last executing test programs: 4m4.600660808s ago: executing program 32 (id=412): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)="e9bed67a87ee4623d39c10780000000600000000", 0x14}}, 0x20040814) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) (async) sendmsg$802154_raw(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)="e9bed67a87ee4623d39c10780000000600000000", 0x14}}, 0x20040814) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) close(r4) (async) 4m0.404974583s ago: executing program 4 (id=460): open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff0180040008003950"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 4m0.404862743s ago: executing program 33 (id=460): open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff0180040008003950"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 3m57.637018613s ago: executing program 34 (id=481): r0 = open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x40eb, 0x0, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) creat(&(0x7f0000002200)='./file0\x00', 0x80) 3m56.65254047s ago: executing program 35 (id=493): socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000580)={{'\x00', 0x1}, {0x5}, 0x18, 0x0, 0x0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000340)='./file1\x00', &(0x7f0000000380)="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", 0x1db, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x117}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000040)={0x0, 0x3, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000001c0)={0x0, 0x80, 0x0, 'queue0\x00'}) close_range(r1, 0xffffffffffffffff, 0x0) 3m51.420894342s ago: executing program 36 (id=573): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) 3m50.028910366s ago: executing program 37 (id=592): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x14) ioctl$TIOCVHANGUP(r1, 0x5437, 0x2) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2003, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, 0x1, 0x2}, 0x6) ioctl$TIOCVHANGUP(r2, 0x5437, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 3m48.423614281s ago: executing program 38 (id=613): r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000440)={{0x0, 0x989680}}, 0x0) read(r0, &(0x7f0000000240)=""/123, 0x7b) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@newqdisc={0x70, 0x24, 0x4ee4e6a52ff56541, 0x40000, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0x18}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x44, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x8, 0x0, 0x2, 0x8, 0xc, 0x7}, {0x1, 0x0, 0x9, 0x401, 0x0, 0x7fffffff}, 0x2000001, 0x1000, 0x575}}, @TCA_TBF_RATE64={0xc, 0x4, 0x274bdcb7db3981e2}, @TCA_TBF_PRATE64={0xc, 0x5, 0xe1e31d5aa9748ab8}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x404}, 0x0) 3m47.713024028s ago: executing program 39 (id=618): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000400)={0x0, 'batadv0\x00', {0x8}}) open_by_handle_at(0xffffffffffffffff, 0x0, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000110020850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfd, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) 3m44.877056618s ago: executing program 9 (id=634): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x2) 3m44.876879248s ago: executing program 9 (id=635): pipe(&(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000000000f7850000002d00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) 3m44.768372848s ago: executing program 9 (id=636): socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000001c0)={0x0, 0x80, 0x0, 'queue0\x00'}) close_range(r1, 0xffffffffffffffff, 0x0) 3m44.718870467s ago: executing program 9 (id=637): syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file1\x00', 0x844, &(0x7f0000000bc0)=ANY=[], 0x1, 0x253, &(0x7f00000004c0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x738e23cd, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x3, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {0x0, 0x0, 0x28, 0x0, @wg=@data={0x4, 0x0, 0x0, "200200"/16}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000200000000001200000085000000230000003f0000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r3}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) flistxattr(r4, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) 3m44.350399246s ago: executing program 9 (id=640): r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x5) r1 = accept4$inet6(r0, 0x0, 0x0, 0x80000) close_range(r1, 0xffffffffffffffff, 0x0) 3m43.935759585s ago: executing program 9 (id=643): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16, &(0x7f0000000140)={[{@grpjquota}, {@noblock_validity}, {@auto_da_alloc_val}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000}}, {@user_xattr}, {@nouid32}, {@dax_never}, {@data_err_abort}, {@grpid}, {@noauto_da_alloc}]}, 0x0, 0x516, &(0x7f0000000740)="$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") r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b0001006d61637365630000180002800c0004000100000100c28000050003"], 0x48}}, 0x40000) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x20, 0x3, 0x3, 0x201, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x5}}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x11) r1 = open(&(0x7f0000000100)='./file0\x00', 0x80ff, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x406, r2) fcntl$setlease(r2, 0x400, 0x1) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f0000000040)=0x1, 0x4) 3m43.904948095s ago: executing program 40 (id=643): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16, &(0x7f0000000140)={[{@grpjquota}, {@noblock_validity}, {@auto_da_alloc_val}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000}}, {@user_xattr}, {@nouid32}, {@dax_never}, {@data_err_abort}, {@grpid}, {@noauto_da_alloc}]}, 0x0, 0x516, &(0x7f0000000740)="$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") r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b0001006d61637365630000180002800c0004000100000100c28000050003"], 0x48}}, 0x40000) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x20, 0x3, 0x3, 0x201, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x5}}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x11) r1 = open(&(0x7f0000000100)='./file0\x00', 0x80ff, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x406, r2) fcntl$setlease(r2, 0x400, 0x1) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f0000000040)=0x1, 0x4) 3m43.848510035s ago: executing program 4 (id=614): r0 = syz_io_uring_setup(0x5da4, &(0x7f00000004c0)={0x0, 0xd119, 0x40, 0x1, 0x1a5}, &(0x7f0000000380), &(0x7f0000000540)) flistxattr(r0, 0x0, 0x0) (fail_nth: 6) 3m43.513030583s ago: executing program 4 (id=650): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000120000000c0000000014"], 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000000)={&(0x7f0000000200)=""/138, 0x8a, 0x0, &(0x7f00000003c0)=""/214, 0xd6}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700"/28, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) finit_module(r4, 0x0, 0x3) arch_prctl$ARCH_REQ_XCOMP_GUEST_PERM(0x1025, 0x3) 3m43.218164662s ago: executing program 4 (id=653): ioperm(0x2, 0x7ff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffa4, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x38) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000210081044e81f782db44b90402000000e8fe55a11800152c280014", 0x1f}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x54e, &(0x7f00000014c0)="$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") r2 = open(&(0x7f0000000040)='.\x00', 0xb12ec6a4c3f71d90, 0x8) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000e5001800000004000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) accept$phonet_pipe(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r6}, 0x10) clock_gettime(0x0, &(0x7f0000000040)) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1589, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11, 0x1, 0x0, 0x4, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r9) ptrace$getregset(0x4204, r9, 0x2, &(0x7f0000000740)={0x0, 0x6c}) ptrace$ARCH_GET_GS(0x1e, r9, &(0x7f0000000000), 0x1004) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000000000010000000000"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 3m43.100841952s ago: executing program 4 (id=654): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000ac0)={0x0, 0xc6, 0xfffffffe}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1c8}}, 0x0) 3m42.47063714s ago: executing program 3 (id=658): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}, {0x0}], 0x2) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x2) 3m42.405007289s ago: executing program 3 (id=659): unshare(0xa000200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) semget$private(0x0, 0x4000, 0x326) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000340)=""/108, 0x6c}], 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02"], 0xfe44, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x18}}], 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000e40)=ANY=[@ANYBLOB], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r6}, 0x10) ioctl$sock_SIOCBRDELBR(r5, 0x89a3, &(0x7f0000000200)='bridge0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x1, 0x0, 0x7ffc0001}]}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000f10000000500000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000005a2f58c73e7de369a3b00d00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000200)) r8 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x1ff, 0x1501) ioctl$USBDEVFS_SETCONFIGURATION(r8, 0x80045505, &(0x7f0000000000)=0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 3m42.266645519s ago: executing program 3 (id=660): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00000001000000090000000800000000000000", @ANYRES32, @ANYBLOB="048f7393314d9a5200"/21, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) 3m42.221595759s ago: executing program 3 (id=662): syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file1\x00', 0x844, &(0x7f0000000bc0)=ANY=[], 0x1, 0x253, &(0x7f00000004c0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x738e23cd, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x3, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {0x0, 0x0, 0x28, 0x0, @wg=@data={0x4, 0x0, 0x0, "200200"/16}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000200000000001200000085000000230000003f0000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) flistxattr(r3, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 3m41.967497858s ago: executing program 3 (id=664): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r1, 0x0, 0x1}, 0x18) pipe(0x0) epoll_create1(0x0) semget$private(0x0, 0x1, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)=@known='security.selinux\x00', 0x0, 0x0) 3m41.720892176s ago: executing program 3 (id=666): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r1, 0x0, 0x1}, 0x18) pipe(0x0) epoll_create1(0x0) semget$private(0x0, 0x1, 0x0) semop(0x0, &(0x7f0000000240)=[{0x0, 0x8001}], 0x1) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)=@known='security.selinux\x00', 0x0, 0x0) 3m41.720655887s ago: executing program 41 (id=666): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r1, 0x0, 0x1}, 0x18) pipe(0x0) epoll_create1(0x0) semget$private(0x0, 0x1, 0x0) semop(0x0, &(0x7f0000000240)=[{0x0, 0x8001}], 0x1) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)=@known='security.selinux\x00', 0x0, 0x0) 3m37.856855663s ago: executing program 1 (id=684): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtaction={0x70, 0x30, 0x0, 0x0, 0x0, {0x9}, [{0x5c, 0x1, [@m_sample={0x58, 0x0, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_RATE={0x8}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0x80000}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x4}}}}]}]}, 0x70}}, 0x20040000) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x14) ioctl$TIOCVHANGUP(r3, 0x5437, 0x2) write$binfmt_misc(r2, &(0x7f0000000240), 0xfffffecc) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000000)=0x81d) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000005c0)=[{0x200000000006, 0xde, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, @void, @value}, 0x94) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r6], 0x90}}, 0x0) 3m36.87474798s ago: executing program 1 (id=690): r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) 3m36.809640439s ago: executing program 1 (id=691): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d00)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x44000) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f00000006c0)=r3) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$can_raw(0x1d, 0x3, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000080)={0x0, 0x1, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="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"}) 3m36.735696029s ago: executing program 1 (id=693): syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file1\x00', 0x844, &(0x7f0000000bc0)=ANY=[], 0x1, 0x253, &(0x7f00000004c0)="$eJzs3c9LVFEUAOCjM/5qMxJBEEEDEbQaVGhvRIEkFckQRkhjjiGOCAlCLdRWQas2LVu6M4JatKv/IWjTJtpEy9y1CF/ok3HMMTVyJpzv27zDu+fcd++V956zmDt3T89MT8zOTa6ufo3u7rbIDt5fS5K26I32yERqKQCAo+RHksT3JNXssQAAjeH9DwCtZ6/3f0d6uNHgYQEAh+jvP/8/H333uVQevLCP1KSrGn4aO/gYAYB/a2T09tW19+d6huLNs4iZJ/PF+WJ6TNsvTsZUVKIcfZGLnxFJVRpfGRq+3Jdf1xNRnFncrF+cL2a21/dHLnojbl3bWd+fT22v74hjtfUDkYsT9a8/ULe+M86frakvRC4+3IvZqMTE+r8kNfUL/fn8pevDv9V3beTFcqapfx8AAAAAAAAAAAAAAAAAAAAAAI6mQr6qt97+PYXCbu1p/f73B9ran+fpRn02TmXjcXNnDwAAAAAAAAAAAAAAAAAAAP+HuYePpkuVSvlBNRi/OXV8+5m9grY6TZnN/g/ST8sE6wtziJc4ExGHPYvXK+WPy2N3Rpq/mA0M6q/qq6YPbPwPOe0RsRGcfDFYervw5dvOnFiquZez6X1bqqTHztqHRb7BDycAAAAAAAAAAAAAAAAAAGgxW18D3i0jaeyAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKAJtn7//8BBZ/XMSk/a2S7JaePLps4TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDW9isAAP//e+Wozg==") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x738e23cd, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x3, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {0x0, 0x0, 0x28, 0x0, @wg=@data={0x4, 0x0, 0x0, "200200"/16}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000040)='tlb_flush\x00', r2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000200000000001200000085000000230000003f0000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) flistxattr(r3, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 3m36.169105957s ago: executing program 1 (id=702): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000035000100000000000000000004"], 0x28}}, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYRES8=r0], 0xe4}, 0x1, 0x0, 0x0, 0x40c1}, 0x4040000) 3m35.242732274s ago: executing program 4 (id=712): syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file1\x00', 0x844, &(0x7f0000000bc0)=ANY=[], 0x1, 0x253, &(0x7f00000004c0)="$eJzs3c9LVFEUAOCjM/5qMxJBEEEDEbQaVGhvRIEkFckQRkhjjiGOCAlCLdRWQas2LVu6M4JatKv/IWjTJtpEy9y1CF/ok3HMMTVyJpzv27zDu+fcd++V956zmDt3T89MT8zOTa6ufo3u7rbIDt5fS5K26I32yERqKQCAo+RHksT3JNXssQAAjeH9DwCtZ6/3f0d6uNHgYQEAh+jvP/8/H333uVQevLCP1KSrGn4aO/gYAYB/a2T09tW19+d6huLNs4iZJ/PF+WJ6TNsvTsZUVKIcfZGLnxFJVRpfGRq+3Jdf1xNRnFncrF+cL2a21/dHLnojbl3bWd+fT22v74hjtfUDkYsT9a8/ULe+M86frakvRC4+3IvZqMTE+r8kNfUL/fn8pevDv9V3beTFcqapfx8AAAAAAAAAAAAAAAAAAAAAAI6mQr6qt97+PYXCbu1p/f73B9ran+fpRn02TmXjcXNnDwAAAAAAAAAAAAAAAAAAAP+HuYePpkuVSvlBNRi/OXV8+5m9grY6TZnN/g/ST8sE6wtziJc4ExGHPYvXK+WPy2N3Rpq/mA0M6q/qq6YPbPwPOe0RsRGcfDFYervw5dvOnFiquZez6X1bqqTHztqHRb7BDycAAAAAAAAAAAAAAAAAAGgxW18D3i0jaeyAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKAJtn7//8BBZ/XMSk/a2S7JaePLps4TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDW9isAAP//e+Wozg==") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x738e23cd, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x3, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {0x0, 0x0, 0x28, 0x0, @wg=@data={0x4, 0x0, 0x0, "200200"/16}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000040)='tlb_flush\x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000200000000001200000085000000230000003f0000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) flistxattr(r3, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 3m35.196239284s ago: executing