588][ T391] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 100.943182][ T6504] EXT4-fs error (device loop3) in ext4_orphan_del:303: Corrupt filesystem [ 100.945312][ T6511] ALSA: seq fatal error: cannot create timer (-19) [ 100.951928][ T6504] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.794: corrupted inode contents [ 100.958623][ T6511] FAULT_INJECTION: forcing a failure. [ 100.958623][ T6511] name failslab, interval 1, probability 0, space 0, times 0 [ 100.970114][ T6504] EXT4-fs error (device loop3): ext4_truncate:4635: inode #16: comm syz.3.794: mark_inode_dirty error [ 100.982610][ T6511] CPU: 1 UID: 0 PID: 6511 Comm: syz.7.796 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 100.982696][ T6511] Tainted: [W]=WARN [ 100.982702][ T6511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 100.982744][ T6511] Call Trace: [ 100.982750][ T6511] [ 100.982758][ T6511] __dump_stack+0x1d/0x30 [ 100.982782][ T6511] dump_stack_lvl+0xe8/0x140 [ 100.982805][ T6511] dump_stack+0x15/0x1b [ 100.982824][ T6511] should_fail_ex+0x265/0x280 [ 100.982850][ T6511] should_failslab+0x8c/0xb0 [ 100.982945][ T6511] __kmalloc_cache_noprof+0x65/0x4c0 [ 100.982969][ T6511] ? snd_timer_instance_new+0x31/0x160 [ 100.983047][ T6511] snd_timer_instance_new+0x31/0x160 [ 100.983088][ T6511] snd_seq_timer_open+0x12b/0x360 [ 100.983114][ T6511] ? _raw_spin_lock_irqsave+0x75/0xd0 [ 100.983208][ T6511] snd_seq_queue_timer_open+0x10d/0x140 [ 100.983242][ T6511] snd_seq_ioctl_set_queue_timer+0x148/0x1b0 [ 100.983282][ T6511] snd_seq_ioctl+0x177/0x300 [ 100.983315][ T6511] ? __pfx_snd_seq_ioctl+0x10/0x10 [ 100.983343][ T6511] __se_sys_ioctl+0xce/0x140 [ 100.983407][ T6511] __x64_sys_ioctl+0x43/0x50 [ 100.983437][ T6511] x64_sys_call+0x14b0/0x3000 [ 100.983522][ T6511] do_syscall_64+0xd8/0x2c0 [ 100.983631][ T6511] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.983653][ T6511] RIP: 0033:0x7ff503caf749 [ 100.983667][ T6511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.983685][ T6511] RSP: 002b:00007ff50270f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 100.983723][ T6511] RAX: ffffffffffffffda RBX: 00007ff503f05fa0 RCX: 00007ff503caf749 [ 100.983736][ T6511] RDX: 0000200000000100 RSI: 0000000040605346 RDI: 0000000000000003 [ 100.983748][ T6511] RBP: 00007ff50270f090 R08: 0000000000000000 R09: 0000000000000000 [ 100.983760][ T6511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.983773][ T6511] R13: 00007ff503f06038 R14: 00007ff503f05fa0 R15: 00007ffec2de8158 [ 100.983790][ T6511] [ 100.987287][ T6227] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 101.004489][ T6504] EXT4-fs error (device loop3) in ext4_process_orphan:345: Corrupt filesystem [ 101.063890][ T6515] random: crng reseeded on system resumption [ 101.068490][ T391] veth1_macvtap: left promiscuous mode [ 101.120285][ T6504] EXT4-fs (loop3): 1 truncate cleaned up [ 101.123827][ T391] veth0_macvtap: left promiscuous mode [ 101.234874][ T3522] EXT4-fs error (device loop3): ext4_release_dquot:7022: comm kworker/u8:10: Failed to release dquot type 1 [ 101.235325][ T391] veth1_vlan: left promiscuous mode [ 101.247218][ T6504] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 101.251659][ T391] veth0_vlan: left promiscuous mode [ 101.297586][ T6504] EXT4-fs error (device loop3): ext4_lookup:1785: inode #15: comm syz.3.794: iget: bad i_size value: 360287970189639690 [ 101.310731][ T6504] EXT4-fs error (device loop3): ext4_lookup:1785: inode #15: comm syz.3.794: iget: bad i_size value: 360287970189639690 [ 101.323811][ T6504] EXT4-fs error (device loop3): ext4_lookup:1785: inode #15: comm syz.3.794: iget: bad i_size value: 360287970189639690 [ 101.361966][ T391] team0 (unregistering): Port device team_slave_1 removed [ 101.371147][ T391] team0 (unregistering): Port device team_slave_0 removed [ 101.411811][ T3509] tipc: Node number set to 2130706433 [ 101.435033][ T6484] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.457078][ T6520] lo speed is unknown, defaulting to 1000 [ 101.464678][ T6484] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.477919][ T3509] hid-generic 0000:0003:0001.000E: unknown main item tag 0x0 [ 101.485372][ T3509] hid-generic 0000:0003:0001.000E: unknown main item tag 0x0 [ 101.493345][ T3509] hid-generic 0000:0003:0001.000E: hidraw0: HID v0.03 Device [syz0] on syz1 [ 101.508509][ T6484] team0: Port device team_slave_0 added [ 101.525479][ T6484] team0: Port device team_slave_1 added [ 101.545564][ T6516] lo speed is unknown, defaulting to 1000 [ 101.568173][ T6484] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 101.575211][ T6484] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 101.601082][ T6484] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 101.621736][ T5988] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 101.631685][ T6484] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 101.638621][ T6484] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 101.642356][ T4314] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 101.664545][ T6484] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 101.682564][ T4314] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 101.690007][ T4314] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 101.697509][ T4314] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 101.704916][ T4314] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 101.710334][ T29] kauditd_printk_skb: 434 callbacks suppressed [ 101.710347][ T29] audit: type=1400 audit(1765732834.365:2962): avc: denied { create } for pid=6534 comm="syz.7.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 101.712417][ T4314] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 101.745268][ T4314] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 101.752669][ T4314] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 101.761156][ T4314] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [sy] on syz0 [ 101.774634][ T6537] loop3: detected capacity change from 0 to 128 [ 101.784008][ T6537] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 101.802611][ T6537] ext4 filesystem being mounted at /18/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 101.859447][ T6484] hsr_slave_0: entered promiscuous mode [ 101.865573][ T6484] hsr_slave_1: entered promiscuous mode [ 101.949493][ T6516] chnl_net:caif_netlink_parms(): no params data found [ 101.990392][ T6516] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.997520][ T6516] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.005240][ T6516] bridge_slave_0: entered allmulticast mode [ 102.011615][ T6546] netlink: 'syz.7.803': attribute type 4 has an invalid length. [ 102.012119][ T6516] bridge_slave_0: entered promiscuous mode [ 102.019301][ T6546] netlink: 17 bytes leftover after parsing attributes in process `syz.7.803'. [ 102.036218][ T391] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 102.047619][ T6516] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.054713][ T6516] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.061946][ T6516] bridge_slave_1: entered allmulticast mode [ 102.068377][ T6516] bridge_slave_1: entered promiscuous mode [ 102.091357][ T6516] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 102.101851][ T6516] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 102.122767][ T6516] team0: Port device team_slave_0 added [ 102.129030][ T6516] team0: Port device team_slave_1 added [ 102.143953][ T6516] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 102.150910][ T6516] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 102.176857][ T6516] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 102.187858][ T6516] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 102.194949][ T6516] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 102.220885][ T6516] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 102.249731][ T6516] hsr_slave_0: entered promiscuous mode [ 102.255733][ T6516] hsr_slave_1: entered promiscuous mode [ 102.261516][ T6516] debugfs: 'hsr0' already exists in 'hsr' [ 102.267237][ T6516] Cannot create hsr debugfs directory [ 102.286005][ T6552] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 102.340686][ T6484] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 102.349420][ T6484] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 102.357917][ T6484] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 102.368563][ T391] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 102.381318][ T6484] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 102.413421][ T6484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.431333][ T6484] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.442328][ T391] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 102.453943][ T4099] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.460985][ T4099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.472707][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.479761][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.492054][ T391] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 102.545947][ T6484] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.585561][ T391] bridge_slave_1: left allmulticast mode [ 102.591253][ T391] bridge_slave_1: left promiscuous mode [ 102.596894][ T391] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.604818][ T391] bridge_slave_0: left allmulticast mode [ 102.610467][ T391] bridge_slave_0: left promiscuous mode [ 102.616132][ T391] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.626252][ T5988] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 102.679920][ T29] audit: type=1400 audit(1765732835.335:2963): avc: denied { connect } for pid=6575 comm="syz.0.