program 42 (id=712): syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file1\x00', 0x844, &(0x7f0000000bc0)=ANY=[], 0x1, 0x253, &(0x7f00000004c0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x738e23cd, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x3, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {0x0, 0x0, 0x28, 0x0, @wg=@data={0x4, 0x0, 0x0, "200200"/16}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000040)='tlb_flush\x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000200000000001200000085000000230000003f0000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) flistxattr(r3, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 3m35.192104104s ago: executing program 1 (id=716): symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0) 3m35.152881653s ago: executing program 43 (id=716): symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0) 1m18.875019839s ago: executing program 8 (id=3721): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x13, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000200085000000ae00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(0xffffffffffffffff, 0x8) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000002c0)="cc", 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x800002}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e25, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0xfffffffd}, 0x1c) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x0, 0x9, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000002c0)=0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000140)=0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"d5b788debd736de6ca4ba94f98fd8589", 0x0, 0x0, {0x2, 0x5}, {0x8000000000000001, 0x80000001}, 0xffff, [0x3, 0x20005, 0x3, 0x5e, 0x3ff, 0xd940, 0x5, 0x0, 0x6, 0x0, 0xbe, 0xc, 0x3, 0x9, 0x2667, 0x6]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001340)={{r4}, r5, 0x0, @inherit={0x80, &(0x7f00000001c0)={0x0, 0x7, 0x3, 0xc0000000000000, {0x2, 0x3, 0xfff, 0x1, 0x101}, [0x8000000000000000, 0x5, 0xf, 0x3, 0x7, 0x4, 0x5]}}, @devid}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000b00)={0x0, 0x5, 0x0, [0x5, 0x7ef11aef, 0x46, 0x3, 0x8], [0x3, 0x3ff, 0x9, 0x9, 0x2, 0x7, 0xee, 0xb, 0x6f4, 0x7, 0x3, 0x7, 0x9, 0x8000000000000001, 0x2, 0xb, 0x3, 0xe, 0x7fffffff, 0x86ac, 0xe1, 0x7, 0x7, 0xa, 0x9, 0x2083098b, 0x9, 0x7, 0x668, 0x5, 0x2, 0x2, 0x8, 0xffffffff, 0x7, 0x0, 0x0, 0xfffffffffffffff8, 0xa4, 0x4, 0x9, 0x4, 0x1, 0x1, 0x2, 0x225d, 0x5fd3, 0x3, 0x0, 0x0, 0x2, 0x5, 0x3, 0x4, 0x80000000, 0xe, 0x7, 0x9, 0x101, 0x3, 0x8000000000000000, 0x3, 0xfffffffffffffffc, 0x8, 0xe, 0x200, 0x21e, 0x3, 0x7fffffff, 0x8001, 0x5, 0x2, 0xffffffffffffffc6, 0x7fffffffffffffff, 0x4b, 0x1, 0x0, 0x0, 0x6, 0x2, 0x40, 0x4, 0x8, 0x5, 0x5, 0x919, 0x7, 0x0, 0x81, 0x800, 0x8, 0x4, 0x927, 0x5, 0x8, 0x6, 0xffffffff80000000, 0x8000000000000001, 0x8, 0x101, 0xba8, 0x29, 0x6ca2, 0xe329, 0x10, 0x8000, 0xb3, 0x4, 0x5, 0x6, 0x39e, 0xe, 0x5a1, 0x7ff, 0xfffffffffffffff7, 0xffffffff, 0xdb8, 0x5, 0x0, 0x4, 0xd]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000600)={0x0, 0x6, 0x3}) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r3}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x4}, 0x8) close(r1) 1m18.722069539s ago: executing program 8 (id=3725): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x8000003d) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x8002) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000000440)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r5}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)='O', 0x36}], 0x1}}], 0x1, 0x0) 1m18.721607209s ago: executing program 8 (id=3726): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fc0f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, 0x0, 0x0) close(r2) 1m18.720960019s ago: executing program 8 (id=3727): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xeed618a95e56e53f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0x5}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001040)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x2) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) syz_io_uring_setup(0x24fb, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0xfffffffc}, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x1000407, &(0x7f0000000040)={[{@abort}, {@norecovery}, {@orlov}, {@nomblk_io_submit}]}, 0x4, 0x5cd, &(0x7f0000001400)="$eJzs3c9PHFUcAPDvDAsUUMHGROvBEI22iRYKbU39cWjvTVN/3LyIhTa1tCUFo1QTaVI9mBgvHpp48mD9L7TRqycTDx68eDJNqjG9aIxZM/sDlmUXFsoylfl8kum+N2/gvSl8mTdv3tsNoLBGs3/SiH0RMZdEDDeUlaJWOFo97u6fH5zJtiTK5df+SOKZ2r768Untdaj2xf8OR/z4XRJ7e9bWO7949cLU7OzMlVp+fOHi3Pj84tWD5y9OnZs5N3Np8vnJY0ePHD02ceiezi9tSJ+8/va7w5+ceuOrL/5JJr7+5VQSx+P3s9WyxvPYLqMxGn+Vyx8278/+X49td2U56Vn+PVmRNO/g/pVUY6Q3Ih6N4ehp+GkOx0ev5No2oKvKSUQZKKhE/ENB1fsB9Xv7zu6D0y73SoCdcOdEVO7+18Z/qTo2GCOVsYHBu8mqcZ4WQ3pbktXxw/enrmdbdGkcDmht6Vp/LdUc/0klNkdiTyU3eDddFf9ZD+B07TXb/+oW6x9tyot/2DlL1yLisVb9/43j/82G+H9ri/WLfwAAAAAAANg+t05ExHOtnv+ltWdze+LJxvk/P62sEDy+DfVv/Pwvvb0N1QAt3DkR8fLq+b9J0yEjPbXn/A9WZwMmZ8/PzhyKiIci4kD09mf5iXXqOPjp3hvtyhrn/2Vb1ob6XMCq9Hapf/XXTE8tTG31fIEVd65FPF5qP/8n5kqVdf3N83+zvwdzHdax9+mbp9uVbRz/QLeUv4zY33L9z0o3IFn//TnGK/2B8XqvYK0n3v/sm3b1i3/IT3b9H1w//keSxvfrmd/c9++LiMOLpXK78rbxv9zZaN3/70te76l//8x7UwsLVyYi+pKTa/dPbq7NsFvV46EeL1n8H3hq/fG/5f5/QxwORMRSh3UOxNCv7cpc/yE/WfxPb+r6v/nE5M2Rb9vV39n435HKNf1AbY/xP1hfpwGadzsBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4P8ojYgHIknHltNpOjYWMRQRj8RgOnt5fuHZs5ffuTSdlVU+/z+tf9LvcDWf1D//f6QhP9mUPxwRD0fE5z0DlfzYmcuz03mfPAAAAAAAAAAAAAAAAAAAANwnhtqs/8/81pN364CuK9VexTsUTynvBgC5Ef9QXOIfikv8Q3GJfyiuLca/xwWwC7j+Q1H1dnbYnm63A8hDp9f/gS63AwAAAAAA2Ba3XnrhRhIRSy8OVLZMX61s+cGgcX/YldK8GwDkxhxeKC5Tf6G4Opz8C+xiyXLq73Kr8vaz/5PuNAgAAAAAAAAAAAAAWGP/vls/b7j+H9iVrP+H4lq1/r8/v3YAO8/6fygu9/jARqv4rf8HAAAAAAAAAAAAgPzNL169MDU7O3OlIIn6esf7pT0S6yR6I6LdMfVf4Huv6/DHrYqSXAOkL//w3Pm/RQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQGv/BQAA//9qrhqf") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x64, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000440), &(0x7f0000000540), 0x8, 0xa8, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r8) ptrace$getregset(0x4205, r8, 0x1, &(0x7f0000000180)={0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r8, 0x0, 0x0) lsm_get_self_attr(0x66, 0x0, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c0002800500010006"], 0x44}}, 0x0) fcntl$dupfd(r3, 0x0, r3) 1m18.568727318s ago: executing program 8 (id=3728): socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) recvmmsg(r2, &(0x7f00000023c0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000300)=""/122, 0x7a}, {&(0x7f0000000380)=""/126, 0x7e}, {&(0x7f00000004c0)=""/68, 0x44}, {&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000640)=""/182, 0xb6}, {&(0x7f0000000700)=""/102, 0x66}, {&(0x7f0000000180)=""/56, 0x38}, {&(0x7f0000001000)=""/193, 0xc1}, {&(0x7f0000000880)=""/242, 0xf2}], 0x9, &(0x7f0000000a40)=""/126, 0x7e}, 0xe4}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000440)}, {&(0x7f0000000ac0)=""/166, 0xa6}, {&(0x7f0000000b80)=""/173, 0xad}, {&(0x7f0000000c40)=""/221, 0xdd}, {&(0x7f0000000d40)=""/236, 0xec}, {&(0x7f0000000e40)=""/60, 0x3c}], 0x6, &(0x7f0000000f00)=""/80, 0x50}, 0x1}, {{&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000f80)=""/53, 0x35}, {&(0x7f0000000400)=""/13, 0xd}, {&(0x7f0000000780)=""/44, 0x2c}, {&(0x7f00000007c0)=""/175, 0xaf}], 0x4}}, {{&(0x7f0000001140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001380)=[{&(0x7f00000011c0)=""/157, 0x9d}, {&(0x7f0000001280)=""/196, 0xc4}], 0x2, &(0x7f00000013c0)=""/4096, 0x1000}, 0x29}], 0x4, 0x40012020, 0x0) (async) recvmmsg(r2, &(0x7f00000023c0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000300)=""/122, 0x7a}, {&(0x7f0000000380)=""/126, 0x7e}, {&(0x7f00000004c0)=""/68, 0x44}, {&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000640)=""/182, 0xb6}, {&(0x7f0000000700)=""/102, 0x66}, {&(0x7f0000000180)=""/56, 0x38}, {&(0x7f0000001000)=""/193, 0xc1}, {&(0x7f0000000880)=""/242, 0xf2}], 0x9, &(0x7f0000000a40)=""/126, 0x7e}, 0xe4}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000440)}, {&(0x7f0000000ac0)=""/166, 0xa6}, {&(0x7f0000000b80)=""/173, 0xad}, {&(0x7f0000000c40)=""/221, 0xdd}, {&(0x7f0000000d40)=""/236, 0xec}, {&(0x7f0000000e40)=""/60, 0x3c}], 0x6, &(0x7f0000000f00)=""/80, 0x50}, 0x1}, {{&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000f80)=""/53, 0x35}, {&(0x7f0000000400)=""/13, 0xd}, {&(0x7f0000000780)=""/44, 0x2c}, {&(0x7f00000007c0)=""/175, 0xaf}], 0x4}}, {{&(0x7f0000001140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001380)=[{&(0x7f00000011c0)=""/157, 0x9d}, {&(0x7f0000001280)=""/196, 0xc4}], 0x2, &(0x7f00000013c0)=""/4096, 0x1000}, 0x29}], 0x4, 0x40012020, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) socket$netlink(0x10, 0x3, 0x0) (async) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)=@setlink={0x28, 0x13, 0xbaa23f3d13f2d1f5, 0x3, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_TXQLEN={0x8, 0xd, 0xc3}]}, 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 1m18.548699378s ago: executing program 8 (id=3730): timer_create(0x1, 0x0, &(0x7f0000000280)=0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000206a932500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020786c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000000)='sys_enter\x00', r1, 0x0, 0x91}, 0x18) timer_getoverrun(r0) 1m18.519958498s ago: executing program 44 (id=3730): timer_create(0x1, 0x0, &(0x7f0000000280)=0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000206a932500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020786c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000000)='sys_enter\x00', r1, 0x0, 0x91}, 0x18) timer_getoverrun(r0) 2.227103329s ago: executing program 2 (id=5650): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) r2 = syz_open_dev$sg(&(0x7f00000005c0), 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000012cc0)={'#! ', './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x1000a) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r3, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000140)={0x5b, ""/91}) syz_read_part_table(0x60d, &(0x7f0000002240)="$eJzs3D9olHcYB/DvJbmcUTAdnFxqHDoJRXE0Q5XkqlgIp1IIDvYfIs0UIXDSw5Q4tBkUM0jHLlK4DhonYwYnRaFzEQeLkMGlYBepHXLl7l6SOyjF0oRS/HyGe353PDzf94F3/V34XxtIuTi1Kp3y/qd/298a3TzP50xzYvJ4q9VqnU5KOZtyxsq7l5MMpX9q9icZ7plz8/udq9/+9mG5+fTUq/fOPVgc2JhZyTtJdvU2Z+SvHqXyzzZlO9wafzi6cGW2erX9pdpYW/84uf1yorZycnFp+UT52Oft3y8nj4r+7osxkoup51K+zCdDbxz19eax1Jc/386vj194Um2sfdd8fnB9b3Xw7vkjr/etXrt/KJlrR0yl87JvGv6Xi/fkL/Tkz41dn15qHD1wZ8+Nw/V7j2svBn9vdRWR5a3JBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABge9xqf1yZrV6tj194Um2sffPzTx/dfjlRWzm5uLR8YvjYs6LvUVGHinox9VxKOclMZvJFZt88crrUmz/+cHRhI/+Pncnzg+t7q82754+8nly9dv9Qp6uUqXYZ2IqN+/XnN9bmxq5PLzWOHriz58bh+r3HtReD3b6ZSj7rrJuksvWPAQAAAAAAAAAAAAAAAAAAwFtuYvL4vqkPaqeTUs7uSPLrV51b9q3KyI/p3Lzv2l/UZ5Vkd5KbO7r/BdB8eurV8LkHi78Ul+LnU8l8kl0/rJxJ3t3IudwfW96czH/pzwAAAP//gTiR5w==") bpf$MAP_CREATE(0x0, 0x0, 0x48) 2.225796399s ago: executing program 2 (id=5652): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x50, 0x0, 0x2, 0xfffffffd}, {0x6, 0x3}]}, 0x10) setrlimit(0xf, 0x0) timer_create(0x3, 0x0, &(0x7f0000000200)=0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000141007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000300)={{0x1, 0x1, 0x18, r5, {0x3}}, './file0\x00'}) getdents(r2, &(0x7f0000000100)=""/155, 0x9b) timer_settime(r1, 0x0, &(0x7f0000000280)={{}, {0x0, 0x989680}}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e140602000000000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) 2.207425419s ago: executing program 2 (id=5656): r0 = gettid() timer_create(0x7, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) timer_settime(r1, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(0xffffffffffffffff, 0xc, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='@\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004Y\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='block_rq_remap\x00', r4}, 0x18) r5 = socket$phonet(0x23, 0x2, 0x1) accept(r5, &(0x7f00000002c0)=@l2tp={0x2, 0x0, @empty}, &(0x7f0000000180)=0x80) mount(&(0x7f00000003c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='nfsd\x00', 0x3240006, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfffd, 0x0, @empty, 0x4}, {0xa, 0x0, 0x0, @empty, 0xfffffffc}, r7}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000008c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, r7, 0x10, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r8, 0x6, &(0x7f0000002000)={0x1}) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$P9_RLERRORu(r9, &(0x7f0000000380)={0x10, 0x7, 0x1, {{0x3, '}^!'}, 0x1}}, 0x10) fcntl$lock(r8, 0x26, &(0x7f00000031c0)) 2.145796289s ago: executing program 2 (id=5659): socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x10) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r1, 0x0, 0x209, 0x0, 0x8, 0xf7}, &(0x7f00000000c0)=0x14) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000006c0)={0x0, 0x7fff, 0x0, {0x0, 0x1}, {0x50, 0x2}, @period={0x5d, 0x6, 0x2, 0x7f, 0x2, {0x1, 0x3, 0x4, 0x2}, 0x0, 0x0}}) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x4) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000640)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{}, &(0x7f0000000680), &(0x7f0000000700)='%pi6 \x00'}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="fbffffff00"/20], 0x50) syz_io_uring_setup(0x110, &(0x7f0000000140)={0x0, 0xfad6}, &(0x7f0000000240)=0x0, &(0x7f0000000380)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r5, 0x0) accept4(r5, &(0x7f0000000300)=@sco, &(0x7f0000000040)=0x80, 0x800) write$char_usb(r2, &(0x7f0000000040)="e2", 0x12d8) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r7, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) readv(r7, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/84, 0x54}, {&(0x7f0000000340)=""/219, 0xdb}, {&(0x7f0000000240)=""/175, 0xaf}], 0x3) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xe0, 0xc}, 0x1c5c6, 0x0, 0x2, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 1.259225175s ago: executing program 2 (id=5694): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) pipe2$9p(&(0x7f0000000000), 0x80) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x7, &(0x7f00000000c0)) getgroups(0x0, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x4e8, 0x0, 0x940c, 0x3002, 0x2e0, 0x2c0, 0x418, 0x3d8, 0x3d8, 0x418, 0x3d8, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @local, [0xff, 0xffffffff, 0x0, 0xff000000], [0xffffff00, 0xff000000], 'erspan0\x00', 'wlan0\x00', {}, {0xff}, 0x2b, 0x3, 0x3}, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, [0x0, 0x0, 0xff000000, 0xff], [0xffffff00, 0xffffff00, 0xff000000, 0xffffffff], 'team_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x886215f4d37bb4bb, 0x90, 0x1, 0x69}, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x548) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001d40)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x7}, {}, {0x7, 0x10}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x8, 0x2, [@TCA_CGROUP_POLICE={0x4}]}}]}, 0x38}}, 0x0) 855.638193ms ago: executing program 5 (id=5708): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x3882d92609dea257, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000e5ffff06020000f8ffffffb703000000000000b70400c209000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f0000000280)=ANY=[@ANYBLOB="1b0204"], 0x18) 580.400912ms ago: executing program 5 (id=5715): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x50, 0x0, 0x2, 0xfffffffd}, {0x6, 0x3}]}, 0x10) setrlimit(0xf, 0x0) timer_create(0x3, 0x0, &(0x7f0000000200)=0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000141007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000300)={{0x1, 0x1, 0x18, r4, {0x3}}, './file0\x00'}) getdents(r2, &(0x7f0000000100)=""/155, 0x9b) timer_settime(r1, 0x0, &(0x7f0000000280)={{}, {0x0, 0x989680}}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e140602000000000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) 579.677902ms ago: executing program 5 (id=5716): socket$qrtr(0x2a, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xa0}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r2}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001f2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0x0, 0x0, 0x42, 0x0, "bd1c790806ed6dcd18899f9ea77ca9fb5184ff0ba54b7dfe784d2f6b7dcd9474d9b295588ac0b991d5c66461eca3f1ff5543acc6c970d0ad22d692e84d692972368e64c272da633a217b45fcc8b1ff3b"}, 0xd8) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000340)=0x2, 0xa2) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="190000000400000008000000ff"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x54e, &(0x7f00000014c0)="$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") lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=r5, @ANYBLOB="040000000000800008000000", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) open(&(0x7f0000000040)='.\x00', 0x418601, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) ioperm(0x0, 0x8, 0x3f) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f000000e0c0), 0x10010) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 521.898872ms ago: executing program 7 (id=5717): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x7, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) flock(r1, 0x5) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 520.590602ms ago: executing program 6 (id=5718): openat$sndtimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) mknod(&(0x7f0000000540)='./file1\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='attr/keycreate\x00') mount$9p_fd(0x0, &(0x7f00000006c0)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) syz_io_uring_setup(0x4174, &(0x7f0000000780)={0x0, 0x0, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000050900010073797a31000000004c000000050a01020000100000000000010020000c00024000000000000000010900010073797a310000000020000480140003006e657464657673696d300000000000000800014000000005"], 0xd4}}, 0x0) r5 = io_uring_setup(0x30d1, &(0x7f0000000300)={0x0, 0xd27b}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1200000004000000080000000b00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r7, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) close_range(r5, 0xffffffffffffffff, 0x0) 500.932532ms ago: executing program 2 (id=5719): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) write(r2, &(0x7f0000000200)="89ba41c97928dec7cec15a160d3dba257872aed129d4b5247c9834550448a4f46c37425b873ec95db3d757e8b2333a64d9abf416fd83f942661c47bcdf71f7d07ba2b2f051829a7f66952e57962614db0d03474a4a4bce636ea8d2b882b2b49ef18e76edbec7302a96e41f206d930eda2769c56e6d5e3d541ce9a21c3ce5cb5f", 0x1fc0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x28}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f00000004c0)=""/4096) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x2, 0x4) syz_socket_connect_nvme_tcp() setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000180)=0x40000001, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) 500.209012ms ago: executing program 7 (id=5720): socket$netlink(0x10, 0x3, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x600}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}, 0x1, 0x2}, 0x0) 468.260122ms ago: executing program 6 (id=5721): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0xfffffffffffffe01, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) r1 = socket(0x10, 0x3, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) (async) kexec_load(0x8, 0x0, 0x0, 0x2) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) (async) sendmsg$nl_route_sched(r1, 0x0, 0x0) (async) connect$pppoe(r1, 0x0, 0x0) (async) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x3}}) (async) close_range(r4, 0xffffffffffffffff, 0x400000000000000) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_XFRM_DIR={0x5}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) syz_emit_ethernet(0x5a, &(0x7f0000000ac0)={@local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x21, 0x0, @private, @broadcast}, @source_quench={0x4, 0x0, 0x0, 0x0, {0xc, 0x4, 0x3, 0x0, 0x66, 0x66, 0x4, 0x4, 0x0, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0xc, 0x6b, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0x86, 0x0, 0xf, [0x10001]}, @ra={0x94, 0x4, 0x1000}]}}}}}}}, 0x0) fsetxattr(r3, &(0x7f0000000240)=@random={'os2.', 'GPL\x00'}, &(0x7f0000000280)='\\\x00', 0x2, 0x2) 467.752142ms ago: executing program 7 (id=5722): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) bind$can_raw(r2, &(0x7f0000000000), 0x10) dup3(r1, r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x2, 0x4e20, @local}, @ib={0x1b, 0x0, 0x0, {"7d735931001d00007f004103ff0100"}, 0x0, 0x3}}}, 0x118) 461.149992ms ago: executing program 5 (id=5723): r0 = socket(0x15, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x10000, @mcast1, 0x7}, 0x1c) 438.219382ms ago: executing program 7 (id=5724): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x8002) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmmsg(r2, &(0x7f0000000440)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)='O', 0x36}], 0x1}}], 0x1, 0x0) 437.801831ms ago: executing program 0 (id=5725): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x3882d92609dea257, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000e5ffff06020000f8ffffffb703000000000000b70400c209000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f0000000280)=ANY=[@ANYBLOB="1b0204"], 0x18) 402.824402ms ago: executing program 6 (id=5726): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x50, 0x0, 0x2, 0xfffffffd}, {0x6, 0x3}]}, 0x10) setrlimit(0xf, 0x0) timer_create(0x3, 0x0, &(0x7f0000000200)=0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000141007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000300)={{0x1, 0x1, 0x18, r4, {0x3}}, './file0\x00'}) getdents(r2, &(0x7f0000000100)=""/155, 0x9b) timer_settime(r1, 0x0, &(0x7f0000000280)={{}, {0x0, 0x989680}}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e140602000000000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) 402.208992ms ago: executing program 0 (id=5727): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x4}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{0x3}, {}, {}, {}, {}, {0x448eade7}, {0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x100}, {}, {0x2, 0x0, 0x0, 0x2}, {}, {0xfffffffc}, {0x0, 0xe}, {}, {}, {0x0, 0x4, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {0xfffffffe}, {}, {}, {0x0, 0x10000000}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x10}, {}, {}, {0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8000000}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe10}, {}, {}, {0x800}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xefa6}, {0x0, 0x1}, {}, {0x0, 0x3c}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, {0x11}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {0x3}, {}, {}, {0x5}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 392.936952ms ago: executing program 5 (id=5728): r0 = socket(0x15, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x10000, @mcast1, 0x7}, 0x1c) (fail_nth: 2) 392.570012ms ago: executing program 7 (id=5729): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x108400, &(0x7f0000000100)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="ff2cef03fff2e731e54946e75b", @ANYRES16=0x0], 0x81, 0x2d9, &(0x7f0000000b00)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x68040200) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_names\x00') r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r1}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xae) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x6a, &(0x7f00000002c0)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x35}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x34, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x3}, {"189d6c149d9b0c7d03ac461b732db63ac66a46b28d88eb6f5cecbb144f0bafdc"}}}}}}}, 0x0) (fail_nth: 12) 314.154591ms ago: executing program 6 (id=5730): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x6, &(0x7f00000000c0)={0x13, {{0x29, 0x0, 0x39000000, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x88) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20088005, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2, 0x5}, 0x1c) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x3000006, &(0x7f00000004c0)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000}}, {@abort}, {@block_validity}, {@init_itable_val={'init_itable', 0x3d, 0x6}}, {@block_validity}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xfff}}, {@nobh}, {@bh}, {@orlov}, {@user_xattr}, {@init_itable_val={'init_itable', 0x3d, 0x400}}], [{@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}, 0x1, 0x556, &(0x7f0000001100)="$eJzs3d1rW+UfAPDvSdu9/37rYAwVkcIunMyltvVlghfzUnQ40PsZ2rMymi6jScdaB24X7sYbGYKIA/Fe770c/gP+FQMtDBlFL7ypnPSky9akybL0ZebzgbM9zzknfc4353yfPCdPQgIYWGPZP4WIFyPi6yTiaNO24cg3jq3vt/rwxnS2JLG29smfSST5usb+Sf7/4bzyQkT8+mXE6cLmdqtLy3OlcjldyOvjtfmr49Wl5TOX50uz6Wx6ZXJq6uxbU5PvvvN232J97cLf331874OzX51c/fbnlWN3kjgXR/JtzXE8g5vNlbEYy5+TkTj3xI4TfWhsL0l2+wDoyVCe5yOR9QFHYyjPeuC/74uIWAMGVCL/YUA1xgGNe/s+3Qc/Nx68v34DtDn+4fX3RuJA/d7o0Gry2J1Rdr872of2szZ++ePunWyJ/r0PAdDRzVsRK0PDw5v7vyTv/3r3Rhf7PNmG/g92zr1s/PN6q/FPYWP8Ey3GP4db5G4vOud/YaUPzbSVjf/eazn+3Zi0Gh3Ka/+rj/lGkkuXy2nWt/0/Ik7FyP6svtV8ztnV+2vttjWP/7Ila78xFsyPY2V4/+OPmSnVSs8Sc7MHtyJeajn+TTbOf9Li/GfPx4Uu2ziR3n2l3bbO8W+vtR8jXm15/h/NaCVbz0+O16+H8cZVsdlft0/81q793Y4/O/+Hto5/NGmer60+fRs/HPgnbbet1+t/X/JpvbwvX3e9VKstTETsSz7avH7y0WMb9cb+WfynTm7d/7W6/g9GxGddxn/7+E8v9x7/9srin3mq8//0hfsffv59u/a7O/9v1kun8jXd9H/dHuCzPHcAAAAAAACw1xQi4kgkheJGuVAoFtc/33E8DhXKlWrt9KXK4pWZqH9XdjRGCo2Z7qNNn4eYyD8P26hPPlGfiohjEfHN0MF6vThdKc/sdvAAAAAAAAAAAAAAAAAAAACwRxxu8/3/zO9Du310wLbzk98wuDrmfz9+6QnYk7z+w+CS/zC45D8MLvkPg0v+w+DqkP/JTh0HsPO8/sPgkv8AAAAAAAAAAAAAAAAAAAAAAAAAAADQVxfOn8+WtdWHN6az+sy1pcW5yrUzM2l1rji/OF2crixcLc5WKrPltDhdme/098qVytWJyVi8Pl5Lq7Xx6tLyxfnK4pXaxcvzpdn0YjqyI1EBAAAAAAAAAAAAAAAAAADA86W6tDxXKpfTBQWFngrDe+MwFPpc2O2eCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAe+TcAAP//Z7w5Vw==") setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) 313.734991ms ago: executing program 6 (id=5731): openat$sndtimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) mknod(&(0x7f0000000540)='./file1\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='attr/keycreate\x00') mount$9p_fd(0x0, &(0x7f00000006c0)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) syz_io_uring_setup(0x4174, &(0x7f0000000780)={0x0, 0x0, 0x10100}, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000050900010073797a31000000004c000000050a01020000100000000000010020000c00024000000000000000010900010073797a310000000020000480140003006e657464657673696d300000000000000800014000000005"], 0xd4}}, 0x0) r5 = io_uring_setup(0x30d1, &(0x7f0000000300)={0x0, 0xd27b}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1200000004000000080000000b00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r7, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) close_range(r5, 0xffffffffffffffff, 0x0) 150.115141ms ago: executing program 0 (id=5732): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b066d1f282831cf242b429600"/31, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) 73.37882ms ago: executing program 0 (id=5733): socket$netlink(0x10, 0x3, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000085"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x600}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}, 0x1, 0x2}, 0x0) 72.65317ms ago: executing program 5 (id=5734): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8ff0000000000ff000044850000000e0000003f0000000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r2, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0x0, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x23, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x34, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0x0, 0xa}, {0x1, 0xf}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x55}, 0x4000) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, 0x3fa, 0x400, 0x70bd25, 0x25dfdbfd, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0xc0}, 0x4001d) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="12000000020000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)=r3}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r5, &(0x7f0000000040), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000100085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000001280), 0x6) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000340)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0xea5, '.\x00'}}) 71.0382ms ago: executing program 0 (id=5735): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) io_uring_enter(0xffffffffffffffff, 0x4, 0x0, 0x14, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=ANY=[@ANYBLOB="2400000002010104000000000000000001000009040002800c001980080002001c"], 0x24}, 0x1, 0x0, 0x0, 0x40040}, 0x800) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3, 0x0, 0x10001}, 0x18) syz_emit_ethernet(0x1f, &(0x7f0000000140)=ANY=[@ANYBLOB="2105000b1e85b11c60b11300001142"], 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30080000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r5, 0x10, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x20000000) 887.37µs ago: executing program 6 (id=5736): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0) socket$kcm(0x21, 0x2, 0x2) msgget$private(0x0, 0x50) pselect6(0x0, 0x0, &(0x7f0000000180)={0x6, 0x6, 0x8, 0x8000000000000001, 0x5, 0x4, 0x9, 0x6}, 0x0, &(0x7f0000000200), 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f0000000400)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) socket$xdp(0x2c, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) read$msr(0xffffffffffffffff, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000300)={0x0, 0x1, 0x7}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f8483e0000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) 459.19µs ago: executing program 7 (id=5737): pipe(&(0x7f0000005880)) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='syzkaller\x00', 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) (async) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="440000001800010000000000000000000a0000000000000000000000180016000d0001000900000000000000000010000000000008000400", @ANYRES32, @ANYRES16=r0], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x800) (async) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x41, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "df3f0400000000000000000000000609000040"}) (async) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE(r4, &(0x7f0000002a00)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000000c0)=""/43, 0x2b}}, 0x120) (async) write$UHID_DESTROY(r4, &(0x7f0000000080), 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRES64=0x0, @ANYRES32=r5], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r8, &(0x7f0000000200)=ANY=[], 0xff2e) (async) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) eventfd(0x0) (async) mmap(&(0x7f0000565000/0x4000)=nil, 0x4000, 0x1000000, 0x200000005c831, r7, 0xb1ffc000) (async) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000580)='neigh_update\x00', r10}, 0x10) socket$inet6(0x10, 0x3, 0x0) 0s ago: executing program 0 (id=5738): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x3882d92609dea257, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000e5ffff06020000f8ffffffb703000000000000b70400c209000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f0000000280)=ANY=[@ANYBLOB="1b0204"], 0x18) kernel console output (not intermixed with test programs): [ 267.679337][T20348] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 267.702783][T20344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 267.702802][T20344] Call Trace: [ 267.702809][T20344] [ 267.702818][T20344] dump_stack_lvl+0xf2/0x150 [ 267.715599][T20348] vhci_hcd vhci_hcd.0: Device attached [ 267.721864][T20344] dump_stack+0x15/0x1a [ 267.721903][T20344] should_fail_ex+0x223/0x230 [ 267.733811][T20351] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 267.739998][T20344] should_failslab+0x8f/0xb0 [ 267.750099][T20351] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 267.753428][T20344] kmem_cache_alloc_node_noprof+0x59/0x320 [ 267.780225][T20348] lo speed is