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 102.699450][ T29] audit: type=1326 audit(1765732835.335:2964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6575 comm="syz.0.807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 102.723123][ T29] audit: type=1326 audit(1765732835.335:2965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6575 comm="syz.0.807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=428 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 102.746614][ T29] audit: type=1326 audit(1765732835.335:2966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6575 comm="syz.0.807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 102.770600][ T29] audit: type=1326 audit(1765732835.335:2967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6575 comm="syz.0.807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=442 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 102.793921][ T29] audit: type=1326 audit(1765732835.335:2968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6575 comm="syz.0.807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 102.817282][ T29] audit: type=1326 audit(1765732835.335:2969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6575 comm="syz.0.807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 102.840683][ T29] audit: type=1326 audit(1765732835.335:2970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6575 comm="syz.0.807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 102.863957][ T29] audit: type=1326 audit(1765732835.335:2971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6575 comm="syz.0.807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 102.922685][ T6583] serio: Serial port ptm0 [ 102.952354][ T391] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 102.963192][ T6593] FAULT_INJECTION: forcing a failure. [ 102.963192][ T6593] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.963375][ T391] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 102.976257][ T6593] CPU: 1 UID: 0 PID: 6593 Comm: syz.3.812 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 102.976347][ T6593] Tainted: [W]=WARN [ 102.976354][ T6593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 102.976367][ T6593] Call Trace: [ 102.976453][ T6593] [ 102.976460][ T6593] __dump_stack+0x1d/0x30 [ 102.976484][ T6593] dump_stack_lvl+0xe8/0x140 [ 102.976507][ T6593] dump_stack+0x15/0x1b [ 102.976534][ T6593] should_fail_ex+0x265/0x280 [ 102.976626][ T6593] should_fail+0xb/0x20 [ 102.976645][ T6593] should_fail_usercopy+0x1a/0x20 [ 102.976670][ T6593] _copy_from_user+0x1c/0xb0 [ 102.976698][ T6593] ___sys_sendmsg+0xc1/0x1d0 [ 102.976748][ T6593] __x64_sys_sendmsg+0xd4/0x160 [ 102.976779][ T6593] x64_sys_call+0x17ba/0x3000 [ 102.976804][ T6593] do_syscall_64+0xd8/0x2c0 [ 102.976854][ T6593] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.976883][ T6593] RIP: 0033:0x7f325e14f749 [ 102.976898][ T6593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.976916][ T6593] RSP: 002b:00007f325cbaf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.976936][ T6593] RAX: ffffffffffffffda RBX: 00007f325e3a5fa0 RCX: 00007f325e14f749 [ 102.976949][ T6593] RDX: 0000000024044800 RSI: 0000200000000000 RDI: 0000000000000007 [ 102.976962][ T6593] RBP: 00007f325cbaf090 R08: 0000000000000000 R09: 0000000000000000 [ 102.976975][ T6593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.976987][ T6593] R13: 00007f325e3a6038 R14: 00007f325e3a5fa0 R15: 00007ffcb7b7c048 [ 102.977018][ T6593] [ 103.145156][ T6583] serio: Serial port ptm0 [ 103.156657][ T391] bond0 (unregistering): Released all slaves [ 103.165317][ T36] hid-generic 0000:0003:0001.0010: hidraw0: HID v0.03 Device [syz0] on syz1 [ 103.233427][ T391] hsr_slave_0: left promiscuous mode [ 103.240744][ T391] hsr_slave_1: left promiscuous mode [ 103.246552][ T391] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 103.254025][ T391] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 103.261650][ T391] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 103.269042][ T391] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 103.279522][ T391] veth1_macvtap: left promiscuous mode [ 103.285081][ T391] veth0_macvtap: left promiscuous mode [ 103.293847][ T6604] loop7: detected capacity change from 0 to 128 [ 103.301621][ T391] veth1_vlan: left promiscuous mode [ 103.307611][ T6604] EXT4-fs (loop7): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 103.320130][ T391] veth0_vlan: left promiscuous mode [ 103.325827][ T6604] ext4 filesystem being mounted at /20/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 103.428589][ T391] team0 (unregistering): Port device team_slave_1 removed [ 103.447204][ T391] team0 (unregistering): Port device team_slave_0 removed [ 103.491955][ T6516] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 103.504496][ T6516] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 103.518407][ T6516] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 103.535828][ T6516] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 103.560526][ T6484] veth0_vlan: entered promiscuous mode [ 103.574861][ T6484] veth1_vlan: entered promiscuous mode [ 103.607128][ T6484] veth0_macvtap: entered promiscuous mode [ 103.622326][ T6484] veth1_macvtap: entered promiscuous mode [ 103.632676][ T6516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.648019][ T6484] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.661148][ T6516] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.669822][ T6484] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 103.711948][ T6516] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 103.722413][ T6516] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 103.736744][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.743844][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.753323][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.760423][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.781237][ T388] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.802907][ T388] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.812159][ T388] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.919605][ T388] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.953534][ T6516] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 104.132065][ T6202] EXT4-fs (loop7): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 104.178687][ T6646] vhci_hcd vhci_hcd.3: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 104.298985][ T6646] netlink: 4 bytes leftover after parsing attributes in process `syz.3.823'. [ 104.317709][ T6654] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 104.322730][ T6646] netlink: 12 bytes leftover after parsing attributes in process `syz.3.823'. [ 104.338659][ T6658] siw: device registration error -23 [ 104.407690][ T6666] loop8: detected capacity change from 0 to 128 [ 104.421907][ T6666] EXT4-fs (loop8): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 104.434920][ T6516] veth0_vlan: entered promiscuous mode [ 104.440779][ T6666] ext4 filesystem being mounted at /4/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 104.471157][ T6516] veth1_vlan: entered promiscuous mode [ 104.502814][ T6516] veth0_macvtap: entered promiscuous mode [ 104.511168][ T6516] veth1_macvtap: entered promiscuous mode [ 104.521957][ T6516] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 104.530708][ T6516] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 104.566378][ T6376] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.585213][ T3409] hid-generic 0000:0003:0001.0011: hidraw0: HID v0.03 Device [syz0] on syz1 [ 104.610099][ T6678] netlink: 8 bytes leftover after parsing attributes in process `syz.3.830'. [ 104.633082][ T6484] EXT4-fs error (device loop8): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 104.654088][ T6376] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.670149][ T6376] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.680235][ T6680] netlink: 220 bytes leftover after parsing attributes in process `syz.3.830'. [ 104.689261][ T6376] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.699746][ T6484] EXT4-fs error (device loop8): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 104.714180][ T6484] EXT4-fs error (device loop8): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 104.729886][ T6678] netlink: 4 bytes leftover after parsing attributes in process `syz.3.830'. [ 104.735366][ T6684] loop4: detected capacity change from 0 to 1024 [ 104.745303][ T6484] EXT4-fs error (device loop8): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 104.760931][ T6484] EXT4-fs error (device loop8): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 104.775259][ T6484] EXT4-fs error (device loop8): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 104.788754][ T6484] EXT4-fs error (device loop8): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 104.804035][ T6684] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 104.827341][ T6484] EXT4-fs error (device loop8): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 8192 [ 104.847851][ T6484] EXT4-fs error (device loop8): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 104.934797][ T6484] EXT4-fs error (device loop8): ext4_readdir:224: inode #11: comm syz-executor: path (unknown): directory fails checksum at offset 1024 [ 105.193550][ T6692] netlink: 'syz.3.834': attribute type 4 has an invalid length. [ 105.201249][ T6692] netlink: 17 bytes leftover after parsing attributes in process `syz.3.834'. [ 105.398857][ T6694] loop7: detected capacity change from 0 to 256 [ 105.405991][ T6694] FAT-fs (loop7): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 105.418248][ T6694] FAT-fs (loop7): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 105.459077][ T6697] lo speed is unknown, defaulting to 1000 [ 105.526339][ T3409] hid-generic 00A0:0006:0003.0012: hidraw0: HID v0.05 Device [syz1] on syz0 [ 105.574208][ T6516] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 105.654103][ T6713] netlink: 3 bytes leftover after parsing attributes in process `syz.7.842'. [ 105.663198][ T6713] 0ªX¹¦À: renamed from caif0 [ 105.669283][ T6713] 0ªX¹¦À: entered allmulticast mode [ 105.674496][ T6713] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 105.720224][ T6717] serio: Serial port ptm0 [ 105.725225][ T6717] serio: Serial port ptm0 [ 105.860336][ T6732] sg_write: data in/out 178/8 bytes for SCSI command 0xfe-- guessing data in; [ 105.860336][ T6732] program syz.4.846 not setting count and/or reply_len properly [ 105.927525][ T6735] loop7: detected capacity change from 0 to 1024 [ 105.962037][ T6735] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 106.045054][ T6746] netlink: 24 bytes leftover after parsing attributes in process `syz.0.854'. [ 106.062861][ T3509] hid-generic 0000:0003:0001.0013: hidraw0: HID v0.03 Device [syz0] on syz1 [ 106.736189][ T6484] EXT4-fs (loop8): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 106.746945][ T388] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.750079][ T29] kauditd_printk_skb: 410 callbacks suppressed [ 106.750126][ T29] audit: type=1326 audit(1765732839.415:3382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.786848][ T29] audit: type=1326 audit(1765732839.415:3383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.810246][ T29] audit: type=1326 audit(1765732839.415:3384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.833530][ T29] audit: type=1326 audit(1765732839.415:3385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.862744][ T29] audit: type=1326 audit(1765732839.475:3386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.886059][ T29] audit: type=1326 audit(1765732839.475:3387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.909423][ T29] audit: type=1326 audit(1765732839.475:3388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.932721][ T29] audit: type=1326 audit(1765732839.475:3389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.956061][ T29] audit: type=1326 audit(1765732839.475:3390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 106.979436][ T29] audit: type=1326 audit(1765732839.525:3391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6780 comm="syz.4.862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 107.003075][ T6202] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 107.031571][ T6789] 9pnet_fd: Insufficient options for proto=fd [ 107.040490][ T6791] loop4: detected capacity change from 0 to 128 [ 107.048419][ T6789] netlink: 12 bytes leftover after parsing attributes in process `syz.7.865'. [ 107.058205][ T6791] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 107.066807][ T6796] loop3: detected capacity change from 0 to 2048 [ 107.077675][ T6791] ext4 filesystem being mounted at /12/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 107.110515][ T388] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.128977][ T6796] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000900 r/w without journal. Quota mode: none. [ 107.162722][ T388] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.175424][ T6784] lo speed is unknown, defaulting to 1000 [ 107.204265][ T388] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.234059][ T6810] ªªªªªª: renamed from vlan0 (while UP) [ 107.239723][ T6796] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 107.255231][ T6796] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1716 with error 28 [ 107.267688][ T6796] EXT4-fs (loop3): This should not happen!! Data will be lost [ 107.267688][ T6796] [ 107.277336][ T6796] EXT4-fs (loop3): Total free blocks count 0 [ 107.283345][ T6796] EXT4-fs (loop3): Free/Dirty block details [ 107.289276][ T6796] EXT4-fs (loop3): free_blocks=2415919104 [ 107.294992][ T6796] EXT4-fs (loop3): dirty_blocks=1728 [ 107.300342][ T6796] EXT4-fs (loop3): Block reservation details [ 107.305492][ T6810] netlink: 'syz.0.870': attribute type 10 has an invalid length. [ 107.306304][ T6796] EXT4-fs (loop3): i_reserved_data_blocks=108 [ 107.336154][ T6810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.345459][ T6810] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 107.362078][ T6810] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 107.369537][ T6810] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 107.379108][ T6810] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 107.386481][ T6810] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 107.402766][ T6810] bond0: (slave batadv0): Releasing backup interface [ 107.426574][ T6784] chnl_net:caif_netlink_parms(): no params data found [ 107.441527][ T388] bridge_slave_1: left allmulticast mode [ 107.447184][ T388] bridge_slave_1: left promiscuous mode [ 107.452979][ T388] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.465082][ T388] bridge_slave_0: left allmulticast mode [ 107.470904][ T388] bridge_slave_0: left promiscuous mode [ 107.476521][ T388] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.518719][ T6816] FAULT_INJECTION: forcing a failure. [ 107.518719][ T6816] name failslab, interval 1, probability 0, space 0, times 0 [ 107.531357][ T6816] CPU: 0 UID: 0 PID: 6816 Comm: syz.0.871 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 107.531470][ T6816] Tainted: [W]=WARN [ 107.531476][ T6816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 107.531490][ T6816] Call Trace: [ 107.531497][ T6816] [ 107.531504][ T6816] __dump_stack+0x1d/0x30 [ 107.531557][ T6816] dump_stack_lvl+0xe8/0x140 [ 107.531577][ T6816] dump_stack+0x15/0x1b [ 107.531594][ T6816] should_fail_ex+0x265/0x280 [ 107.531615][ T6816] should_failslab+0x8c/0xb0 [ 107.531634][ T6816] kmem_cache_alloc_node_noprof+0x6b/0x4c0 [ 107.531716][ T6816] ? __alloc_skb+0x324/0x4d0 [ 107.531737][ T6816] __alloc_skb+0x324/0x4d0 [ 107.531755][ T6816] ? __alloc_skb+0x24d/0x4d0 [ 107.531777][ T6816] audit_log_start+0x3a0/0x720 [ 107.531872][ T6816] ? kstrtouint+0x76/0xc0 [ 107.531953][ T6816] audit_seccomp+0x48/0x100 [ 107.531985][ T6816] ? __seccomp_filter+0x832/0x1260 [ 107.532015][ T6816] __seccomp_filter+0x843/0x1260 [ 107.532044][ T6816] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 107.532074][ T6816] ? vfs_write+0x7e8/0x960 [ 107.532094][ T6816] ? __rcu_read_unlock+0x4f/0x70 [ 107.532166][ T6816] ? __fget_files+0x184/0x1c0 [ 107.532190][ T6816] __secure_computing+0x82/0x150 [ 107.532342][ T6816] syscall_trace_enter+0xcf/0x1e0 [ 107.532368][ T6816] do_syscall_64+0xb2/0x2c0 [ 107.532476][ T6816] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.532499][ T6816] RIP: 0033:0x7f83d437f749 [ 107.532515][ T6816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.532532][ T6816] RSP: 002b:00007f83d2ddf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bb [ 107.532591][ T6816] RAX: ffffffffffffffda RBX: 00007f83d45d5fa0 RCX: 00007f83d437f749 [ 107.532604][ T6816] RDX: 000000000000000c RSI: 0000000000000004 RDI: 0000000000000005 [ 107.532657][ T6816] RBP: 00007f83d2ddf090 R08: 0000000000000000 R09: 0000000000000000 [ 107.532668][ T6816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.532679][ T6816] R13: 00007f83d45d6038 R14: 00007f83d45d5fa0 R15: 00007ffeb9507968 [ 107.532697][ T6816] [ 107.795514][ T388] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 107.805531][ T388] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 107.815260][ T388] bond0 (unregistering): Released all slaves [ 107.851995][ T190] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1716 with error 28 [ 107.879512][ T6516] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 107.896729][ T388] hsr_slave_0: left promiscuous mode [ 107.919171][ T388] hsr_slave_1: left promiscuous mode [ 107.941868][ T388] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 107.949351][ T388] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 107.970628][ T388] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 107.978045][ T388] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 107.988138][ T388] veth1_macvtap: left promiscuous mode [ 107.993785][ T388] veth0_macvtap: left promiscuous mode [ 107.999436][ T388] veth1_vlan: left promiscuous mode [ 108.018864][ T388] veth0_vlan: left promiscuous mode [ 108.110289][ T388] team0 (unregistering): Port device team_slave_1 removed [ 108.121152][ T388] team0 (unregistering): Port device team_slave_0 removed [ 108.161425][ T6851] 9pnet_fd: Insufficient options for proto=fd [ 108.178533][ T6851] netlink: 12 bytes leftover after parsing attributes in process `syz.7.882'. [ 108.228754][ T6853] 9pnet_fd: Insufficient options for proto=fd [ 108.254918][ T6784] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.262055][ T6784] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.459978][ T6784] bridge_slave_0: entered allmulticast mode [ 108.466765][ T6784] bridge_slave_0: entered promiscuous mode [ 108.473790][ T6784] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.480913][ T6784] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.488246][ T6784] bridge_slave_1: entered allmulticast mode [ 108.494721][ T6784] bridge_slave_1: entered promiscuous mode [ 108.519391][ T6784] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.539965][ T6784] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 108.570491][ T6784] team0: Port device team_slave_0 added [ 108.576997][ T6784] team0: Port device team_slave_1 added [ 108.593473][ T6784] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 108.600528][ T6784] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 108.626506][ T6784] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 108.638246][ T6784] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 108.645212][ T6784] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 108.658264][ T6860] loop4: detected capacity change from 0 to 128 [ 108.671144][ T6784] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 108.696550][ T6784] hsr_slave_0: entered promiscuous mode [ 108.702779][ T6784] hsr_slave_1: entered promiscuous mode [ 108.702799][ T6860] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 108.729363][ T6860] ext4 filesystem being mounted at /15/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 108.885102][ T6869] FAULT_INJECTION: forcing a failure. [ 108.885102][ T6869] name failslab, interval 1, probability 0, space 0, times 0 [ 108.897740][ T6869] CPU: 1 UID: 0 PID: 6869 Comm: syz.0.888 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 108.897793][ T6869] Tainted: [W]=WARN [ 108.897800][ T6869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 108.897814][ T6869] Call Trace: [ 108.897821][ T6869] [ 108.897829][ T6869] __dump_stack+0x1d/0x30 [ 108.897906][ T6869] dump_stack_lvl+0xe8/0x140 [ 108.897929][ T6869] dump_stack+0x15/0x1b [ 108.897950][ T6869] should_fail_ex+0x265/0x280 [ 108.897975][ T6869] should_failslab+0x8c/0xb0 [ 108.898033][ T6869] kmem_cache_alloc_noprof+0x69/0x4b0 [ 108.898054][ T6869] ? __inet_hash_connect+0x7a0/0x1370 [ 108.898074][ T6869] __inet_hash_connect+0x7a0/0x1370 [ 108.898128][ T6869] ? __pfx___inet6_check_established+0x10/0x10 [ 108.898229][ T6869] inet6_hash_connect+0xaf/0xc0 [ 108.898263][ T6869] tcp_v6_connect+0x99f/0xc40 [ 108.898408][ T6869] __inet_stream_connect+0x169/0x7d0 [ 108.898432][ T6869] ? should_failslab+0x8c/0xb0 [ 108.898455][ T6869] ? __kmalloc_cache_noprof+0x252/0x4c0 [ 108.898481][ T6869] ? tcp_sendmsg_fastopen+0x172/0x520 [ 108.898609][ T6869] tcp_sendmsg_fastopen+0x43a/0x520 [ 108.898635][ T6869] tcp_sendmsg_locked+0x26e1/0x2c00 [ 108.898658][ T6869] ? lockref_put_return+0xf7/0x130 [ 108.898699][ T6869] ? __rcu_read_unlock+0x4f/0x70 [ 108.898719][ T6869] ? __rcu_read_unlock+0x4f/0x70 [ 108.898760][ T6869] ? avc_has_perm_noaudit+0xab/0x130 [ 108.898783][ T6869] ? avc_has_perm+0xf7/0x180 [ 108.898864][ T6869] ? _raw_spin_lock_bh+0x56/0xb0 [ 108.898883][ T6869] ? _raw_spin_unlock_bh+0x36/0x40 [ 108.898903][ T6869] ? __pfx_tcp_sendmsg+0x10/0x10 [ 108.898932][ T6869] tcp_sendmsg+0x2f/0x50 [ 108.899019][ T6869] inet6_sendmsg+0x76/0xd0 [ 108.899045][ T6869] __sock_sendmsg+0x8b/0x180 [ 108.899066][ T6869] __sys_sendto+0x268/0x330 [ 108.899173][ T6869] __x64_sys_sendto+0x76/0x90 [ 108.899202][ T6869] x64_sys_call+0x29a7/0x3000 [ 108.899293][ T6869] do_syscall_64+0xd8/0x2c0 [ 108.899380][ T6869] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 108.899404][ T6869] RIP: 0033:0x7f83d437f749 [ 108.899420][ T6869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.899439][ T6869] RSP: 002b:00007f83d2ddf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 108.899459][ T6869] RAX: ffffffffffffffda RBX: 00007f83d45d5fa0 RCX: 00007f83d437f749 [ 108.899487][ T6869] RDX: 0000000000000900 RSI: 0000000000000000 RDI: 0000000000000007 [ 108.899498][ T6869] RBP: 00007f83d2ddf090 R08: 0000200000b63fe4 R09: 000000000000001c [ 108.899508][ T6869] R10: 0000000020004002 R11: 0000000000000246 R12: 0000000000000001 [ 108.899518][ T6869] R13: 00007f83d45d6038 R14: 00007f83d45d5fa0 R15: 00007ffeb9507968 [ 108.899533][ T6869] [ 109.172435][ T6871] netlink: 'syz.7.889': attribute type 83 has an invalid length. [ 109.230280][ T6873] team0 (unregistering): Port device team_slave_0 removed [ 109.245380][ T6873] team0 (unregistering): Port device team_slave_1 removed [ 109.255332][ T6880] xt_hashlimit: max too large, truncated to 1048576 [ 109.393725][ T6886] netlink: 'syz.3.894': attribute type 4 has an invalid length. [ 109.401423][ T6886] __nla_validate_parse: 2 callbacks suppressed [ 109.401435][ T6886] netlink: 17 bytes leftover after parsing attributes in process `syz.3.894'. [ 109.407840][ T6784] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 109.429642][ T6784] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 109.440923][ T6784] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 109.452514][ T6784] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 109.486382][ T6901] 9pnet_fd: Insufficient options for proto=fd [ 109.493383][ T6901] netlink: 12 bytes leftover after parsing attributes in process `syz.3.898'. [ 109.512975][ T6784] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.524496][ T6784] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.524473][ T6516] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 109.544117][ T391] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.551253][ T391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.561486][ T6903] siw: device registration error -23 [ 109.567538][ T391] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.574602][ T391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.602552][ T6784] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 109.613007][ T6784] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 109.664912][ T6915] FAULT_INJECTION: forcing a failure. [ 109.664912][ T6915] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.671318][ T6784] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 109.678089][ T6915] CPU: 0 UID: 0 PID: 6915 Comm: syz.4.903 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 109.678121][ T6915] Tainted: [W]=WARN [ 109.678128][ T6915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 109.678140][ T6915] Call Trace: [ 109.678146][ T6915] [ 109.678153][ T6915] __dump_stack+0x1d/0x30 [ 109.678304][ T6915] dump_stack_lvl+0xe8/0x140 [ 109.678326][ T6915] dump_stack+0x15/0x1b [ 109.678346][ T6915] should_fail_ex+0x265/0x280 [ 109.678369][ T6915] should_fail+0xb/0x20 [ 109.678445][ T6915] should_fail_usercopy+0x1a/0x20 [ 109.678469][ T6915] fpu__restore_sig+0x12d/0xaa0 [ 109.678492][ T6915] ? x86_task_fpu+0x36/0x60 [ 109.678522][ T6915] ? should_fail_ex+0xdb/0x280 [ 109.678620][ T6915] __ia32_sys_rt_sigreturn+0x29f/0x350 [ 109.678655][ T6915] x64_sys_call+0x274a/0x3000 [ 109.678684][ T6915] do_syscall_64+0xd8/0x2c0 [ 109.678716][ T6915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 109.678815][ T6915] RIP: 0033:0x7fe62cfcf747 [ 109.678829][ T6915] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 109.678914][ T6915] RSP: 002b:00007fe62ba2f038 EFLAGS: 00000246 [ 109.679003][ T6915] RAX: 00000000000000ca RBX: 00007fe62d225fa0 RCX: 00007fe62cfcf749 [ 109.679016][ T6915] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000020000000cffc [ 109.679028][ T6915] RBP: 00007fe62ba2f090 R08: 0000000000000000 R09: 0000000000000000 [ 109.679040][ T6915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.679052][ T6915] R13: 00007fe62d226038 R14: 00007fe62d225fa0 R15: 00007ffc79e7fb18 [ 109.679069][ T6915] [ 109.752497][ T6922] netlink: 4 bytes leftover after parsing attributes in process `syz.4.905'. [ 109.861610][ T6929] xt_hashlimit: max too large, truncated to 1048576 [ 109.872079][ T6922] team0 (unregistering): Port device team_slave_0 removed [ 109.880965][ T6922] team0 (unregistering): Port device team_slave_1 removed [ 109.900681][ T6784] veth0_vlan: entered promiscuous mode [ 109.907966][ T6784] veth1_vlan: entered promiscuous mode [ 109.922913][ T6784] veth0_macvtap: entered promiscuous mode [ 109.930298][ T6784] veth1_macvtap: entered promiscuous mode [ 109.940863][ T6784] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 109.955114][ T6784] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 109.966284][ T12] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.977435][ T12] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.988858][ T12] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.001300][ T12] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.117907][ T6955] FAULT_INJECTION: forcing a failure. [ 110.117907][ T6955] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.131370][ T6955] CPU: 1 UID: 0 PID: 6955 Comm: syz.4.913 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 110.131401][ T6955] Tainted: [W]=WARN [ 110.131408][ T6955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 110.131420][ T6955] Call Trace: [ 110.131426][ T6955] [ 110.131432][ T6955] __dump_stack+0x1d/0x30 [ 110.131497][ T6955] dump_stack_lvl+0xe8/0x140 [ 110.131520][ T6955] dump_stack+0x15/0x1b [ 110.131578][ T6955] should_fail_ex+0x265/0x280 [ 110.131600][ T6955] should_fail+0xb/0x20 [ 110.131618][ T6955] should_fail_usercopy+0x1a/0x20 [ 110.131710][ T6955] _copy_from_user+0x1c/0xb0 [ 110.131739][ T6955] futex_parse_waitv+0x83/0x290 [ 110.131768][ T6955] ? __pfx_futex_wake_mark+0x10/0x10 [ 110.131820][ T6955] ? __kmalloc_noprof+0x2b4/0x5a0 [ 110.131845][ T6955] __se_sys_futex_waitv+0x121/0x1c0 [ 110.131875][ T6955] ? __pfx_hrtimer_wakeup+0x10/0x10 [ 110.131994][ T6955] __x64_sys_futex_waitv+0x67/0x80 [ 110.132026][ T6955] x64_sys_call+0x204/0x3000 [ 110.132052][ T6955] do_syscall_64+0xd8/0x2c0 [ 110.132113][ T6955] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.132132][ T6955] RIP: 0033:0x7fe62cfcf749 [ 110.132144][ T6955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.132160][ T6955] RSP: 002b:00007fe62ba2f038 EFLAGS: 00000246 ORIG_RAX: 00000000000001c1 [ 110.132180][ T6955] RAX: ffffffffffffffda RBX: 00007fe62d225fa0 RCX: 00007fe62cfcf749 [ 110.132194][ T6955] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000200000001080 [ 110.132262][ T6955] RBP: 00007fe62ba2f090 R08: 0000000000000001 R09: 0000000000000000 [ 110.132281][ T6955] R10: 0000200000001100 R11: 0000000000000246 R12: 0000000000000001 [ 110.132294][ T6955] R13: 00007fe62d226038 R14: 00007fe62d225fa0 R15: 00007ffc79e7fb18 [ 110.132314][ T6955] [ 110.155298][ T6953] tipc: Enabling of bearer rejected, media not registered [ 110.214064][ T6964] mmap: syz.4.915 (6964): VmData 26996736 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 110.284315][ T6966] 9p: Bad value for 'wfdno' [ 110.408623][ T6976] netlink: 4 bytes leftover after parsing attributes in process `syz.4.918'. [ 110.419238][ T6976] xt_hashlimit: max too large, truncated to 1048576 [ 110.456436][ T6984] loop4: detected capacity change from 0 to 1024 [ 110.470670][ T6984] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 110.490474][ T6988] 9pnet_fd: Insufficient options for proto=fd [ 110.497386][ T6988] netlink: 8 bytes leftover after parsing attributes in process `syz.7.922'. [ 110.898931][ T6991] siw: device registration error -23 [ 111.003183][ T6999] netlink: 8 bytes leftover after parsing attributes in process `syz.0.927'. [ 111.012028][ T6999] netlink: 36 bytes leftover after parsing attributes in process `syz.0.927'. [ 111.179069][ T7020] siw: device registration error -23 [ 111.322934][ T6516] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 111.337541][ T7030] FAULT_INJECTION: forcing a failure. [ 111.337541][ T7030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.345707][ T7029] random: crng reseeded on system resumption [ 111.350667][ T7030] CPU: 1 UID: 0 PID: 7030 Comm: syz.3.938 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 111.350721][ T7030] Tainted: [W]=WARN [ 111.350728][ T7030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 111.350741][ T7030] Call Trace: [ 111.350747][ T7030] [ 111.350754][ T7030] __dump_stack+0x1d/0x30 [ 111.350797][ T7030] dump_stack_lvl+0xe8/0x140 [ 111.350819][ T7030] dump_stack+0x15/0x1b [ 111.350840][ T7030] should_fail_ex+0x265/0x280 [ 111.350883][ T7030] should_fail+0xb/0x20 [ 111.350900][ T7030] should_fail_usercopy+0x1a/0x20 [ 111.350924][ T7030] _copy_to_user+0x20/0xa0 [ 111.350951][ T7030] simple_read_from_buffer+0xb5/0x130 [ 111.351019][ T7030] proc_fail_nth_read+0x10e/0x150 [ 111.351048][ T7030] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 111.351111][ T7030] vfs_read+0x1a8/0x770 [ 111.351169][ T7030] ? __rcu_read_unlock+0x4f/0x70 [ 111.351189][ T7030] ? __fget_files+0x184/0x1c0 [ 111.351211][ T7030] ? mutex_lock+0x58/0x90 [ 111.351316][ T7030] ksys_read+0xda/0x1a0 [ 111.351335][ T7030] __x64_sys_read+0x40/0x50 [ 111.351354][ T7030] x64_sys_call+0x2889/0x3000 [ 111.351399][ T7030] do_syscall_64+0xd8/0x2c0 [ 111.351431][ T7030] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 111.351452][ T7030] RIP: 0033:0x7f325e14e15c [ 111.351467][ T7030] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 111.351484][ T7030] RSP: 002b:00007f325cbaf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 111.351563][ T7030] RAX: ffffffffffffffda RBX: 00007f325e3a5fa0 RCX: 00007f325e14e15c [ 111.351575][ T7030] RDX: 000000000000000f RSI: 00007f325cbaf0a0 RDI: 0000000000000004 [ 111.351587][ T7030] RBP: 00007f325cbaf090 R08: 0000000000000000 R09: 0000000000000000 [ 111.351600][ T7030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.351629][ T7030] R13: 00007f325e3a6038 R14: 00007f325e3a5fa0 R15: 00007ffcb7b7c048 [ 111.351647][ T7030] [ 111.371264][ T7032] 9pnet_fd: Insufficient options for proto=fd [ 111.384945][ T4713] hid_parser_main: 35 callbacks suppressed [ 111.384962][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.384986][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.385006][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.385026][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.385047][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.425816][ T7035] netlink: 8 bytes leftover after parsing attributes in process `syz.3.941'. [ 111.429816][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.619379][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.626759][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.634575][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.642242][ T4713] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 111.646100][ T7039] netlink: 4 bytes leftover after parsing attributes in process `syz.0.942'. [ 111.659223][ T4713] hid-generic 0000:0000:0000.0014: hidraw0: HID v0.00 Device [sy] on syz0 [ 111.704244][ T7039] 9p: Bad value for 'rfdno' [ 111.716174][ T7039] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 111.731976][ T7043] netlink: 4 bytes leftover after parsing attributes in process `syz.4.943'. [ 111.743087][ T7049] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 111.752055][ T7043] xt_hashlimit: max too large, truncated to 1048576 [ 111.760728][ T7039] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 111.774234][ T29] kauditd_printk_skb: 526 callbacks suppressed [ 111.774381][ T29] audit: type=1400 audit(1765732844.435:3916): avc: denied { read } for pid=7050 comm="syz.7.946" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 111.811345][ T29] audit: type=1400 audit(1765732844.435:3917): avc: denied { open } for pid=7050 comm="syz.7.946" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 111.837014][ T7054] sg_write: data in/out 178/8 bytes for SCSI command 0xfe-- guessing data in; [ 111.837014][ T7054] program syz.4.947 not setting count and/or reply_len properly [ 111.886594][ T29] audit: type=1400 audit(1765732844.545:3918): avc: denied { getopt } for pid=7056 comm="syz.4.