unknown, defaulting to 1000 [ 267.783287][T20344] ? __alloc_skb+0x10b/0x310 [ 267.783317][T20344] __alloc_skb+0x10b/0x310 [ 267.816991][T20344] ? audit_log_start+0x34c/0x6b0 [ 267.817068][T20344] audit_log_start+0x368/0x6b0 [ 267.817101][T20344] audit_seccomp+0x4b/0x130 [ 267.817123][T20344] __seccomp_filter+0x6fa/0x1180 [ 267.817151][T20344] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 267.817249][T20344] ? vfs_write+0x596/0x920 [ 267.817307][T20344] __secure_computing+0x9f/0x1c0 [ 267.817342][T20344] syscall_trace_enter+0xd1/0x1f0 [ 267.817379][T20344] ? fpregs_assert_state_consistent+0x83/0xa0 [ 267.817453][T20344] do_syscall_64+0xaa/0x1c0 [ 267.817476][T20344] ? clear_bhb_loop+0x55/0xb0 [ 267.817534][T20344] ? clear_bhb_loop+0x55/0xb0 [ 267.817553][T20344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 267.817585][T20344] RIP: 0033:0x7f04d50e5d19 [ 267.817602][T20344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 267.817682][T20344] RSP: 002b:00007f04d3750e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 267.817703][T20344] RAX: ffffffffffffffda RBX: 000000000000045b RCX: 00007f04d50e5d19 [ 267.817715][T20344] RDX: 00007f04d3750ef0 RSI: 0000000000000000 RDI: 00007f04d5162381 [ 267.817759][T20344] RBP: 0000000020000e40 R08: 00007f04d3750bb7 R09: 00007f04d3750e40 [ 267.817774][T20344] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000e00 [ 267.817788][T20344] R13: 00007f04d3750ef0 R14: 00007f04d3750eb0 R15: 0000000020000100 [ 267.817808][T20344] [ 267.818226][T20344] audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 [ 267.818261][T20344] audit: out of memory in audit_log_start [ 267.818408][ T29] audit: type=1326 audit(2000000104.750:18983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20343 comm="syz.5.4861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 267.818495][ T29] audit: type=1326 audit(2000000104.750:18984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20343 comm="syz.5.4861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 267.818528][ T29] audit: type=1400 audit(2000000104.750:18985): avc: denied { create } for pid=20343 comm="syz.5.4861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 267.818555][ T29] audit: type=1326 audit(2000000104.750:18986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20343 comm="syz.5.4861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 267.885727][ T1053] vhci_hcd: vhci_device speed not set [ 267.953373][ T1053] usb 5-1: new full-speed USB device number 8 using vhci_hcd [ 268.015842][T20349] vhci_hcd: connection reset by peer [ 268.016084][ T7387] vhci_hcd: stop threads [ 268.016093][ T7387] vhci_hcd: release socket [ 268.016166][ T7387] vhci_hcd: disconnect device [ 268.247263][T20393] FAULT_INJECTION: forcing a failure. [ 268.247263][T20393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.260698][T20393] CPU: 0 UID: 0 PID: 20393 Comm: syz.5.4882 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 268.271466][T20393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 268.281508][T20393] Call Trace: [ 268.284812][T20393] [ 268.287731][T20393] dump_stack_lvl+0xf2/0x150 [ 268.292319][T20393] dump_stack+0x15/0x1a [ 268.296485][T20393] should_fail_ex+0x223/0x230 [ 268.301173][T20393] should_fail+0xb/0x10 [ 268.305378][T20393] should_fail_usercopy+0x1a/0x20 [ 268.310396][T20393] _copy_to_user+0x20/0xa0 [ 268.314964][T20393] simple_read_from_buffer+0xa0/0x110 [ 268.320352][T20393] proc_fail_nth_read+0xf9/0x140 [ 268.325293][T20393] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 268.330852][T20393] vfs_read+0x1a2/0x700 [ 268.335108][T20393] ? __rcu_read_unlock+0x4e/0x70 [ 268.340104][T20393] ? __fget_files+0x17c/0x1c0 [ 268.344932][T20393] ksys_read+0xe8/0x1b0 [ 268.349113][T20393] __x64_sys_read+0x42/0x50 [ 268.353703][T20393] x64_sys_call+0x2874/0x2dc0 [ 268.358725][T20393] do_syscall_64+0xc9/0x1c0 [ 268.363323][T20393] ? clear_bhb_loop+0x55/0xb0 [ 268.368018][T20393] ? clear_bhb_loop+0x55/0xb0 [ 268.372767][T20393] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.378783][T20393] RIP: 0033:0x7f04d50e472c [ 268.383195][T20393] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 268.402871][T20393] RSP: 002b:00007f04d3751030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 268.411276][T20393] RAX: ffffffffffffffda RBX: 00007f04d52d5fa0 RCX: 00007f04d50e472c [ 268.419242][T20393] RDX: 000000000000000f RSI: 00007f04d37510a0 RDI: 0000000000000003 [ 268.427241][T20393] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 268.435280][T20393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 268.443242][T20393] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 268.451204][T20393] [ 268.651362][T20420] FAULT_INJECTION: forcing a failure. [ 268.651362][T20420] name failslab, interval 1, probability 0, space 0, times 0 [ 268.664034][T20420] CPU: 1 UID: 0 PID: 20420 Comm: syz.2.4894 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 268.674799][T20420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 268.684842][T20420] Call Trace: [ 268.688139][T20420] [ 268.691055][T20420] dump_stack_lvl+0xf2/0x150 [ 268.695722][T20420] dump_stack+0x15/0x1a [ 268.699928][T20420] should_fail_ex+0x223/0x230 [ 268.704606][T20420] should_failslab+0x8f/0xb0 [ 268.709309][T20420] kmem_cache_alloc_noprof+0x52/0x320 [ 268.714747][T20420] ? audit_log_start+0x34c/0x6b0 [ 268.719712][T20420] audit_log_start+0x34c/0x6b0 [ 268.724488][T20420] audit_seccomp+0x4b/0x130 [ 268.729082][T20420] __seccomp_filter+0x6fa/0x1180 [ 268.734086][T20420] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 268.739720][T20420] ? vfs_write+0x596/0x920 [ 268.744267][T20420] __secure_computing+0x9f/0x1c0 [ 268.749209][T20420] syscall_trace_enter+0xd1/0x1f0 [ 268.754254][T20420] ? fpregs_assert_state_consistent+0x83/0xa0 [ 268.760333][T20420] do_syscall_64+0xaa/0x1c0 [ 268.764845][T20420] ? clear_bhb_loop+0x55/0xb0 [ 268.769543][T20420] ? clear_bhb_loop+0x55/0xb0 [ 268.774283][T20420] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.780234][T20420] RIP: 0033:0x7fa143285d19 [ 268.784703][T20420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.804324][T20420] RSP: 002b:00007fa1418f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001cb [ 268.812768][T20420] RAX: ffffffffffffffda RBX: 00007fa143475fa0 RCX: 00007fa143285d19 [ 268.820760][T20420] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000064 [ 268.828857][T20420] RBP: 00007fa1418f7090 R08: 0000000000000000 R09: 0000000000000000 [ 268.836920][T20420] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 268.844903][T20420] R13: 0000000000000000 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 268.852892][T20420] [ 268.985703][T15441] usb 15-1: enqueue for inactive port 0 [ 268.993719][T15441] usb 15-1: enqueue for inactive port 0 [ 269.043065][T20430] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20430 comm=syz.7.4898 [ 269.085766][T15441] vhci_hcd: vhci_device speed not set [ 269.907455][T20454] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20454 comm=syz.0.4909 [ 270.163855][T20480] FAULT_INJECTION: forcing a failure. [ 270.163855][T20480] name failslab, interval 1, probability 0, space 0, times 0 [ 270.163880][T20480] CPU: 0 UID: 0 PID: 20480 Comm: syz.0.4921 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 270.163971][T20480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 270.163983][T20480] Call Trace: [ 270.164022][T20480] [ 270.164030][T20480] dump_stack_lvl+0xf2/0x150 [ 270.164138][T20480] dump_stack+0x15/0x1a [ 270.164170][T20480] should_fail_ex+0x223/0x230 [ 270.164196][T20480] should_failslab+0x8f/0xb0 [ 270.164287][T20480] kmem_cache_alloc_noprof+0x52/0x320 [ 270.164313][T20480] ? getname_flags+0x81/0x3b0 [ 270.164333][T20480] getname_flags+0x81/0x3b0 [ 270.164352][T20480] __x64_sys_unlinkat+0x75/0xb0 [ 270.164392][T20480] x64_sys_call+0x28d8/0x2dc0 [ 270.164415][T20480] do_syscall_64+0xc9/0x1c0 [ 270.164434][T20480] ? clear_bhb_loop+0x55/0xb0 [ 270.164453][T20480] ? clear_bhb_loop+0x55/0xb0 [ 270.164498][T20480] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.164535][T20480] RIP: 0033:0x7f757ed35d19 [ 270.164549][T20480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.164566][T20480] RSP: 002b:00007f757d3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 270.164583][T20480] RAX: ffffffffffffffda RBX: 00007f757ef25fa0 RCX: 00007f757ed35d19 [ 270.164595][T20480] RDX: 0000000000000200 RSI: 0000000020000380 RDI: ffffffffffffff9c [ 270.164622][T20480] RBP: 00007f757d3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 270.164634][T20480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.164699][T20480] R13: 0000000000000000 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 270.164776][T20480] [ 270.786289][T20523] lo speed is unknown, defaulting to 1000 [ 270.796551][T20522] lo speed is unknown, defaulting to 1000 [ 272.171412][T20619] FAULT_INJECTION: forcing a failure. [ 272.171412][T20619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.184696][T20619] CPU: 0 UID: 0 PID: 20619 Comm: syz.5.4979 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 272.195558][T20619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 272.205683][T20619] Call Trace: [ 272.208982][T20619] [ 272.208993][T20619] dump_stack_lvl+0xf2/0x150 [ 272.209106][T20619] dump_stack+0x15/0x1a [ 272.220813][T20619] should_fail_ex+0x223/0x230 [ 272.225528][T20619] should_fail+0xb/0x10 [ 272.229697][T20619] should_fail_usercopy+0x1a/0x20 [ 272.234812][T20619] _copy_to_user+0x20/0xa0 [ 272.239320][T20619] simple_read_from_buffer+0xa0/0x110 [ 272.244723][T20619] proc_fail_nth_read+0xf9/0x140 [ 272.249701][T20619] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 272.255268][T20619] vfs_read+0x1a2/0x700 [ 272.260054][T20619] ? __rcu_read_unlock+0x4e/0x70 [ 272.265071][T20619] ? ksys_read+0x5c/0x1b0 [ 272.269426][T20619] ksys_read+0xe8/0x1b0 [ 272.273676][T20619] __x64_sys_read+0x42/0x50 [ 272.278235][T20619] x64_sys_call+0x2874/0x2dc0 [ 272.282930][T20619] do_syscall_64+0xc9/0x1c0 [ 272.287444][T20619] ? clear_bhb_loop+0x55/0xb0 [ 272.292181][T20619] ? clear_bhb_loop+0x55/0xb0 [ 272.296862][T20619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 272.302829][T20619] RIP: 0033:0x7f04d50e472c [ 272.307264][T20619] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 272.326998][T20619] RSP: 002b:00007f04d3751030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 272.335480][T20619] RAX: ffffffffffffffda RBX: 00007f04d52d5fa0 RCX: 00007f04d50e472c [ 272.343497][T20619] RDX: 000000000000000f RSI: 00007f04d37510a0 RDI: 0000000000000003 [ 272.351472][T20619] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 272.359462][T20619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 272.367475][T20619] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 272.375452][T20619] [ 272.413377][T20628] netdevsim netdevsim5: loading /lib/firmware/. failed with error -22 [ 272.421692][T20628] netdevsim netdevsim5: Direct firmware load for . failed with error -22 [ 272.549180][T20654] netdevsim netdevsim6: loading /lib/firmware/. failed with error -22 [ 272.557563][T20654] netdevsim netdevsim6: Direct firmware load for . failed with error -22 [ 272.578227][T20658] FAULT_INJECTION: forcing a failure. [ 272.578227][T20658] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.591346][T20658] CPU: 1 UID: 0 PID: 20658 Comm: syz.7.4998 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 272.602233][T20658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 272.612290][T20658] Call Trace: [ 272.615651][T20658] [ 272.618586][T20658] dump_stack_lvl+0xf2/0x150 [ 272.623223][T20658] dump_stack+0x15/0x1a [ 272.627413][T20658] should_fail_ex+0x223/0x230 [ 272.632113][T20658] should_fail+0xb/0x10 [ 272.632144][T20658] should_fail_usercopy+0x1a/0x20 [ 272.632177][T20658] _copy_to_user+0x20/0xa0 [ 272.632238][T20658] simple_read_from_buffer+0xa0/0x110 [ 272.632274][T20658] proc_fail_nth_read+0xf9/0x140 [ 272.632312][T20658] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 272.632345][T20658] vfs_read+0x1a2/0x700 [ 272.632405][T20658] ? __rcu_read_unlock+0x4e/0x70 [ 272.632513][T20658] ? __fget_files+0x17c/0x1c0 [ 272.632558][T20658] ksys_read+0xe8/0x1b0 [ 272.632588][T20658] __x64_sys_read+0x42/0x50 [ 272.632700][T20658] x64_sys_call+0x2874/0x2dc0 [ 272.632726][T20658] do_syscall_64+0xc9/0x1c0 [ 272.632749][T20658] ? clear_bhb_loop+0x55/0xb0 [ 272.632769][T20658] ? clear_bhb_loop+0x55/0xb0 [ 272.632790][T20658] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 272.632879][T20658] RIP: 0033:0x7f4f511f472c [ 272.632898][T20658] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 272.632922][T20658] RSP: 002b:00007f4f4f861030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 272.632946][T20658] RAX: ffffffffffffffda RBX: 00007f4f513e5fa0 RCX: 00007f4f511f472c [ 272.632963][T20658] RDX: 000000000000000f RSI: 00007f4f4f8610a0 RDI: 0000000000000004 [ 272.632979][T20658] RBP: 00007f4f4f861090 R08: 0000000000000000 R09: 0000000000000000 [ 272.633059][T20658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 272.633074][T20658] R13: 0000000000000000 R14: 00007f4f513e5fa0 R15: 00007ffffa9f9e48 [ 272.633166][T20658] [ 272.647195][ T29] kauditd_printk_skb: 1512 callbacks suppressed [ 272.647211][ T29] audit: type=1400 audit(2000000109.780:20494): avc: denied { read write } for pid=17529 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.670348][ T29] audit: type=1400 audit(2000000109.800:20495): avc: denied { map_create } for pid=20668 comm="syz.7.5003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.670376][ T29] audit: type=1400 audit(2000000109.800:20496): avc: denied { prog_load } for pid=20668 comm="syz.7.5003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.670397][ T29] audit: type=1400 audit(2000000109.800:20497): avc: denied { watch watch_reads } for pid=20668 comm="syz.7.5003" path="/262" dev="tmpfs" ino=1374 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 272.670473][ T29] audit: type=1400 audit(2000000109.800:20498): avc: denied { read write } for pid=20668 comm="syz.7.5003" name="qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 272.757975][T20677] lo speed is unknown, defaulting to 1000 [ 272.758166][ T29] audit: type=1400 audit(2000000109.800:20499): avc: denied { map_create } for pid=20668 comm="syz.7.5003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.902515][T20686] netdevsim netdevsim7: loading /lib/firmware/. failed with error -22 [ 272.909314][ T29] audit: type=1400 audit(2000000109.810:20500): avc: denied { create } for pid=20669 comm="syz.0.5004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 272.914636][T20686] netdevsim netdevsim7: Direct firmware load for . failed with error -22 [ 272.933905][ T29] audit: type=1400 audit(2000000109.810:20501): avc: denied { prog_load } for pid=20669 comm="syz.0.5004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.989688][ T29] audit: type=1400 audit(2000000109.820:20502): avc: denied { create } for pid=20668 comm="syz.7.5003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 272.989742][ T29] audit: type=1400 audit(2000000109.820:20503): avc: denied { create } for pid=20668 comm="syz.7.5003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 272.990266][ T1053] usb 5-1: enqueue for inactive port 0 [ 273.052818][ T1053] usb 5-1: enqueue for inactive port 0 [ 273.136193][ T1053] vhci_hcd: vhci_device speed not set [ 273.375031][T20744] lo speed is unknown, defaulting to 1000 [ 274.080733][T20787] lo speed is unknown, defaulting to 1000 [ 274.144504][T20795] FAULT_INJECTION: forcing a failure. [ 274.144504][T20795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 274.157644][T20795] CPU: 0 UID: 0 PID: 20795 Comm: syz.6.5056 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 274.168447][T20795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 274.178592][T20795] Call Trace: [ 274.181924][T20795] [ 274.184887][T20795] dump_stack_lvl+0xf2/0x150 [ 274.189547][T20795] dump_stack+0x15/0x1a [ 274.193736][T20795] should_fail_ex+0x223/0x230 [ 274.198508][T20795] should_fail+0xb/0x10 [ 274.202667][T20795] should_fail_usercopy+0x1a/0x20 [ 274.207693][T20795] _copy_to_user+0x20/0xa0 [ 274.212160][T20795] simple_read_from_buffer+0xa0/0x110 [ 