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 111.961548][ T7057] loop4: detected capacity change from 0 to 4096 [ 111.983804][ T29] audit: type=1400 audit(1765732844.645:3919): avc: denied { ioctl } for pid=7060 comm="syz.3.950" path="/dev/input/event2" dev="devtmpfs" ino=252 ioctlcmd=0x45ef scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 112.017664][ T7057] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 112.246407][ T7072] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 112.258641][ T7072] batadv_slave_0: entered promiscuous mode [ 112.278154][ T7072] netlink: 'syz.7.954': attribute type 1 has an invalid length. [ 112.295815][ T6516] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 112.348149][ T7081] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 112.365233][ T7083] team0 (unregistering): Port device team_slave_0 removed [ 112.374994][ T7083] team0 (unregistering): Port device team_slave_1 removed [ 112.422035][ T7088] xt_hashlimit: max too large, truncated to 1048576 [ 112.476450][ T7094] sg_write: data in/out 178/8 bytes for SCSI command 0xfe-- guessing data in; [ 112.476450][ T7094] program syz.7.962 not setting count and/or reply_len properly [ 112.524557][ T7099] random: crng reseeded on system resumption [ 112.569722][ T7102] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 112.584626][ T7102] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 112.623672][ T29] audit: type=1400 audit(1765732845.285:3920): avc: denied { mount } for pid=7103 comm="syz.6.968" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 112.628762][ T7107] openvswitch: netlink: Message has 8 unknown bytes. [ 112.650740][ T7100] infiniband syz1: set active [ 112.656937][ T7100] infiniband syz1: added bond0 [ 112.675405][ T7104] FAULT_INJECTION: forcing a failure. [ 112.675405][ T7104] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.688747][ T7104] CPU: 0 UID: 0 PID: 7104 Comm: gtp Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 112.688779][ T7104] Tainted: [W]=WARN [ 112.688785][ T7104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 112.688795][ T7104] Call Trace: [ 112.688800][ T7104] [ 112.688807][ T7104] __dump_stack+0x1d/0x30 [ 112.688884][ T7104] dump_stack_lvl+0xe8/0x140 [ 112.688981][ T7104] dump_stack+0x15/0x1b [ 112.689003][ T7104] should_fail_ex+0x265/0x280 [ 112.689079][ T7104] should_fail+0xb/0x20 [ 112.689095][ T7104] should_fail_usercopy+0x1a/0x20 [ 112.689118][ T7104] _copy_to_user+0x20/0xa0 [ 112.689158][ T7104] simple_read_from_buffer+0xb5/0x130 [ 112.689177][ T7104] proc_fail_nth_read+0x10e/0x150 [ 112.689321][ T7104] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 112.689350][ T7104] vfs_read+0x1a8/0x770 [ 112.689365][ T7104] ? vt_ioctl+0x1744/0x18a0 [ 112.689378][ T7104] ? __rcu_read_unlock+0x4f/0x70 [ 112.689432][ T7104] ? __fget_files+0x184/0x1c0 [ 112.689505][ T7104] ? mutex_lock+0x58/0x90 [ 112.689533][ T7104] ksys_read+0xda/0x1a0 [ 112.689554][ T7104] __x64_sys_read+0x40/0x50 [ 112.689571][ T7104] x64_sys_call+0x2889/0x3000 [ 112.689591][ T7104] do_syscall_64+0xd8/0x2c0 [ 112.689666][ T7104] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.689689][ T7104] RIP: 0033:0x7efed3f7e15c [ 112.689701][ T7104] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 112.689716][ T7104] RSP: 002b:00007efed29e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 112.689806][ T7104] RAX: ffffffffffffffda RBX: 00007efed41d5fa0 RCX: 00007efed3f7e15c [ 112.689820][ T7104] RDX: 000000000000000f RSI: 00007efed29e70a0 RDI: 000000000000000f [ 112.689833][ T7104] RBP: 00007efed29e7090 R08: 0000000000000000 R09: 0000000000000000 [ 112.689847][ T7104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.689860][ T7104] R13: 00007efed41d6038 R14: 00007efed41d5fa0 R15: 00007ffdfc6b3c08 [ 112.689880][ T7104] [ 112.907531][ T7100] RDS/IB: syz1: added [ 113.047117][ T7100] smc: adding ib device syz1 with port count 1 [ 113.072135][ T7100] smc: ib device syz1 port 1 has no pnetid [ 113.416112][ T29] audit: type=1326 audit(1765732846.075:3921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7117 comm="syz.6.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efed3f7f749 code=0x7ffc0000 [ 113.451516][ T7118] bridge0: entered promiscuous mode [ 113.469565][ T7118] bridge0: left promiscuous mode [ 113.474629][ T29] audit: type=1326 audit(1765732846.105:3922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7117 comm="syz.6.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7efed3f7f749 code=0x7ffc0000 [ 113.497927][ T29] audit: type=1326 audit(1765732846.105:3923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7117 comm="syz.6.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efed3f7f749 code=0x7ffc0000 [ 113.521339][ T29] audit: type=1326 audit(1765732846.105:3924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7117 comm="syz.6.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efed3f7f749 code=0x7ffc0000 [ 113.544771][ T29] audit: type=1326 audit(1765732846.105:3925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7117 comm="syz.6.972" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efed3f7f749 code=0x7ffc0000 [ 113.628950][ T190] batman_adv: batadv_iv_ogm_emit: mesh interface switch for queued OGM [ 113.641067][ T7119] loop6: detected capacity change from 0 to 128 [ 113.650937][ T7119] syz.6.972: attempt to access beyond end of device [ 113.650937][ T7119] loop6: rw=2049, sector=138, nr_sectors = 8 limit=128 [ 113.664551][ T7119] syz.6.972: attempt to access beyond end of device [ 113.664551][ T7119] loop6: rw=2049, sector=146, nr_sectors = 6 limit=128 [ 113.703468][ T7109] siw: device registration error -23 [ 113.728474][ T7119] syz.6.972: attempt to access beyond end of device [ 113.728474][ T7119] loop6: rw=8390657, sector=150, nr_sectors = 2 limit=128 [ 113.742115][ T7119] Buffer I/O error on dev loop6, logical block 75, lost async page write [ 113.771894][ T7119] syz.6.972: attempt to access beyond end of device [ 113.771894][ T7119] loop6: rw=8390657, sector=152, nr_sectors = 2 limit=128 [ 113.785635][ T7119] Buffer I/O error on dev loop6, logical block 76, lost async page write [ 113.794855][ T7119] syz.6.972: attempt to access beyond end of device [ 113.794855][ T7119] loop6: rw=2049, sector=170, nr_sectors = 6 limit=128 [ 113.808659][ T7119] syz.6.972: attempt to access beyond end of device [ 113.808659][ T7119] loop6: rw=8390657, sector=174, nr_sectors = 2 limit=128 [ 113.822313][ T7119] Buffer I/O error on dev loop6, logical block 87, lost async page write [ 113.853386][ T7119] syz.6.972: attempt to access beyond end of device [ 113.853386][ T7119] loop6: rw=8390657, sector=176, nr_sectors = 2 limit=128 [ 113.867102][ T7119] Buffer I/O error on dev loop6, logical block 88, lost async page write [ 113.876556][ T7121] syz.3.973 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 113.898230][ T7119] syz.6.972: attempt to access beyond end of device [ 113.898230][ T7119] loop6: rw=2049, sector=178, nr_sectors = 6 limit=128 [ 113.912119][ T7119] syz.6.972: attempt to access beyond end of device [ 113.912119][ T7119] loop6: rw=8390657, sector=182, nr_sectors = 2 limit=128 [ 113.925714][ T7119] Buffer I/O error on dev loop6, logical block 91, lost async page write [ 113.934323][ T7119] syz.6.972: attempt to access beyond end of device [ 113.934323][ T7119] loop6: rw=8390657, sector=184, nr_sectors = 2 limit=128 [ 113.947909][ T7119] Buffer I/O error on dev loop6, logical block 92, lost async page write [ 113.966727][ T7119] Buffer I/O error on dev loop6, logical block 103, lost async page write [ 113.975439][ T7119] Buffer I/O error on dev loop6, logical block 104, lost async page write [ 113.985055][ T7119] Buffer I/O error on dev loop6, logical block 107, lost async page write [ 113.993660][ T7119] Buffer I/O error on dev loop6, logical block 108, lost async page write [ 114.235788][ T7137] loop7: detected capacity change from 0 to 512 [ 114.246870][ T7139] sg_write: data in/out 178/8 bytes for SCSI command 0xfe-- guessing data in; [ 114.246870][ T7139] program syz.6.980 not setting count and/or reply_len properly [ 114.278522][ T7137] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 114.309044][ T7137] ext4 filesystem being mounted at /60/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 114.345428][ T7148] sg_write: data in/out 178/8 bytes for SCSI command 0xfe-- guessing data in; [ 114.345428][ T7148] program syz.6.983 not setting count and/or reply_len properly [ 114.439711][ T7136] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 114.524587][ T7155] siw: device registration error -23 [ 114.532404][ T7160] siw: device registration error -23 [ 114.580077][ T7164] FAULT_INJECTION: forcing a failure. [ 114.580077][ T7164] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 114.593386][ T7164] CPU: 1 UID: 0 PID: 7164 Comm: syz.4.992 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 114.593416][ T7164] Tainted: [W]=WARN [ 114.593422][ T7164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 114.593432][ T7164] Call Trace: [ 114.593437][ T7164] [ 114.593444][ T7164] __dump_stack+0x1d/0x30 [ 114.593526][ T7164] dump_stack_lvl+0xe8/0x140 [ 114.593545][ T7164] dump_stack+0x15/0x1b [ 114.593562][ T7164] should_fail_ex+0x265/0x280 [ 114.593581][ T7164] should_fail_alloc_page+0xf2/0x100 [ 114.593728][ T7164] __alloc_frozen_pages_noprof+0x109/0x360 [ 114.593754][ T7164] alloc_pages_mpol+0xb3/0x260 [ 114.593779][ T7164] alloc_pages_noprof+0x90/0x130 [ 114.593860][ T7164] get_free_pages_noprof+0xc/0x40 [ 114.593882][ T7164] selinux_genfs_get_sid+0x33/0x180 [ 114.593904][ T7164] inode_doinit_with_dentry+0x5fd/0x7a0 [ 114.593967][ T7164] selinux_d_instantiate+0x27/0x40 [ 114.593984][ T7164] security_d_instantiate+0x7a/0xa0 [ 114.594035][ T7164] d_make_persistent+0x4f/0x110 [ 114.594061][ T7164] __debugfs_create_file+0x14e/0x2b0 [ 114.594078][ T7164] debugfs_create_file_full+0x3f/0x60 [ 114.594159][ T7164] ? __pfx_sl_setup+0x10/0x10 [ 114.594242][ T7164] ref_tracker_dir_debugfs+0x100/0x210 [ 114.594298][ T7164] alloc_netdev_mqs+0x1a7/0xa40 [ 114.594324][ T7164] slip_open+0x2d1/0x920 [ 114.594344][ T7164] ? vfree+0x295/0x3a0 [ 114.594362][ T7164] ? up_write+0x18/0x60 [ 114.594396][ T7164] tty_ldisc_open+0x5d/0xb0 [ 114.594451][ T7164] tty_set_ldisc+0x1db/0x380 [ 114.594473][ T7164] tiocsetd+0x51/0x60 [ 114.594490][ T7164] tty_ioctl+0xa79/0xb80 [ 114.594506][ T7164] ? __pfx_tty_ioctl+0x10/0x10 [ 114.594522][ T7164] __se_sys_ioctl+0xce/0x140 [ 114.594601][ T7164] __x64_sys_ioctl+0x43/0x50 [ 114.594644][ T7164] x64_sys_call+0x14b0/0x3000 [ 114.594664][ T7164] do_syscall_64+0xd8/0x2c0 [ 114.594693][ T7164] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.594775][ T7164] RIP: 0033:0x7fe62cfcf749 [ 114.594788][ T7164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.594802][ T7164] RSP: 002b:00007fe62ba2f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 114.594819][ T7164] RAX: ffffffffffffffda RBX: 00007fe62d225fa0 RCX: 00007fe62cfcf749 [ 114.594829][ T7164] RDX: 0000200000000040 RSI: 0000000000005423 RDI: 0000000000000003 [ 114.594839][ T7164] RBP: 00007fe62ba2f090 R08: 0000000000000000 R09: 0000000000000000 [ 114.594940][ T7164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.594950][ T7164] R13: 00007fe62d226038 R14: 00007fe62d225fa0 R15: 00007ffc79e7fb18 [ 114.594965][ T7164] [ 115.098203][ T7178] loop4: detected capacity change from 0 to 8192 [ 115.125188][ T7178] msdos: Unknown parameter '' [ 115.435887][ T7188] __nla_validate_parse: 7 callbacks suppressed [ 115.435901][ T7188] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1001'. [ 115.802236][ T7196] sg_write: data in/out 178/8 bytes for SCSI command 0xfe-- guessing data in; [ 115.802236][ T7196] program syz.6.1005 not setting count and/or reply_len properly [ 115.844368][ T7200] siw: device registration error -23 [ 115.855726][ T7198] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 115.897432][ T7204] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1008'. [ 116.016283][ T7216] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1014'. [ 116.036479][ T7225] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 116.047774][ T7216] xt_hashlimit: max too large, truncated to 1048576 [ 116.141393][ T7237] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1023'. [ 116.242369][ T7255] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1032'. [ 116.263261][ T7255] team0 (unregistering): Port device team_slave_0 removed [ 116.265033][ T7259] loop4: detected capacity change from 0 to 512 [ 116.279702][ T7255] team0 (unregistering): Port device team_slave_1 removed [ 116.287956][ T7259] EXT4-fs error (device loop4): ext4_xattr_inode_iget:437: comm syz.4.1034: Parent and EA inode have the same ino 15 [ 116.313400][ T7262] xt_hashlimit: max too large, truncated to 1048576 [ 116.320295][ T7259] EXT4-fs error (device loop4): ext4_xattr_inode_iget:437: comm syz.4.1034: Parent and EA inode have the same ino 15 [ 116.339477][ T7259] EXT4-fs (loop4): 1 orphan inode deleted [ 116.353332][ T7257] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1033'. [ 116.356087][ T7259] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 116.364067][ T7257] xt_hashlimit: max too large, truncated to 1048576 [ 116.405764][ T7266] siw: device registration error -23 [ 116.483703][ T7259] EXT4-fs error (device loop4): ext4_find_dest_de:2050: inode #2: block 13: comm syz.4.1034: bad entry in directory: directory entry overrun - offset=76, inode=0, rec_len=1024, size=1024 fake=0 [ 116.559916][ T6516] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 116.574473][ T7281] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1042'. [ 116.669208][ T7289] Driver unsupported XDP return value 0 on prog (id 780) dev N/A, expect packet loss! [ 116.682053][ T7294] siw: device registration error -23 [ 116.906342][ T7318] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1055'. [ 116.951578][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 116.951592][ T29] audit: type=1326 audit(1765732849.615:3986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 116.989357][ T29] audit: type=1326 audit(1765732849.645:3987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.012833][ T29] audit: type=1326 audit(1765732849.645:3988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.036338][ T29] audit: type=1326 audit(1765732849.645:3989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.059746][ T29] audit: type=1326 audit(1765732849.645:3990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.083190][ T29] audit: type=1326 audit(1765732849.645:3991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.106636][ T29] audit: type=1326 audit(1765732849.645:3992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.130083][ T29] audit: type=1326 audit(1765732849.645:3993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.153558][ T29] audit: type=1326 audit(1765732849.645:3994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.177051][ T29] audit: type=1326 audit(1765732849.645:3995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7319 comm="syz.4.1056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe62cfcf749 code=0x7ffc0000 [ 117.218339][ T7330] siw: device registration error -23 [ 117.342110][ T3396] IPVS: starting estimator thread 0... [ 117.405873][ T7343] loop4: detected capacity change from 0 to 8192 [ 117.418667][ T7337] IPVS: dh: FWM 3 0x00000003 - no destination available [ 117.425666][ C1] IPVS: dh: FWM 3 0x00000003 - no destination available [ 117.432700][ T7340] IPVS: using max 2784 ests per chain, 139200 per kthread [ 117.522090][ T7353] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1070'. [ 117.586562][ T7359] tipc: Started in network mode [ 117.591527][ T7359] tipc: Node identity b6c058a76e54, cluster identity 4711 [ 117.598759][ T7359] tipc: Enabled bearer , priority 0 [ 117.616732][ T7359] syzkaller0: entered promiscuous mode [ 117.622488][ T7359] syzkaller0: entered allmulticast mode [ 117.640147][ T7359] tipc: Resetting bearer [ 117.653558][ T7358] tipc: Resetting bearer [ 117.661989][ T7358] tipc: Disabling bearer [ 117.838199][ T6516] FAT-fs (loop4): error, invalid access to FAT (entry 0x0000e1b1) [ 117.846138][ T6516] FAT-fs (loop4): Filesystem has been set read-only [ 118.063833][ T7387] lo speed is unknown, defaulting to 1000 [ 118.168939][ T7395] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1084'. [ 118.326314][ T7407] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 118.716739][ T7423] loop4: detected capacity change from 0 to 128 [ 118.809107][ T7423] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 118.906607][ T7423] ext4 filesystem being mounted at /73/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 119.512865][ T7444] 9p: Bad value for 'rfdno' [ 119.528905][ T7444] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 119.555143][ T7444] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 119.565912][ T6516] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 119.629267][ T7448] siw: device registration error -23 [ 119.641670][ T7448] loop4: detected capacity change from 0 to 512 [ 169.463518][ T7456] __nla_validate_parse: 1 callbacks suppressed [ 169.463608][ T7456] netlink: 32 bytes leftover after parsing attributes in process `syz.6.1107'. [ 169.482022][ T29] kauditd_printk_skb: 325 callbacks suppressed [ 169.482081][ T29] audit: type=1326 audit(1765732902.145:4318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7458 comm="syz.0.1111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 169.521051][ T7461] bridge0: entered promiscuous mode [ 169.526501][ T7461] bridge0: left promiscuous mode [ 169.531558][ T29] audit: type=1326 audit(1765732902.145:4319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7458 comm="syz.0.1111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 169.555002][ T29] audit: type=1326 audit(1765732902.145:4320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7458 comm="syz.0.1111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 169.608984][ T29] audit: type=1400 audit(1765732902.255:4321): avc: denied { ioctl } for pid=7455 comm="syz.6.1107" path="socket:[25553]" dev="sockfs" ino=25553 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 169.634847][ T29] audit: type=1400 audit(1765732902.255:4322): avc: denied { ioctl } for pid=7455 comm="syz.6.1107" path="socket:[25551]" dev="sockfs" ino=25551 ioctlcmd=0x943e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 169.668018][ T29] audit: type=1326 audit(1765732902.325:4323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7471 comm="syz.3.1115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f325e14f749 code=0x7ffc0000 [ 169.691521][ T29] audit: type=1326 audit(1765732902.325:4324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7471 comm="syz.3.1115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f325e14f749 code=0x7ffc0000 [ 169.745732][ T29] audit: type=1326 audit(1765732902.355:4325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7458 comm="syz.0.1111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 169.753795][ T7472] ip6t_srh: unknown srh match flags 4000 [ 169.769206][ T29] audit: type=1326 audit(1765732902.355:4326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7458 comm="syz.0.1111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83d437f749 code=0x7ffc0000 [ 169.798313][ T29] audit: type=1326 audit(1765732902.385:4327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7471 comm="syz.3.1115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f325e14f749 code=0x7ffc0000 [ 169.969696][ T7480] geneve2: entered promiscuous mode [ 169.988184][ T7479] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1118'. [ 170.003286][ T7479] xt_hashlimit: max too large, truncated to 1048576 [ 170.073075][ T7489] lo speed is unknown, defaulting to 1000 [ 170.345886][ T7494] bridge0: entered promiscuous mode [ 170.365880][ T7494] bridge0: left promiscuous mode [ 170.504304][ T7507] SELinux: security_context_str_to_sid () failed with errno=-22 [ 170.540046][ T7510] bridge0: entered promiscuous mode [ 170.547177][ T7510] bridge0: left promiscuous mode [ 170.553286][ T7512] bridge0: entered promiscuous mode [ 170.558831][ T7512] bridge0: left promiscuous mode [ 170.696101][ T7522] tipc: Started in network mode [ 170.701050][ T7522] tipc: Node identity ac14140f, cluster identity 4711 [ 170.708915][ T7522] tipc: New replicast peer: 255.255.255.255 [ 170.715033][ T7522] tipc: Enabled bearer , priority 10 [ 170.855046][ T7538] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.892926][ T7539] 9p: Bad value for 'rfdno' [ 170.898541][ T7543] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1142'. [ 170.916435][ T7543] xt_hashlimit: max too large, truncated to 1048576 [ 170.933742][ T7538] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.008746][ T7538] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.025614][ T7556] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1138'. [ 171.034603][ T7556] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1138'. [ 171.046930][ T7536] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1138'. [ 171.055976][ T7536] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1138'. [ 171.069610][ T7538] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.132613][ T3522] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.158927][ T3522] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.196496][ T3522] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.218099][ T3522] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.228446][ T7569] FAULT_INJECTION: forcing a failure. [ 171.228446][ T7569] name failslab, interval 1, probability 0, space 0, times 0 [ 171.241168][ T7569] CPU: 1 UID: 0 PID: 7569 Comm: syz.3.1151 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 171.241199][ T7569] Tainted: [W]=WARN [ 171.241205][ T7569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 171.241217][ T7569] Call Trace: [ 171.241224][ T7569] [ 171.241232][ T7569] __dump_stack+0x1d/0x30 [ 171.241261][ T7569] dump_stack_lvl+0xe8/0x140 [ 171.241281][ T7569] dump_stack+0x15/0x1b [ 171.241343][ T7569] should_fail_ex+0x265/0x280 [ 171.241368][ T7569] should_failslab+0x8c/0xb0 [ 171.241452][ T7569] __kmalloc_noprof+0xb9/0x5a0 [ 171.241477][ T7569] ? apply_wqattrs_prepare+0x6e/0x670 [ 171.241503][ T7569] ? pcpu_memcg_post_alloc_hook+0xf3/0x170 [ 171.241535][ T7569] apply_wqattrs_prepare+0x6e/0x670 [ 171.241617][ T7569] alloc_workqueue_noprof+0xd63/0x1320 [ 171.241639][ T7569] nci_register_device+0x11e/0x510 [ 171.241674][ T7569] virtual_ncidev_open+0xca/0x130 [ 171.241703][ T7569] ? __pfx_virtual_ncidev_open+0x10/0x10 [ 171.241774][ T7569] misc_open+0x1df/0x220 [ 171.241835][ T7569] chrdev_open+0x2eb/0x3a0 [ 171.241860][ T7569] ? __pfx_chrdev_open+0x10/0x10 [ 171.241953][ T7569] do_dentry_open+0x54b/0xa60 [ 171.242013][ T7569] vfs_open+0x37/0x1e0 [ 171.242039][ T7569] path_openat+0x1ddd/0x23b0 [ 171.242069][ T7569] ? _parse_integer_limit+0x170/0x190 [ 171.242093][ T7569] do_filp_open+0x109/0x230 [ 171.242193][ T7569] do_sys_openat2+0xa6/0x150 [ 171.242217][ T7569] __x64_sys_openat+0xf2/0x120 [ 171.242246][ T7569] x64_sys_call+0x2b07/0x3000 [ 171.242282][ T7569] do_syscall_64+0xd8/0x2c0 [ 171.242343][ T7569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 171.242363][ T7569] RIP: 0033:0x7f325e14f749 [ 171.242433][ T7569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.242454][ T7569] RSP: 002b:00007f325cbaf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 171.242478][ T7569] RAX: ffffffffffffffda RBX: 00007f325e3a5fa0 RCX: 00007f325e14f749 [ 171.242492][ T7569] RDX: 0000000000000002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 171.242516][ T7569] RBP: 00007f325cbaf090 R08: 0000000000000000 R09: 0000000000000000 [ 171.242527][ T7569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 171.242538][ T7569] R13: 00007f325e3a6038 R14: 00007f325e3a5fa0 R15: 00007ffcb7b7c048 [ 171.242554][ T7569] [ 171.488749][ T7572] loop4: detected capacity change from 0 to 1024 [ 171.536153][ T7576] lo speed is unknown, defaulting to 1000 [ 171.549326][ T7572] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 171.769201][ T3611] tipc: Node number set to 2886997007 [ 171.831608][ T7599] openvswitch: netlink: Missing key (keys=40, expected=80) [ 171.854118][ T7601] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1161'. [ 171.920092][ T7608] netlink: 17279 bytes leftover after parsing attributes in process `syz.7.1164'. [ 172.420958][ T7622] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1168'. [ 172.448390][ T6516] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 172.570574][ T7625] xt_hashlimit: max too large, truncated to 1048576 [ 172.578697][ T7622] team0 (unregistering): Port device team_slave_0 removed [ 172.637509][ T7622] team0 (unregistering): Port device team_slave_1 removed [ 172.650868][ T7634] loop4: detected capacity change from 0 to 164 [ 172.658639][ T7593] syz.3.1156 (7593) used greatest stack depth: 7232 bytes left [ 172.982028][ T7675] bridge0: entered promiscuous mode [ 172.987516][ T7675] bridge0: left promiscuous mode [ 173.103901][ T7692] netlink: 'syz.7.1199': attribute type 16 has an invalid length. [ 173.138501][ T7694] netdevsim netdevsim6 netdevsim0: entered allmulticast mode [ 173.147973][ T7697] netlink: 'syz.4.1188': attribute type 4 has an invalid length. [ 173.340231][ T7731] loop4: detected capacity change from 0 to 164 [ 173.353149][ T7734] ip6erspan0: entered promiscuous mode [ 173.455146][ T7752] geneve2: entered promiscuous mode [ 173.520772][ T7748] ================================================================== [ 173.528869][ T7748] BUG: KCSAN: data-race in __bpf_get_stackid / bcmp [ 173.535460][ T7748] [ 173.537768][ T7748] write to 0xffff88810a110440 of 96 bytes by task 3396 on cpu 1: [ 173.545463][ T7748] __bpf_get_stackid+0x737/0x7d0 [ 173.550390][ T7748] bpf_get_stackid+0xf3/0x130 [ 173.555055][ T7748] bpf_get_stackid_raw_tp+0xf6/0x120 [ 173.560333][ T7748] bpf_prog_53f0063d4d7f65ce+0x2a/0x32 [ 173.565770][ T7748] bpf_trace_run2+0x107/0x1d0 [ 173.570439][ T7748] kfree+0x353/0x3c0 [ 173.574316][ T7748] vfree+0x28d/0x3a0 [ 173.578199][ T7748] __bpf_prog_free+0x86/0xa0 [ 173.582770][ T7748] bpf_jit_free+0x273/0x2f0 [ 173.587266][ T7748] bpf_prog_free_deferred+0x41d/0x470 [ 173.592626][ T7748] process_scheduled_works+0x4ce/0x9d0 [ 173.598074][ T7748] worker_thread+0x582/0x770 [ 173.602651][ T7748] kthread+0x489/0x510 [ 173.606708][ T7748] ret_from_fork+0x149/0x290 [ 173.611286][ T7748] ret_from_fork_asm+0x1a/0x30 [ 173.616036][ T7748] [ 173.618340][ T7748] read to 0xffff88810a110480 of 8 bytes by task 7748 on cpu 0: [ 173.625863][ T7748] bcmp+0x23/0x90 [ 173.629478][ T7748] __bpf_get_stackid+0x382/0x7d0 [ 173.634405][ T7748] bpf_get_stackid+0xf3/0x130 [ 173.639071][ T7748] bpf_get_stackid_raw_tp+0xf6/0x120 [ 173.644346][ T7748] bpf_prog_53f0063d4d7f65ce+0x2a/0x32 [ 173.649783][ T7748] bpf_trace_run2+0x107/0x1d0 [ 173.654457][ T7748] kfree+0x353/0x3c0 [ 173.658332][ T7748] sock_kfree_s+0x28/0x50 [ 173.662650][ T7748] ____sys_sendmsg+0x404/0x4a0 [ 173.667400][ T7748] __sys_sendmsg_sock+0x28/0x40 [ 173.672239][ T7748] io_sendmsg+0x163/0x490 [ 173.676554][ T7748] __io_issue_sqe+0xfe/0x2e0 [ 173.681139][ T7748] io_issue_sqe+0x56/0xa80 [ 173.685547][ T7748] io_submit_sqes+0x78b/0x11b0 [ 173.690301][ T7748] __se_sys_io_uring_enter+0x1bd/0x1a30 [ 173.695841][ T7748] __x64_sys_io_uring_enter+0x78/0x90 [ 173.701207][ T7748] x64_sys_call+0x27e4/0x3000 [ 173.705872][ T7748] do_syscall_64+0xd8/0x2c0 [ 173.710368][ T7748] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 173.716249][ T7748] [ 173.718553][ T7748] value changed: 0xffffffff81e86256 -> 0xffffffff813d63f2 [ 173.725644][ T7748] [ 173.727951][ T7748] Reported by Kernel Concurrency Sanitizer on: [ 173.734084][ T7748] CPU: 0 UID: 0 PID: 7748 Comm: syz.3.1223 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 173.745354][ T7748] Tainted: [W]=WARN [ 173.749138][ T7748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 173.759175][ T7748] ================================================================== [ 173.858569][ T7756] netlink: 'syz.4.1227': attribute type 4 has an invalid length.