274.217608][T20795] proc_fail_nth_read+0xf9/0x140 [ 274.222592][T20795] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 274.228342][T20795] vfs_read+0x1a2/0x700 [ 274.232539][T20795] ? proc_ptrace_connector+0xdb/0x230 [ 274.238039][T20795] ? __rcu_read_unlock+0x4e/0x70 [ 274.242985][T20795] ? __fget_files+0x17c/0x1c0 [ 274.247669][T20795] ksys_read+0xe8/0x1b0 [ 274.251828][T20795] __x64_sys_read+0x42/0x50 [ 274.256342][T20795] x64_sys_call+0x2874/0x2dc0 [ 274.261111][T20795] do_syscall_64+0xc9/0x1c0 [ 274.265637][T20795] ? clear_bhb_loop+0x55/0xb0 [ 274.270348][T20795] ? clear_bhb_loop+0x55/0xb0 [ 274.275156][T20795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 274.281159][T20795] RIP: 0033:0x7fd8a099472c [ 274.285588][T20795] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 274.305356][T20795] RSP: 002b:00007fd89efe0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 274.313858][T20795] RAX: ffffffffffffffda RBX: 00007fd8a0b86080 RCX: 00007fd8a099472c [ 274.321835][T20795] RDX: 000000000000000f RSI: 00007fd89efe00a0 RDI: 0000000000000005 [ 274.329825][T20795] RBP: 00007fd89efe0090 R08: 0000000000000000 R09: 0000000000000000 [ 274.337805][T20795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.345784][T20795] R13: 0000000000000000 R14: 00007fd8a0b86080 R15: 00007ffca8f70208 [ 274.353782][T20795] [ 274.593152][T20816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20816 comm=syz.7.5065 [ 274.935883][T20844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20844 comm=syz.2.5076 [ 275.037714][T20852] lo speed is unknown, defaulting to 1000 [ 275.384148][T20868] lo speed is unknown, defaulting to 1000 [ 275.732270][T20915] Cannot find del_set index 4 as target [ 275.877638][T20936] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 275.885893][T20936] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 275.946477][T20942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20942 comm=syz.2.5124 [ 276.005287][T20949] FAULT_INJECTION: forcing a failure. [ 276.005287][T20949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 276.018546][T20949] CPU: 1 UID: 0 PID: 20949 Comm: syz.2.5128 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 276.029392][T20949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 276.029410][T20949] Call Trace: [ 276.029419][T20949] [ 276.045809][T20949] dump_stack_lvl+0xf2/0x150 [ 276.050510][T20949] dump_stack+0x15/0x1a [ 276.054723][T20949] should_fail_ex+0x223/0x230 [ 276.059427][T20949] should_fail+0xb/0x10 [ 276.063662][T20949] should_fail_usercopy+0x1a/0x20 [ 276.068756][T20949] _copy_from_user+0x1e/0xb0 [ 276.073374][T20949] kstrtouint_from_user+0x76/0xe0 [ 276.078474][T20949] ? 0xffffffff81000000 [ 276.082734][T20949] ? selinux_file_permission+0x22a/0x360 [ 276.088490][T20949] proc_fail_nth_write+0x4f/0x150 [ 276.093547][T20949] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 276.099211][T20949] vfs_write+0x281/0x920 [ 276.103469][T20949] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 276.109155][T20949] ? __fget_files+0x17c/0x1c0 [ 276.113870][T20949] ksys_write+0xe8/0x1b0 [ 276.118220][T20949] __x64_sys_write+0x42/0x50 [ 276.122965][T20949] x64_sys_call+0x287e/0x2dc0 [ 276.124276][T20955] netdevsim netdevsim6: loading /lib/firmware/. failed with error -22 [ 276.127643][T20949] do_syscall_64+0xc9/0x1c0 [ 276.127688][T20949] ? clear_bhb_loop+0x55/0xb0 [ 276.127710][T20949] ? clear_bhb_loop+0x55/0xb0 [ 276.127737][T20949] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 276.127772][T20949] RIP: 0033:0x7fa1432847cf [ 276.127789][T20949] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 276.127814][T20949] RSP: 002b:00007fa1418f7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 276.127837][T20949] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa1432847cf [ 276.127902][T20949] RDX: 0000000000000001 RSI: 00007fa1418f70a0 RDI: 0000000000000003 [ 276.127916][T20949] RBP: 00007fa1418f7090 R08: 0000000000000000 R09: 0000000000000000 [ 276.127930][T20949] R10: 00000000201c9fff R11: 0000000000000293 R12: 0000000000000001 [ 276.127943][T20949] R13: 0000000000000000 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 276.127962][T20949] [ 276.232097][T20955] netdevsim netdevsim6: Direct firmware load for . failed with error -22 [ 276.289199][T20967] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 276.297491][T20967] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 276.436423][T20978] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20978 comm=syz.0.5139 [ 276.497197][T20988] serio: Serial port ptm0 [ 276.523774][T20992] netdevsim netdevsim7: loading /lib/firmware/. failed with error -22 [ 276.532102][T20992] netdevsim netdevsim7: Direct firmware load for . failed with error -22 [ 276.636931][T21009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21009 comm=syz.6.5153 [ 276.649736][T21005] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(8) [ 276.656273][T21005] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 276.663727][T21005] vhci_hcd vhci_hcd.0: Device attached [ 276.677778][T21005] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 276.686067][T21005] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 276.717254][T21005] lo speed is unknown, defaulting to 1000 [ 276.843857][T21027] netdevsim netdevsim5: loading /lib/firmware/. failed with error -22 [ 276.845736][ T3358] vhci_hcd: vhci_device speed not set [ 276.852115][T21027] netdevsim netdevsim5: Direct firmware load for . failed with error -22 [ 276.919817][ T3358] usb 5-1: new full-speed USB device number 9 using vhci_hcd [ 276.966581][T21034] FAULT_INJECTION: forcing a failure. [ 276.966581][T21034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 276.975759][T21010] vhci_hcd: connection reset by peer [ 276.979666][T21034] CPU: 0 UID: 0 PID: 21034 Comm: syz.5.5162 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 276.995683][T21034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 277.005741][T21034] Call Trace: [ 277.009017][T21034] [ 277.011947][T21034] dump_stack_lvl+0xf2/0x150 [ 277.016545][T21034] dump_stack+0x15/0x1a [ 277.020830][T21034] should_fail_ex+0x223/0x230 [ 277.025550][T21034] should_fail+0xb/0x10 [ 277.029701][T21034] should_fail_usercopy+0x1a/0x20 [ 277.034723][T21034] _copy_to_user+0x20/0xa0 [ 277.039146][T21034] simple_read_from_buffer+0xa0/0x110 [ 277.044580][T21034] proc_fail_nth_read+0xf9/0x140 [ 277.049525][T21034] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 277.055083][T21034] vfs_read+0x1a2/0x700 [ 277.059305][T21034] ? __rcu_read_unlock+0x4e/0x70 [ 277.064254][T21034] ? __fget_files+0x17c/0x1c0 [ 277.068999][T21034] ksys_read+0xe8/0x1b0 [ 277.073163][T21034] __x64_sys_read+0x42/0x50 [ 277.077679][T21034] x64_sys_call+0x2874/0x2dc0 [ 277.082468][T21034] do_syscall_64+0xc9/0x1c0 [ 277.087042][T21034] ? clear_bhb_loop+0x55/0xb0 [ 277.091741][T21034] ? clear_bhb_loop+0x55/0xb0 [ 277.096411][T21034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 277.102334][T21034] RIP: 0033:0x7f04d50e472c [ 277.106741][T21034] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 277.126355][T21034] RSP: 002b:00007f04d3751030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 277.134763][T21034] RAX: ffffffffffffffda RBX: 00007f04d52d5fa0 RCX: 00007f04d50e472c [ 277.142752][T21034] RDX: 000000000000000f RSI: 00007f04d37510a0 RDI: 0000000000000003 [ 277.150714][T21034] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 277.158755][T21034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.166810][T21034] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 277.174795][T21034] [ 277.187936][ T11] vhci_hcd: stop threads [ 277.192201][ T11] vhci_hcd: release socket [ 277.196705][ T11] vhci_hcd: disconnect device [ 277.468542][T21054] FAULT_INJECTION: forcing a failure. [ 277.468542][T21054] name failslab, interval 1, probability 0, space 0, times 0 [ 277.481236][T21054] CPU: 1 UID: 0 PID: 21054 Comm: syz.6.5173 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 277.492015][T21054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 277.502087][T21054] Call Trace: [ 277.505364][T21054] [ 277.508318][T21054] dump_stack_lvl+0xf2/0x150 [ 277.513102][T21054] dump_stack+0x15/0x1a [ 277.517316][T21054] should_fail_ex+0x223/0x230 [ 277.522085][T21054] should_failslab+0x8f/0xb0 [ 277.526742][T21054] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 277.533088][T21054] ? sidtab_sid2str_get+0xb8/0x140 [ 277.538228][T21054] kmemdup_noprof+0x2a/0x60 [ 277.542814][T21054] sidtab_sid2str_get+0xb8/0x140 [ 277.547836][T21054] security_sid_to_context_core+0x1eb/0x2f0 [ 277.553808][T21054] security_sid_to_context+0x27/0x30 [ 277.559113][T21054] avc_audit_post_callback+0x9d/0x530 [ 277.564514][T21054] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 277.570615][T21054] common_lsm_audit+0x90f/0x1010 [ 277.575558][T21054] ? try_to_wake_up+0x35e/0x570 [ 277.580428][T21054] slow_avc_audit+0xf9/0x140 [ 277.585031][T21054] avc_has_perm+0x129/0x160 [ 277.589572][T21054] selinux_bpf+0xa1/0xc0 [ 277.593843][T21054] security_bpf+0x45/0x80 [ 277.598188][T21054] __sys_bpf+0x19f/0x7a0 [ 277.602445][T21054] __x64_sys_bpf+0x43/0x50 [ 277.606950][T21054] x64_sys_call+0x2914/0x2dc0 [ 277.611684][T21054] do_syscall_64+0xc9/0x1c0 [ 277.616203][T21054] ? clear_bhb_loop+0x55/0xb0 [ 277.620908][T21054] ? clear_bhb_loop+0x55/0xb0 [ 277.625649][T21054] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 277.628053][T21067] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 [ 277.631587][T21054] RIP: 0033:0x7fd8a0995d19 [ 277.644689][T21054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.664308][T21054] RSP: 002b:00007fd89f001038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 277.672825][T21054] RAX: ffffffffffffffda RBX: 00007fd8a0b85fa0 RCX: 00007fd8a0995d19 [ 277.680835][T21054] RDX: 0000000000000050 RSI: 00000000200009c0 RDI: 0000000000000000 [ 277.680862][T21054] RBP: 00007fd89f001090 R08: 0000000000000000 R09: 0000000000000000 [ 277.680875][T21054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 277.680891][T21054] R13: 0000000000000000 R14: 00007fd8a0b85fa0 R15: 00007ffca8f70208 [ 277.680937][T21054] [ 277.681140][ T29] kauditd_printk_skb: 1571 callbacks suppressed [ 277.681154][ T29] audit: type=1400 audit(2000000114.600:22013): avc: denied { map_create } for pid=21053 comm="syz.6.5173" ssid=135 tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.690154][ T29] audit: type=1326 audit(2000000114.830:22076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.6.5173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7fd8a099472c code=0x7ffc0000 [ 277.690306][ T29] audit: type=1326 audit(2000000114.830:22077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.6.5173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fd8a09947cf code=0x7ffc0000 [ 277.690338][ T29] audit: type=1326 audit(2000000114.830:22078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.6.5173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fd8a099497a code=0x7ffc0000 [ 277.690368][ T29] audit: type=1326 audit(2000000114.830:22079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.6.5173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd8a0995d19 code=0x7ffc0000 [ 277.690438][ T29] audit: type=1326 audit(2000000114.830:22080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.6.5173" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd8a0995d19 code=0x7ffc0000 [ 277.729072][ T29] audit: type=1400 audit(2000000114.850:22081): avc: denied { create } for pid=21069 comm="syz.2.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 277.878544][ T29] audit: type=1400 audit(2000000114.880:22082): avc: denied { create } for pid=21069 comm="syz.2.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 277.918552][ T29] audit: type=1400 audit(2000000115.050:22083): avc: denied { read write } for pid=17118 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 277.965120][ T29] audit: type=1400 audit(2000000115.050:22084): avc: denied { map_create } for pid=21075 comm="syz.2.5180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 278.745866][T21163] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(8) [ 278.745894][T21163] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 278.745936][T21163] vhci_hcd vhci_hcd.0: Device attached [ 278.746756][T21163] netdevsim netdevsim6: loading /lib/firmware/. failed with error -22 [ 278.774420][T21163] netdevsim netdevsim6: Direct firmware load for . failed with error -22 [ 278.821419][T21169] lo speed is unknown, defaulting to 1000 [ 278.926101][ T5043] vhci_hcd: vhci_device speed not set [ 278.985875][ T5043] usb 13-1: new full-speed USB device number 4 using vhci_hcd [ 279.056057][T21165] vhci_hcd: connection reset by peer [ 279.061527][ T7384] vhci_hcd: stop threads [ 279.065814][ T7384] vhci_hcd: release socket [ 279.065827][ T7384] vhci_hcd: disconnect device [ 279.079746][T21191] ebtables: ebtables: counters copy to user failed while replacing table [ 279.966825][T21196] FAULT_INJECTION: forcing a failure. [ 279.966825][T21196] name fail_futex, interval 1, probability 0, space 0, times 1 [ 279.966853][T21196] CPU: 1 UID: 0 PID: 21196 Comm: syz.2.5234 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 279.966881][T21196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 279.966962][T21196] Call Trace: [ 279.966968][T21196] [ 279.966976][T21196] dump_stack_lvl+0xf2/0x150 [ 279.967010][T21196] dump_stack+0x15/0x1a [ 279.967057][T21196] should_fail_ex+0x223/0x230 [ 279.967079][T21196] should_fail+0xb/0x10 [ 279.967098][T21196] get_futex_key+0x109/0x740 [ 279.967130][T21196] ? __pfx_woken_wake_function+0x10/0x10 [ 279.967180][T21196] futex_wake+0x7d/0x330 [ 279.967207][T21196] do_futex+0x2ab/0x370 [ 279.967270][T21196] ? avc_has_perm_noaudit+0x1cc/0x210 [ 279.967299][T21196] mm_release+0xb7/0x1e0 [ 279.967316][T21196] exit_mm_release+0x25/0x30 [ 279.967378][T21196] exit_mm+0x38/0x190 [ 279.967404][T21196] do_exit+0x55e/0x17f0 [ 279.967427][T21196] ? _raw_spin_unlock_bh+0x36/0x40 [ 279.967499][T21196] ? release_sock+0x117/0x150 [ 279.967533][T21196] do_group_exit+0x102/0x150 [ 279.967558][T21196] ? get_signal+0xeb1/0x1000 [ 279.967591][T21196] get_signal+0xeb9/0x1000 [ 279.967727][T21196] arch_do_signal_or_restart+0x95/0x4b0 [ 279.967778][T21196] syscall_exit_to_user_mode+0x62/0x120 [ 279.967811][T21196] do_syscall_64+0xd6/0x1c0 [ 279.967833][T21196] ? clear_bhb_loop+0x55/0xb0 [ 279.967855][T21196] ? clear_bhb_loop+0x55/0xb0 [ 279.968017][T21196] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.968055][T21196] RIP: 0033:0x7fa143285d19 [ 279.968072][T21196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.968090][T21196] RSP: 002b:00007fa1418b5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 280.144526][T21196] RAX: fffffffffffffe00 RBX: 00007fa143476160 RCX: 00007fa143285d19 [ 280.144543][T21196] RDX: 0000000000000030 RSI: 00000000200012c0 RDI: 0000000000000003 [ 280.168837][T21196] RBP: 00007fa1418b5090 R08: 0000000000000000 R09: 0000000000000000 [ 280.168856][T21196] R10: 0000000000000011 R11: 0000000000000246 R12: 0000000000000001 [ 280.168871][T21196] R13: 0000000000000000 R14: 00007fa143476160 R15: 00007ffe6a35b728 [ 280.168890][T21196] [ 280.511850][T21254] FAULT_INJECTION: forcing a failure. [ 280.511850][T21254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.525036][T21254] CPU: 0 UID: 0 PID: 21254 Comm: syz.5.5261 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 280.535812][T21254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 280.545935][T21254] Call Trace: [ 280.549206][T21254] [ 280.552128][T21254] dump_stack_lvl+0xf2/0x150 [ 280.556798][T21254] dump_stack+0x15/0x1a [ 280.561093][T21254] should_fail_ex+0x223/0x230 [ 280.565801][T21254] should_fail+0xb/0x10 [ 280.570062][T21254] should_fail_usercopy+0x1a/0x20 [ 280.575095][T21254] _copy_from_user+0x1e/0xb0 [ 280.579738][T21254] copy_msghdr_from_user+0x54/0x2a0 [ 280.584952][T21254] ? __fget_files+0x17c/0x1c0 [ 280.589802][T21254] __sys_sendmsg+0x13e/0x230 [ 280.594397][T21254] __x64_sys_sendmsg+0x46/0x50 [ 280.599216][T21254] x64_sys_call+0x2734/0x2dc0 [ 280.603966][T21254] do_syscall_64+0xc9/0x1c0 [ 280.608539][T21254] ? clear_bhb_loop+0x55/0xb0 [ 280.613224][T21254] ? clear_bhb_loop+0x55/0xb0 [ 280.617970][T21254] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.623880][T21254] RIP: 0033:0x7f04d50e5d19 [ 280.628331][T21254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.647938][T21254] RSP: 002b:00007f04d3751038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.656347][T21254] RAX: ffffffffffffffda RBX: 00007f04d52d5fa0 RCX: 00007f04d50e5d19 [ 280.664407][T21254] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 280.672373][T21254] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 280.680332][T21254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.688303][T21254] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 280.696296][T21254] [ 280.843008][T21274] lo speed is unknown, defaulting to 1000 [ 281.106873][T21286] FAULT_INJECTION: forcing a failure. [ 281.106873][T21286] name failslab, interval 1, probability 0, space 0, times 0 [ 281.119621][T21286] CPU: 1 UID: 0 PID: 21286 Comm: syz.2.5275 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 281.130397][T21286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 281.140457][T21286] Call Trace: [ 281.143739][T21286] [ 281.146667][T21286] dump_stack_lvl+0xf2/0x150 [ 281.151348][T21286] dump_stack+0x15/0x1a [ 281.155586][T21286] should_fail_ex+0x223/0x230 [ 281.160270][T21286] should_failslab+0x8f/0xb0 [ 281.164959][T21286] kmem_cache_alloc_noprof+0x52/0x320 [ 281.170362][T21286] ? audit_log_start+0x34c/0x6b0 [ 281.175313][T21286] audit_log_start+0x34c/0x6b0 [ 281.180094][T21286] audit_seccomp+0x4b/0x130 [ 281.184759][T21286] __seccomp_filter+0x6fa/0x1180 [ 281.189713][T21286] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 281.195386][T21286] ? vfs_write+0x596/0x920 [ 281.199808][T21286] __secure_computing+0x9f/0x1c0 [ 281.205642][T21286] syscall_trace_enter+0xd1/0x1f0 [ 281.211137][T21286] ? fpregs_assert_state_consistent+0x83/0xa0 [ 281.218694][T21286] do_syscall_64+0xaa/0x1c0 [ 281.223249][T21286] ? clear_bhb_loop+0x55/0xb0 [ 281.227924][T21286] ? clear_bhb_loop+0x55/0xb0 [ 281.232622][T21286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.238545][T21286] RIP: 0033:0x7fa143285d19 [ 281.243045][T21286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.262697][T21286] RSP: 002b:00007fa1418f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 281.271172][T21286] RAX: ffffffffffffffda RBX: 00007fa143475fa0 RCX: 00007fa143285d19 [ 281.279143][T21286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 281.287195][T21286] RBP: 00007fa1418f7090 R08: 0000000000000000 R09: 0000000000000000 [ 281.295168][T21286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.303210][T21286] R13: 0000000000000000 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 281.311239][T21286] [ 281.553406][T21314] FAULT_INJECTION: forcing a failure. [ 281.553406][T21314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.561096][T21308] lo speed is unknown, defaulting to 1000 [ 281.566550][T21314] CPU: 1 UID: 0 PID: 21314 Comm: syz.0.5288 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 281.583001][T21314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 281.593091][T21314] Call Trace: [ 281.596367][T21314] [ 281.599346][T21314] dump_stack_lvl+0xf2/0x150 [ 281.603946][T21314] dump_stack+0x15/0x1a [ 281.608170][T21314] should_fail_ex+0x223/0x230 [ 281.612864][T21314] should_fail+0xb/0x10 [ 281.617080][T21314] should_fail_usercopy+0x1a/0x20 [ 281.622273][T21314] _copy_from_user+0x1e/0xb0 [ 281.626881][T21314] do_ipv6_setsockopt+0x1ef/0x2250 [ 281.631993][T21314] ? _parse_integer+0x27/0x30 [ 281.636659][T21314] ? kstrtouint+0x77/0xc0 [ 281.640980][T21314] ? avc_has_perm_noaudit+0x1cc/0x210 [ 281.646457][T21314] ? selinux_netlbl_socket_setsockopt+0xe5/0x2d0 [ 281.652824][T21314] ipv6_setsockopt+0x57/0x130 [ 281.657610][T21314] tcp_setsockopt+0x93/0xb0 [ 281.662205][T21314] sock_common_setsockopt+0x64/0x80 [ 281.667408][T21314] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 281.673387][T21314] __sys_setsockopt+0x187/0x200 [ 281.678242][T21314] __x64_sys_setsockopt+0x66/0x80 [ 281.683360][T21314] x64_sys_call+0x282e/0x2dc0 [ 281.688073][T21314] do_syscall_64+0xc9/0x1c0 [ 281.692659][T21314] ? clear_bhb_loop+0x55/0xb0 [ 281.697340][T21314] ? clear_bhb_loop+0x55/0xb0 [ 281.702030][T21314] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.708002][T21314] RIP: 0033:0x7f757ed35d19 [ 281.712404][T21314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.732077][T21314] RSP: 002b:00007f757d3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 281.740593][T21314] RAX: ffffffffffffffda RBX: 00007f757ef25fa0 RCX: 00007f757ed35d19 [ 281.748660][T21314] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 281.756622][T21314] RBP: 00007f757d3a7090 R08: 00000000000003d0 R09: 0000000000000000 [ 281.764613][T21314] R10: 00000000200003c0 R11: 0000000000000246 R12: 0000000000000001 [ 281.772620][T21314] R13: 0000000000000000 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 281.780605][T21314] [ 281.798836][T21316] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 281.884002][T21322] FAULT_INJECTION: forcing a failure. [ 281.884002][T21322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.897263][T21322] CPU: 0 UID: 0 PID: 21322 Comm: syz.0.5291 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 281.908046][T21322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 281.918122][T21322] Call Trace: [ 281.921394][T21322] [ 281.924319][T21322] dump_stack_lvl+0xf2/0x150 [ 281.928979][T21322] dump_stack+0x15/0x1a [ 281.933270][T21322] should_fail_ex+0x223/0x230 [ 281.937980][T21322] should_fail+0xb/0x10 [ 281.942224][T21322] should_fail_usercopy+0x1a/0x20 [ 281.947322][T21322] _copy_from_user+0x1e/0xb0 [ 281.951955][T21322] __sys_bpf+0x14e/0x7a0 [ 281.956204][T21322] __x64_sys_bpf+0x43/0x50 [ 281.960647][T21322] x64_sys_call+0x2914/0x2dc0 [ 281.965361][T21322] do_syscall_64+0xc9/0x1c0 [ 281.969939][T21322] ? clear_bhb_loop+0x55/0xb0 [ 281.974680][T21322] ? clear_bhb_loop+0x55/0xb0 [ 281.979364][T21322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.985350][T21322] RIP: 0033:0x7f757ed35d19 [ 281.989884][T21322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.009496][T21322] RSP: 002b:00007f757d3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 282.017978][T21322] RAX: ffffffffffffffda RBX: 00007f757ef25fa0 RCX: 00007f757ed35d19 [ 282.025984][T21322] RDX: 0000000000000094 RSI: 0000000020001980 RDI: 0000000000000005 [ 282.034008][T21322] RBP: 00007f757d3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 282.042042][T21322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.050085][T21322] R13: 0000000000000000 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 282.058121][T21322] [ 282.075790][ T3358] usb 5-1: enqueue for inactive port 0 [ 282.075801][T21320] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 282.081451][ T3358] usb 5-1: enqueue for inactive port 0 [ 282.175704][ T3358] vhci_hcd: vhci_device speed not set [ 282.202837][T21335] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 282.211088][T21335] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 282.307758][T21354] FAULT_INJECTION: forcing a failure. [ 282.307758][T21354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.320844][T21354] CPU: 0 UID: 0 PID: 21354 Comm: syz.7.5305 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 282.331701][T21354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 282.338006][T21348] lo speed is unknown, defaulting to 1000 [ 282.341821][T21354] Call Trace: [ 282.341831][T21354] [ 282.353742][T21354] dump_stack_lvl+0xf2/0x150 [ 282.358368][T21354] dump_stack+0x15/0x1a [ 282.362606][T21354] should_fail_ex+0x223/0x230 [ 282.367364][T21354] should_fail+0xb/0x10 [ 282.371579][T21354] should_fail_usercopy+0x1a/0x20 [ 282.376615][T21354] _copy_to_user+0x20/0xa0 [ 282.381117][T21354] simple_read_from_buffer+0xa0/0x110 [ 282.386512][T21354] proc_fail_nth_read+0xf9/0x140 [ 282.391535][T21354] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 282.397172][T21354] vfs_read+0x1a2/0x700 [ 282.401364][T21354] ? __rcu_read_unlock+0x4e/0x70 [ 282.406387][T21354] ? __fget_files+0x17c/0x1c0 [ 282.411165][T21354] ksys_read+0xe8/0x1b0 [ 282.415435][T21354] __x64_sys_read+0x42/0x50 [ 282.419955][T21354] x64_sys_call+0x2874/0x2dc0 [ 282.424642][T21354] do_syscall_64+0xc9/0x1c0 [ 282.429177][T21354] ? clear_bhb_loop+0x55/0xb0 [ 282.433874][T21354] ? clear_bhb_loop+0x55/0xb0 [ 282.438564][T21354] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.444617][T21354] RIP: 0033:0x7f4f511f472c [ 282.449068][T21354] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 282.468687][T21354] RSP: 002b:00007f4f4f861030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 282.477184][T21354] RAX: ffffffffffffffda RBX: 00007f4f513e5fa0 RCX: 00007f4f511f472c [ 282.485167][T21354] RDX: 000000000000000f RSI: 00007f4f4f8610a0 RDI: 0000000000000003 [ 282.493233][T21354] RBP: 00007f4f4f861090 R08: 0000000000000000 R09: 0000000000000000 [ 282.501222][T21354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.509204][T21354] R13: 0000000000000000 R14: 00007f4f513e5fa0 R15: 00007ffffa9f9e48 [ 282.517228][T21354] [ 282.630802][T21362] lo speed is unknown, defaulting to 1000 [ 282.688625][ T29] kauditd_printk_skb: 1958 callbacks suppressed [ 282.688640][ T29] audit: type=1400 audit(2000000119.820:23990): avc: denied { read write } for pid=21361 comm="syz.7.5310" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.750060][ T29] audit: type=1400 audit(2000000119.860:23991): avc: denied { read write } for pid=17118 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.774634][ T29] audit: type=1400 audit(2000000119.870:23992): avc: denied { map_create } for pid=21368 comm="syz.0.5313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.794156][ T29] audit: type=1326 audit(2000000119.870:23993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21370 comm="syz.5.5314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 282.817776][ T29] audit: type=1326 audit(2000000119.870:23994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21370 comm="syz.5.5314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=461 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 282.841453][ T29] audit: type=1326 audit(2000000119.870:23995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21370 comm="syz.5.5314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 282.865391][ T29] audit: type=1326 audit(2000000119.870:23996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21370 comm="syz.5.5314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 282.888897][ T29] audit: type=1400 audit(2000000119.870:23997): avc: denied { create } for pid=21370 comm="syz.5.5314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 282.908736][ T29] audit: type=1326 audit(2000000119.870:23998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21370 comm="syz.5.5314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 282.932302][ T29] audit: type=1326 audit(2000000119.870:23999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21370 comm="syz.5.5314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f04d50e5d19 code=0x7ffc0000 [ 282.956401][T21369] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 282.964656][T21369] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 283.097536][T21389] FAULT_INJECTION: forcing a failure. [ 283.097536][T21389] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.110683][T21389] CPU: 0 UID: 0 PID: 21389 Comm: syz.5.5321 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 283.121461][T21389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 283.131521][T21389] Call Trace: [ 283.134900][T21389] [ 283.137888][T21389] dump_stack_lvl+0xf2/0x150 [ 283.142512][T21389] dump_stack+0x15/0x1a [ 283.146704][T21389] should_fail_ex+0x223/0x230 [ 283.151405][T21389] should_fail+0xb/0x10 [ 283.155569][T21389] should_fail_usercopy+0x1a/0x20 [ 283.160667][T21389] strncpy_from_user+0x25/0x210 [ 283.165632][T21389] path_getxattrat+0xb3/0x290 [ 283.170340][T21389] __x64_sys_fgetxattr+0x5b/0x70 [ 283.175354][T21389] x64_sys_call+0xbc6/0x2dc0 [ 283.179958][T21389] do_syscall_64+0xc9/0x1c0 [ 283.184471][T21389] ? clear_bhb_loop+0x55/0xb0 [ 283.189230][T21389] ? clear_bhb_loop+0x55/0xb0 [ 283.193984][T21389] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.199949][T21389] RIP: 0033:0x7f04d50e5d19 [ 283.204426][T21389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.217553][T21395] FAULT_INJECTION: forcing a failure. [ 283.217553][T21395] name failslab, interval 1, probability 0, space 0, times 0 [ 283.224061][T21389] RSP: 002b:00007f04d3751038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c1 [ 283.224083][T21389] RAX: ffffffffffffffda RBX: 00007f04d52d5fa0 RCX: 00007f04d50e5d19 [ 283.224133][T21389] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 283.224145][T21389] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 283.269125][T21389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.277101][T21389] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 283.285135][T21389] [ 283.288193][T21395] CPU: 1 UID: 0 PID: 21395 Comm: syz.0.5325 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 283.298993][T21395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 283.309053][T21395] Call Trace: [ 283.312330][T21395] [ 283.315259][T21395] dump_stack_lvl+0xf2/0x150 [ 283.319935][T21395] dump_stack+0x15/0x1a [ 283.324120][T21395] should_fail_ex+0x223/0x230 [ 283.329004][T21395] should_failslab+0x8f/0xb0 [ 283.333680][T21395] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 283.340057][T21395] ? audit_log_vformat+0x23a/0x490 [ 283.345180][T21395] ? sidtab_sid2str_get+0xb8/0x140 [ 283.350320][T21395] kmemdup_noprof+0x2a/0x60 [ 283.354838][T21395] sidtab_sid2str_get+0xb8/0x140 [ 283.359868][T21395] security_sid_to_context_core+0x1eb/0x2f0 [ 283.365777][T21395] security_sid_to_context+0x27/0x30 [ 283.371101][T21395] avc_audit_post_callback+0x10d/0x530 [ 283.376671][T21395] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 283.382739][T21395] common_lsm_audit+0x90f/0x1010 [ 283.387690][T21395] slow_avc_audit+0xf9/0x140 [ 283.392295][T21395] avc_has_perm+0x129/0x160 [ 283.396864][T21395] selinux_bpf+0xa1/0xc0 [ 283.401113][T21395] security_bpf+0x45/0x80 [ 283.405543][T21395] __sys_bpf+0x19f/0x7a0 [ 283.409797][T21395] __x64_sys_bpf+0x43/0x50 [ 283.414229][T21395] x64_sys_call+0x2914/0x2dc0 [ 283.418912][T21395] do_syscall_64+0xc9/0x1c0 [ 283.423481][T21395] ? clear_bhb_loop+0x55/0xb0 [ 283.428167][T21395] ? clear_bhb_loop+0x55/0xb0 [ 283.432849][T21395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.438794][T21395] RIP: 0033:0x7f757ed35d19 [ 283.443210][T21395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.462864][T21395] RSP: 002b:00007f757d3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 283.471341][T21395] RAX: ffffffffffffffda RBX: 00007f757ef25fa0 RCX: 00007f757ed35d19 [ 283.479370][T21395] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 283.487346][T21395] RBP: 00007f757d3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 283.495316][T21395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.503283][T21395] R13: 0000000000000001 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 283.511264][T21395] [ 283.747966][T21423] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 283.756228][T21423] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 283.791427][T21429] FAULT_INJECTION: forcing a failure. [ 283.791427][T21429] name failslab, interval 1, probability 0, space 0, times 0 [ 283.804115][T21429] CPU: 1 UID: 0 PID: 21429 Comm: syz.0.5339 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 283.815058][T21429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 283.825194][T21429] Call Trace: [ 283.828487][T21429] [ 283.831435][T21429] dump_stack_lvl+0xf2/0x150 [ 283.836196][T21429] dump_stack+0x15/0x1a [ 283.840447][T21429] should_fail_ex+0x223/0x230 [ 283.845153][T21429] should_failslab+0x8f/0xb0 [ 283.849777][T21429] kmem_cache_alloc_noprof+0x52/0x320 [ 283.855177][T21429] ? getname_flags+0x81/0x3b0 [ 283.859879][T21429] getname_flags+0x81/0x3b0 [ 283.864490][T21429] getname+0x17/0x20 [ 283.868491][T21429] __se_sys_newstat+0x44/0x320 [ 283.873280][T21429] ? fput+0x1c4/0x200 [ 283.877362][T21429] ? ksys_write+0x176/0x1b0 [ 283.881898][T21429] __x64_sys_newstat+0x31/0x40 [ 283.886683][T21429] x64_sys_call+0x6eb/0x2dc0 [ 283.891326][T21429] do_syscall_64+0xc9/0x1c0 [ 283.895925][T21429] ? clear_bhb_loop+0x55/0xb0 [ 283.900619][T21429] ? clear_bhb_loop+0x55/0xb0 [ 283.905352][T21429] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.911268][T21429] RIP: 0033:0x7f757ed35d19 [ 283.915698][T21429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.935319][T21429] RSP: 002b:00007f757d3a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 283.943754][T21429] RAX: ffffffffffffffda RBX: 00007f757ef25fa0 RCX: 00007f757ed35d19 [ 283.951770][T21429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 283.959801][T21429] RBP: 00007f757d3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 283.967795][T21429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.975767][T21429] R13: 0000000000000000 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 283.983803][T21429] [ 284.035758][ T5043] usb 13-1: enqueue for inactive port 0 [ 284.041330][ T5043] usb 13-1: enqueue for inactive port 0 [ 284.115727][ T5043] vhci_hcd: vhci_device speed not set [ 284.306471][T21451] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 284.306496][T21451] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 284.530491][T21470] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21470 comm=syz.7.5358 [ 284.965866][T21500] FAULT_INJECTION: forcing a failure. [ 284.965866][T21500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 284.979088][T21500] CPU: 0 UID: 0 PID: 21500 Comm: syz.6.5370 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 284.989901][T21500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 285.000012][T21500] Call Trace: [ 285.003284][T21500] [ 285.006281][T21500] dump_stack_lvl+0xf2/0x150 [ 285.010908][T21500] dump_stack+0x15/0x1a [ 285.015059][T21500] should_fail_ex+0x223/0x230 [ 285.019728][T21500] should_fail+0xb/0x10 [ 285.023872][T21500] should_fail_usercopy+0x1a/0x20 [ 285.029047][T21500] _copy_to_user+0x20/0xa0 [ 285.033547][T21500] simple_read_from_buffer+0xa0/0x110 [ 285.038940][T21500] proc_fail_nth_read+0xf9/0x140 [ 285.043961][T21500] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 285.049557][T21500] vfs_read+0x1a2/0x700 [ 285.053759][T21500] ? __rcu_read_unlock+0x4e/0x70 [ 285.058768][T21500] ? __fget_files+0x17c/0x1c0 [ 285.063462][T21500] ksys_read+0xe8/0x1b0 [ 285.067632][T21500] __x64_sys_read+0x42/0x50 [ 285.072232][T21500] x64_sys_call+0x2874/0x2dc0 [ 285.076918][T21500] do_syscall_64+0xc9/0x1c0 [ 285.081491][T21500] ? clear_bhb_loop+0x55/0xb0 [ 285.086171][T21500] ? clear_bhb_loop+0x55/0xb0 [ 285.090856][T21500] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.096833][T21500] RIP: 0033:0x7fd8a099472c [ 285.101299][T21500] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 285.120978][T21500] RSP: 002b:00007fd89f001030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 285.129439][T21500] RAX: ffffffffffffffda RBX: 00007fd8a0b85fa0 RCX: 00007fd8a099472c [ 285.137435][T21500] RDX: 000000000000000f RSI: 00007fd89f0010a0 RDI: 0000000000000003 [ 285.145422][T21500] RBP: 00007fd89f001090 R08: 0000000000000000 R09: 0000000000000000 [ 285.153381][T21500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.161341][T21500] R13: 0000000000000000 R14: 00007fd8a0b85fa0 R15: 00007ffca8f70208 [ 285.169314][T21500] [ 285.192431][T21502] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21502 comm=syz.6.5371 [ 285.317281][T21508] FAULT_INJECTION: forcing a failure. [ 285.317281][T21508] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.330455][T21508] CPU: 1 UID: 0 PID: 21508 Comm: syz.5.5374 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 285.341307][T21508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 285.351446][T21508] Call Trace: [ 285.354745][T21508] [ 285.357676][T21508] dump_stack_lvl+0xf2/0x150 [ 285.362281][T21508] dump_stack+0x15/0x1a [ 285.366450][T21508] should_fail_ex+0x223/0x230 [ 285.371144][T21508] should_fail+0xb/0x10 [ 285.375352][T21508] should_fail_usercopy+0x1a/0x20 [ 285.380381][T21508] _copy_from_user+0x1e/0xb0 [ 285.384994][T21508] copy_msghdr_from_user+0x54/0x2a0 [ 285.390307][T21508] __sys_sendmmsg+0x1e8/0x4b0 [ 285.395002][T21508] __x64_sys_sendmmsg+0x57/0x70 [ 285.399846][T21508] x64_sys_call+0x29aa/0x2dc0 [ 285.404599][T21508] do_syscall_64+0xc9/0x1c0 [ 285.409094][T21508] ? clear_bhb_loop+0x55/0xb0 [ 285.413764][T21508] ? clear_bhb_loop+0x55/0xb0 [ 285.418446][T21508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.424387][T21508] RIP: 0033:0x7f04d50e5d19 [ 285.428804][T21508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.448547][T21508] RSP: 002b:00007f04d3751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 285.456977][T21508] RAX: ffffffffffffffda RBX: 00007f04d52d5fa0 RCX: 00007f04d50e5d19 [ 285.463380][T21512] netdevsim netdevsim7: loading /lib/firmware/. failed with error -22 [ 285.464941][T21508] RDX: 0000000000000002 RSI: 0000000020002c80 RDI: 0000000000000003 [ 285.464960][T21508] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 285.473116][T21512] netdevsim netdevsim7: Direct firmware load for . failed with error -22 [ 285.481037][T21508] R10: 0000000000004004 R11: 0000000000000246 R12: 0000000000000001 [ 285.481057][T21508] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 285.481080][T21508] [ 285.895898][T21553] FAULT_INJECTION: forcing a failure. [ 285.895898][T21553] name failslab, interval 1, probability 0, space 0, times 0 [ 285.902360][T21562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21562 comm=syz.6.5399 [ 285.908562][T21553] CPU: 0 UID: 0 PID: 21553 Comm: syz.7.5395 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 285.908594][T21553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 285.941789][T21553] Call Trace: [ 285.945058][T21553] [ 285.947991][T21553] dump_stack_lvl+0xf2/0x150 [ 285.952614][T21553] dump_stack+0x15/0x1a [ 285.956777][T21553] should_fail_ex+0x223/0x230 [ 285.961454][T21553] should_failslab+0x8f/0xb0 [ 285.966074][T21553] kmem_cache_alloc_noprof+0x52/0x320 [ 285.971444][T21553] ? getname_flags+0x81/0x3b0 [ 285.976113][T21553] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 285.981786][T21553] getname_flags+0x81/0x3b0 [ 285.986294][T21553] user_path_at+0x26/0x120 [ 285.990710][T21553] __se_sys_utimes+0xc6/0x210 [ 285.995409][T21553] __x64_sys_utimes+0x31/0x40 [ 286.000172][T21553] x64_sys_call+0x286a/0x2dc0 [ 286.004930][T21553] do_syscall_64+0xc9/0x1c0 [ 286.009500][T21553] ? clear_bhb_loop+0x55/0xb0 [ 286.014201][T21553] ? clear_bhb_loop+0x55/0xb0 [ 286.018957][T21553] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.024865][T21553] RIP: 0033:0x7f4f511f5d19 [ 286.029341][T21553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.048955][T21553] RSP: 002b:00007f4f4f861038 EFLAGS: 00000246 ORIG_RAX: 00000000000000eb [ 286.057369][T21553] RAX: ffffffffffffffda RBX: 00007f4f513e5fa0 RCX: 00007f4f511f5d19 [ 286.065333][T21553] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 286.073323][T21553] RBP: 00007f4f4f861090 R08: 0000000000000000 R09: 0000000000000000 [ 286.081287][T21553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.089271][T21553] R13: 0000000000000000 R14: 00007f4f513e5fa0 R15: 00007ffffa9f9e48 [ 286.097277][T21553] [ 286.421217][T21599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21599 comm=syz.6.5410 [ 286.494017][T21605] FAULT_INJECTION: forcing a failure. [ 286.494017][T21605] name failslab, interval 1, probability 0, space 0, times 0 [ 286.506776][T21605] CPU: 1 UID: 0 PID: 21605 Comm: syz.6.5418 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 286.517555][T21605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 286.527636][T21605] Call Trace: [ 286.530919][T21605] [ 286.533847][T21605] dump_stack_lvl+0xf2/0x150 [ 286.538472][T21605] dump_stack+0x15/0x1a [ 286.542685][T21605] should_fail_ex+0x223/0x230 [ 286.547425][T21605] should_failslab+0x8f/0xb0 [ 286.552032][T21605] kmem_cache_alloc_noprof+0x52/0x320 [ 286.557441][T21605] ? getname_flags+0x81/0x3b0 [ 286.562138][T21605] getname_flags+0x81/0x3b0 [ 286.566645][T21605] __x64_sys_mkdirat+0x41/0x60 [ 286.571446][T21605] x64_sys_call+0x1b6f/0x2dc0 [ 286.576138][T21605] do_syscall_64+0xc9/0x1c0 [ 286.580660][T21605] ? clear_bhb_loop+0x55/0xb0 [ 286.585362][T21605] ? clear_bhb_loop+0x55/0xb0 [ 286.590080][T21605] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.595995][T21605] RIP: 0033:0x7fd8a0994587 [ 286.600416][T21605] Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.620062][T21605] RSP: 002b:00007fd89f000e68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 286.628502][T21605] RAX: ffffffffffffffda RBX: 00007fd89f000ef0 RCX: 00007fd8a0994587 [ 286.636550][T21605] RDX: 00000000000001ff RSI: 0000000020000f00 RDI: 00000000ffffff9c [ 286.644592][T21605] RBP: 0000000020000f40 R08: 0000000020000000 R09: 0000000000000000 [ 286.652570][T21605] R10: 0000000020000f40 R11: 0000000000000246 R12: 0000000020000f00 [ 286.660542][T21605] R13: 00007fd89f000eb0 R14: 0000000000000000 R15: 00000000200008c0 [ 286.668522][T21605] [ 286.813269][T21636] FAULT_INJECTION: forcing a failure. [ 286.813269][T21636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.826586][T21636] CPU: 1 UID: 0 PID: 21636 Comm: syz.5.5431 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 286.837401][T21636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 286.847471][T21636] Call Trace: [ 286.850752][T21636] [ 286.853709][T21636] dump_stack_lvl+0xf2/0x150 [ 286.858326][T21636] dump_stack+0x15/0x1a [ 286.862523][T21636] should_fail_ex+0x223/0x230 [ 286.867265][T21636] should_fail+0xb/0x10 [ 286.871476][T21636] should_fail_usercopy+0x1a/0x20 [ 286.872094][T21634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21634 comm=syz.2.5429 [ 286.876520][T21636] _copy_from_user+0x1e/0xb0 [ 286.893535][T21636] kstrtouint_from_user+0x76/0xe0 [ 286.898621][T21636] ? 0xffffffff81000000 [ 286.902856][T21636] ? selinux_file_permission+0x22a/0x360 [ 286.908531][T21636] proc_fail_nth_write+0x4f/0x150 [ 286.913679][T21636] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 286.919343][T21636] vfs_write+0x281/0x920 [ 286.923608][T21636] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 286.929209][T21636] ? __fget_files+0x17c/0x1c0 [ 286.934004][T21636] ksys_write+0xe8/0x1b0 [ 286.938279][T21636] __x64_sys_write+0x42/0x50 [ 286.940330][T21640] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 286.942879][T21636] x64_sys_call+0x287e/0x2dc0 [ 286.951041][T21640] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 286.955672][T21636] do_syscall_64+0xc9/0x1c0 [ 286.968668][T21636] ? clear_bhb_loop+0x55/0xb0 [ 286.968693][T21636] ? clear_bhb_loop+0x55/0xb0 [ 286.968715][T21636] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.968776][T21636] RIP: 0033:0x7f04d50e47cf [ 286.968792][T21636] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 286.968872][T21636] RSP: 002b:00007f04d3751030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 286.968898][T21636] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f04d50e47cf [ 286.968913][T21636] RDX: 0000000000000001 RSI: 00007f04d37510a0 RDI: 0000000000000003 [ 286.968927][T21636] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 286.968941][T21636] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 286.968955][T21636] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 286.968974][T21636] [ 287.115025][T21643] FAULT_INJECTION: forcing a failure. [ 287.115025][T21643] name failslab, interval 1, probability 0, space 0, times 0 [ 287.115050][T21643] CPU: 0 UID: 0 PID: 21643 Comm: syz.6.5433 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 287.115075][T21643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 287.115086][T21643] Call Trace: [ 287.115152][T21643] [ 287.115160][T21643] dump_stack_lvl+0xf2/0x150 [ 287.115199][T21643] dump_stack+0x15/0x1a [ 287.115232][T21643] should_fail_ex+0x223/0x230 [ 287.115257][T21643] should_failslab+0x8f/0xb0 [ 287.115287][T21643] kmem_cache_alloc_node_noprof+0x59/0x320 [ 287.115330][T21643] ? __alloc_skb+0x10b/0x310 [ 287.115352][T21643] __alloc_skb+0x10b/0x310 [ 287.115370][T21643] ? audit_log_start+0x34c/0x6b0 [ 287.115464][T21643] audit_log_start+0x368/0x6b0 [ 287.115488][T21643] ? kmem_cache_free+0xdc/0x2d0 [ 287.115511][T21643] audit_seccomp+0x4b/0x130 [ 287.115535][T21643] __seccomp_filter+0x6fa/0x1180 [ 287.115633][T21643] ? __se_sys_keyctl+0x4d9/0xbb0 [ 287.115676][T21643] __secure_computing+0x9f/0x1c0 [ 287.115750][T21643] syscall_trace_enter+0xd1/0x1f0 [ 287.115779][T21643] ? fpregs_assert_state_consistent+0x83/0xa0 [ 287.115845][T21643] do_syscall_64+0xaa/0x1c0 [ 287.115873][T21643] ? clear_bhb_loop+0x55/0xb0 [ 287.115896][T21643] ? clear_bhb_loop+0x55/0xb0 [ 287.115914][T21643] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.115961][T21643] RIP: 0033:0x7fd8a099472c [ 287.115978][T21643] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 287.116000][T21643] RSP: 002b:00007fd89f001030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 287.116023][T21643] RAX: ffffffffffffffda RBX: 00007fd8a0b85fa0 RCX: 00007fd8a099472c [ 287.116038][T21643] RDX: 000000000000000f RSI: 00007fd89f0010a0 RDI: 0000000000000003 [ 287.116103][T21643] RBP: 00007fd89f001090 R08: 0000000000000000 R09: 0000000000000000 [ 287.116116][T21643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.116127][T21643] R13: 0000000000000000 R14: 00007fd8a0b85fa0 R15: 00007ffca8f70208 [ 287.116144][T21643] [ 287.477040][T21683] netdevsim netdevsim6: loading /lib/firmware/. failed with error -22 [ 287.485298][T21683] netdevsim netdevsim6: Direct firmware load for . failed with error -22 [ 287.526371][T21687] FAULT_INJECTION: forcing a failure. [ 287.526371][T21687] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 287.539539][T21687] CPU: 0 UID: 0 PID: 21687 Comm: syz.0.5454 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 287.550331][T21687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 287.560397][T21687] Call Trace: [ 287.563682][T21687] [ 287.566748][T21687] dump_stack_lvl+0xf2/0x150 [ 287.571395][T21687] dump_stack+0x15/0x1a [ 287.575575][T21687] should_fail_ex+0x223/0x230 [ 287.580263][T21687] should_fail+0xb/0x10 [ 287.584437][T21687] should_fail_usercopy+0x1a/0x20 [ 287.589493][T21687] _copy_from_user+0x1e/0xb0 [ 287.594120][T21687] copy_msghdr_from_user+0x54/0x2a0 [ 287.599350][T21687] ? __fget_files+0x17c/0x1c0 [ 287.604231][T21687] __sys_sendmsg+0x13e/0x230 [ 287.608906][T21687] __x64_sys_sendmsg+0x46/0x50 [ 287.613729][T21687] x64_sys_call+0x2734/0x2dc0 [ 287.618466][T21687] do_syscall_64+0xc9/0x1c0 [ 287.622997][T21687] ? clear_bhb_loop+0x55/0xb0 [ 287.627696][T21687] ? clear_bhb_loop+0x55/0xb0 [ 287.632430][T21687] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.638467][T21687] RIP: 0033:0x7f757ed35d19 [ 287.643001][T21687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.662651][T21687] RSP: 002b:00007f757d3a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.671092][T21687] RAX: ffffffffffffffda RBX: 00007f757ef25fa0 RCX: 00007f757ed35d19 [ 287.679113][T21687] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 287.687146][T21687] RBP: 00007f757d3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 287.695123][T21687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.703101][T21687] R13: 0000000000000000 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 287.711216][T21687] [ 287.725052][ T29] kauditd_printk_skb: 1339 callbacks suppressed [ 287.725065][ T29] audit: type=1400 audit(2000000124.850:25334): avc: denied { prog_load } for pid=21690 comm="syz.7.5456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.764566][ T29] audit: type=1400 audit(2000000124.850:25335): avc: denied { map_create } for pid=21690 comm="syz.7.5456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.783874][ T29] audit: type=1400 audit(2000000124.850:25336): avc: denied { prog_load } for pid=21690 comm="syz.7.5456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.803128][ T29] audit: type=1400 audit(2000000124.890:25337): avc: denied { read write } for pid=17529 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 287.827573][ T29] audit: type=1400 audit(2000000124.890:25338): avc: denied { map_create } for pid=21695 comm="syz.2.5459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.846859][ T29] audit: type=1400 audit(2000000124.890:25339): avc: denied { prog_load } for pid=21699 comm="syz.0.5460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.866206][ T29] audit: type=1400 audit(2000000124.890:25340): avc: denied { prog_load } for pid=21695 comm="syz.2.5459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.885421][ T29] audit: type=1400 audit(2000000124.890:25341): avc: denied { map_create } for pid=21695 comm="syz.2.5459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.904741][ T29] audit: type=1400 audit(2000000124.890:25342): avc: denied { create } for pid=21695 comm="syz.2.5459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 287.924467][ T29] audit: type=1400 audit(2000000124.890:25343): avc: denied { create } for pid=21695 comm="syz.2.5459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 287.976037][T21710] FAULT_INJECTION: forcing a failure. [ 287.976037][T21710] name failslab, interval 1, probability 0, space 0, times 0 [ 287.988706][T21710] CPU: 0 UID: 0 PID: 21710 Comm: syz.6.5464 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 287.999489][T21710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 288.009585][T21710] Call Trace: [ 288.012987][T21710] [ 288.012994][T21710] dump_stack_lvl+0xf2/0x150 [ 288.013029][T21710] dump_stack+0x15/0x1a [ 288.013062][T21710] should_fail_ex+0x223/0x230 [ 288.013084][T21710] should_failslab+0x8f/0xb0 [ 288.013142][T21710] kmem_cache_alloc_noprof+0x52/0x320 [ 288.013167][T21710] ? audit_log_start+0x34c/0x6b0 [ 288.013195][T21710] audit_log_start+0x34c/0x6b0 [ 288.013232][T21710] ? kmem_cache_free+0xdc/0x2d0 [ 288.013259][T21710] audit_seccomp+0x4b/0x130 [ 288.013281][T21710] ? cgroup_rstat_updated+0x9f/0x570 [ 288.013386][T21710] __seccomp_filter+0x6fa/0x1180 [ 288.013420][T21710] ? update_load_avg+0x1f7/0x7c0 [ 288.013457][T21710] ? __dequeue_entity+0x22/0x310 [ 288.013486][T21710] ? __list_add_valid_or_report+0x36/0xc0 [ 288.013574][T21710] ? tracing_record_taskinfo_sched_switch+0x6f/0x270 [ 288.013631][T21710] __secure_computing+0x9f/0x1c0 [ 288.013664][T21710] syscall_trace_enter+0xd1/0x1f0 [ 288.013779][T21710] do_syscall_64+0xaa/0x1c0 [ 288.013801][T21710] ? clear_bhb_loop+0x55/0xb0 [ 288.013823][T21710] ? clear_bhb_loop+0x55/0xb0 [ 288.013844][T21710] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.013893][T21710] RIP: 0033:0x7fd8a099472c [ 288.013908][T21710] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 288.013929][T21710] RSP: 002b:00007fd89f001030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 288.013951][T21710] RAX: ffffffffffffffda RBX: 00007fd8a0b85fa0 RCX: 00007fd8a099472c [ 288.013965][T21710] RDX: 000000000000000f RSI: 00007fd89f0010a0 RDI: 0000000000000003 [ 288.013979][T21710] RBP: 00007fd89f001090 R08: 0000000000000000 R09: 0000000000000000 [ 288.013993][T21710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.014007][T21710] R13: 0000000000000000 R14: 00007fd8a0b85fa0 R15: 00007ffca8f70208 [ 288.014092][T21710] [ 288.037035][T21708] lo speed is unknown, defaulting to 1000 [ 288.071643][T21718] 8021q: VLANs not supported on ipvlan1 [ 288.107302][T21722] FAULT_INJECTION: forcing a failure. [ 288.107302][T21722] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 288.226965][T21722] CPU: 1 UID: 0 PID: 21722 Comm: syz.2.5469 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 288.226995][T21722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 288.227009][T21722] Call Trace: [ 288.227017][T21722] [ 288.227084][T21722] dump_stack_lvl+0xf2/0x150 [ 288.227116][T21722] dump_stack+0x15/0x1a [ 288.227144][T21722] should_fail_ex+0x223/0x230 [ 288.227172][T21722] should_fail+0xb/0x10 [ 288.227228][T21722] should_fail_usercopy+0x1a/0x20 [ 288.227276][T21722] _copy_to_user+0x20/0xa0 [ 288.227314][T21722] simple_read_from_buffer+0xa0/0x110 [ 288.227346][T21722] proc_fail_nth_read+0xf9/0x140 [ 288.227376][T21722] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 288.227433][T21722] vfs_read+0x1a2/0x700 [ 288.227463][T21722] ? __rcu_read_unlock+0x4e/0x70 [ 288.227494][T21722] ? __fget_files+0x17c/0x1c0 [ 288.227593][T21722] ksys_read+0xe8/0x1b0 [ 288.227628][T21722] __x64_sys_read+0x42/0x50 [ 288.227655][T21722] x64_sys_call+0x2874/0x2dc0 [ 288.227679][T21722] do_syscall_64+0xc9/0x1c0 [ 288.227926][T21722] ? clear_bhb_loop+0x55/0xb0 [ 288.227952][T21722] ? clear_bhb_loop+0x55/0xb0 [ 288.227976][T21722] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.228013][T21722] RIP: 0033:0x7fa14328472c [ 288.228028][T21722] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 288.228063][T21722] RSP: 002b:00007fa1418f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 288.228084][T21722] RAX: ffffffffffffffda RBX: 00007fa143475fa0 RCX: 00007fa14328472c [ 288.228099][T21722] RDX: 000000000000000f RSI: 00007fa1418f70a0 RDI: 0000000000000003 [ 288.228114][T21722] RBP: 00007fa1418f7090 R08: 0000000000000000 R09: 0000000000000000 [ 288.228130][T21722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 288.228145][T21722] R13: 0000000000000001 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 288.228163][T21722] [ 288.311863][T21738] FAULT_INJECTION: forcing a failure. [ 288.311863][T21738] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 288.311891][T21738] CPU: 1 UID: 0 PID: 21738 Comm: syz.2.5476 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 288.311915][T21738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 288.311926][T21738] Call Trace: [ 288.311933][T21738] [ 288.311941][T21738] dump_stack_lvl+0xf2/0x150 [ 288.312068][T21738] dump_stack+0x15/0x1a [ 288.312094][T21738] should_fail_ex+0x223/0x230 [ 288.312190][T21738] should_fail+0xb/0x10 [ 288.312210][T21738] should_fail_usercopy+0x1a/0x20 [ 288.312264][T21738] _copy_from_iter+0xd5/0xd00 [ 288.312290][T21738] ? alloc_pages_mpol_noprof+0xd5/0x1e0 [ 288.523405][T21738] copy_page_from_iter+0x14f/0x280 [ 288.528551][T21738] tun_get_user+0x686/0x25b0 [ 288.533179][T21738] ? ref_tracker_alloc+0x1f5/0x2f0 [ 288.538413][T21738] tun_chr_write_iter+0x188/0x240 [ 288.543479][T21738] vfs_write+0x77f/0x920 [ 288.547730][T21738] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 288.553365][T21738] ksys_write+0xe8/0x1b0 [ 288.557715][T21738] __x64_sys_write+0x42/0x50 [ 288.562360][T21738] x64_sys_call+0x287e/0x2dc0 [ 288.567051][T21738] do_syscall_64+0xc9/0x1c0 [ 288.571608][T21738] ? clear_bhb_loop+0x55/0xb0 [ 288.576341][T21738] ? clear_bhb_loop+0x55/0xb0 [ 288.581125][T21738] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.587057][T21738] RIP: 0033:0x7fa1432847cf [ 288.591471][T21738] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 288.611081][T21738] RSP: 002b:00007fa1418f7000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 288.619547][T21738] RAX: ffffffffffffffda RBX: 00007fa143475fa0 RCX: 00007fa1432847cf [ 288.627543][T21738] RDX: 000000000000003e RSI: 0000000020000500 RDI: 00000000000000c8 [ 288.635532][T21738] RBP: 00007fa1418f7090 R08: 0000000000000000 R09: 0000000000000000 [ 288.643564][T21738] R10: 000000000000003e R11: 0000000000000293 R12: 0000000000000001 [ 288.651539][T21738] R13: 0000000000000000 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 288.659534][T21738] [ 288.803268][T21771] FAULT_INJECTION: forcing a failure. [ 288.803268][T21771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 288.816379][T21771] CPU: 0 UID: 0 PID: 21771 Comm: syz.2.5489 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 288.827159][T21771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 288.837226][T21771] Call Trace: [ 288.840510][T21771] [ 288.843448][T21771] dump_stack_lvl+0xf2/0x150 [ 288.848136][T21771] dump_stack+0x15/0x1a [ 288.852317][T21771] should_fail_ex+0x223/0x230 [ 288.857029][T21771] should_fail+0xb/0x10 [ 288.861206][T21771] should_fail_usercopy+0x1a/0x20 [ 288.866258][T21771] _copy_from_user+0x1e/0xb0 [ 288.870961][T21771] copy_msghdr_from_user+0x54/0x2a0 [ 288.876204][T21771] ? __fget_files+0x17c/0x1c0 [ 288.880924][T21771] __sys_sendmsg+0x13e/0x230 [ 288.885649][T21771] __x64_sys_sendmsg+0x46/0x50 [ 288.890512][T21771] x64_sys_call+0x2734/0x2dc0 [ 288.895204][T21771] do_syscall_64+0xc9/0x1c0 [ 288.895231][T21771] ? clear_bhb_loop+0x55/0xb0 [ 288.895251][T21771] ? clear_bhb_loop+0x55/0xb0 [ 288.909131][T21771] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.915135][T21771] RIP: 0033:0x7fa143285d19 [ 288.919600][T21771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.939282][T21771] RSP: 002b:00007fa1418f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 288.947818][T21771] RAX: ffffffffffffffda RBX: 00007fa143475fa0 RCX: 00007fa143285d19 [ 288.955863][T21771] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 288.963979][T21771] RBP: 00007fa1418f7090 R08: 0000000000000000 R09: 0000000000000000 [ 288.971951][T21771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.980073][T21771] R13: 0000000000000000 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 288.988068][T21771] [ 289.011513][T21787] FAULT_INJECTION: forcing a failure. [ 289.011513][T21787] name failslab, interval 1, probability 0, space 0, times 0 [ 289.024268][T21787] CPU: 0 UID: 0 PID: 21787 Comm: syz.2.5496 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 289.035055][T21787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 289.045124][T21787] Call Trace: [ 289.047213][T21791] lo speed is unknown, defaulting to 1000 [ 289.048414][T21787] [ 289.048455][T21787] dump_stack_lvl+0xf2/0x150 [ 289.061701][T21787] dump_stack+0x15/0x1a [ 289.065975][T21787] should_fail_ex+0x223/0x230 [ 289.070824][T21787] should_failslab+0x8f/0xb0 [ 289.075557][T21787] kmem_cache_alloc_noprof+0x52/0x320 [ 289.080938][T21787] ? security_file_alloc+0x32/0x100 [ 289.086158][T21787] security_file_alloc+0x32/0x100 [ 289.091203][T21787] init_file+0x5b/0x1b0 [ 289.095448][T21787] alloc_empty_file+0xea/0x200 [ 289.100230][T21787] alloc_file_pseudo+0xc3/0x140 [ 289.105113][T21787] __shmem_file_setup+0x1bb/0x1f0 [ 289.110148][T21787] shmem_file_setup+0x3b/0x50 [ 289.114854][T21787] __se_sys_memfd_create+0x31d/0x5c0 [ 289.120157][T21787] __x64_sys_memfd_create+0x31/0x40 [ 289.125410][T21787] x64_sys_call+0x2d4c/0x2dc0 [ 289.130191][T21787] do_syscall_64+0xc9/0x1c0 [ 289.134764][T21787] ? clear_bhb_loop+0x55/0xb0 [ 289.139510][T21787] ? clear_bhb_loop+0x55/0xb0 [ 289.144279][T21787] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 289.150339][T21787] RIP: 0033:0x7fa143285d19 [ 289.154764][T21787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.174402][T21787] RSP: 002b:00007fa1418f6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 289.182833][T21787] RAX: ffffffffffffffda RBX: 00000000000004fa RCX: 00007fa143285d19 [ 289.190860][T21787] RDX: 00007fa1418f6ef0 RSI: 0000000000000000 RDI: 00007fa143302381 [ 289.198844][T21787] RBP: 0000000020001640 R08: 00007fa1418f6bb7 R09: 00007fa1418f6e40 [ 289.206831][T21787] R10: 000000000000000a R11: 0000000000000202 R12: 00000000200002c0 [ 289.214902][T21787] R13: 00007fa1418f6ef0 R14: 00007fa1418f6eb0 R15: 0000000020000240 [ 289.222902][T21787] [ 289.404482][T21823] FAULT_INJECTION: forcing a failure. [ 289.404482][T21823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.417612][T21823] CPU: 1 UID: 0 PID: 21823 Comm: +}[@ Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 289.427867][T21823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 289.437971][T21823] Call Trace: [ 289.441302][T21823] [ 289.444220][T21823] dump_stack_lvl+0xf2/0x150 [ 289.448925][T21823] dump_stack+0x15/0x1a [ 289.453181][T21823] should_fail_ex+0x223/0x230 [ 289.457869][T21823] should_fail+0xb/0x10 [ 289.462096][T21823] should_fail_usercopy+0x1a/0x20 [ 289.467147][T21823] _copy_from_user+0x1e/0xb0 [ 289.471800][T21823] kstrtouint_from_user+0x76/0xe0 [ 289.476924][T21823] ? 0xffffffff81000000 [ 289.481084][T21823] ? selinux_file_permission+0x22a/0x360 [ 289.486714][T21823] proc_fail_nth_write+0x4f/0x150 [ 289.491734][T21823] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 289.497431][T21823] vfs_write+0x281/0x920 [ 289.501710][T21823] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 289.507275][T21823] ? __fget_files+0x17c/0x1c0 [ 289.512008][T21823] ksys_write+0xe8/0x1b0 [ 289.516335][T21823] __x64_sys_write+0x42/0x50 [ 289.520955][T21823] x64_sys_call+0x287e/0x2dc0 [ 289.525644][T21823] do_syscall_64+0xc9/0x1c0 [ 289.530163][T21823] ? clear_bhb_loop+0x55/0xb0 [ 289.534915][T21823] ? clear_bhb_loop+0x55/0xb0 [ 289.539619][T21823] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 289.545536][T21823] RIP: 0033:0x7fa1432847cf [ 289.549976][T21823] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 289.569693][T21823] RSP: 002b:00007fa1418f7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 289.578116][T21823] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa1432847cf [ 289.586110][T21823] RDX: 0000000000000001 RSI: 00007fa1418f70a0 RDI: 0000000000000004 [ 289.594119][T21823] RBP: 00007fa1418f7090 R08: 0000000000000000 R09: 0000000000000000 [ 289.602136][T21823] R10: 0000000004016012 R11: 0000000000000293 R12: 0000000000000001 [ 289.610139][T21823] R13: 0000000000000000 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 289.618164][T21823] [ 289.924382][T21872] FAULT_INJECTION: forcing a failure. [ 289.924382][T21872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.937509][T21872] CPU: 0 UID: 0 PID: 21872 Comm: syz.0.5533 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 289.948315][T21872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 289.958379][T21872] Call Trace: [ 289.961728][T21872] [ 289.964654][T21872] dump_stack_lvl+0xf2/0x150 [ 289.969273][T21872] dump_stack+0x15/0x1a [ 289.973536][T21872] should_fail_ex+0x223/0x230 [ 289.978237][T21872] should_fail+0xb/0x10 [ 289.982458][T21872] should_fail_usercopy+0x1a/0x20 [ 289.987616][T21872] _copy_to_user+0x20/0xa0 [ 289.992051][T21872] simple_read_from_buffer+0xa0/0x110 [ 289.997418][T21872] proc_fail_nth_read+0xf9/0x140 [ 290.002406][T21872] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 290.008045][T21872] vfs_read+0x1a2/0x700 [ 290.012218][T21872] ? __rcu_read_unlock+0x4e/0x70 [ 290.017218][T21872] ? __fget_files+0x17c/0x1c0 [ 290.021942][T21872] ksys_read+0xe8/0x1b0 [ 290.026106][T21872] __x64_sys_read+0x42/0x50 [ 290.030663][T21872] x64_sys_call+0x2874/0x2dc0 [ 290.035358][T21872] do_syscall_64+0xc9/0x1c0 [ 290.039872][T21872] ? clear_bhb_loop+0x55/0xb0 [ 290.044551][T21872] ? clear_bhb_loop+0x55/0xb0 [ 290.049272][T21872] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.055233][T21872] RIP: 0033:0x7f757ed3472c [ 290.059657][T21872] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 290.079276][T21872] RSP: 002b:00007f757d3a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 290.087765][T21872] RAX: ffffffffffffffda RBX: 00007f757ef25fa0 RCX: 00007f757ed3472c [ 290.095741][T21872] RDX: 000000000000000f RSI: 00007f757d3a70a0 RDI: 0000000000000003 [ 290.103718][T21872] RBP: 00007f757d3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 290.111709][T21872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.119752][T21872] R13: 0000000000000000 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 290.127793][T21872] [ 290.272002][T21908] FAULT_INJECTION: forcing a failure. [ 290.272002][T21908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.285293][T21908] CPU: 0 UID: 0 PID: 21908 Comm: syz.5.5550 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 290.296074][T21908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 290.306154][T21908] Call Trace: [ 290.309447][T21908] [ 290.312418][T21908] dump_stack_lvl+0xf2/0x150 [ 290.317075][T21908] dump_stack+0x15/0x1a [ 290.321320][T21908] should_fail_ex+0x223/0x230 [ 290.326013][T21908] should_fail+0xb/0x10 [ 290.330169][T21908] should_fail_usercopy+0x1a/0x20 [ 290.335234][T21908] _copy_from_user+0x1e/0xb0 [ 290.339887][T21908] memdup_user+0x64/0xc0 [ 290.344160][T21908] strndup_user+0x68/0xa0 [ 290.348511][T21908] __se_sys_mount+0x4e/0x2d0 [ 290.349606][T21909] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 290.353162][T21908] ? fput+0x1c4/0x200 [ 290.361446][T21909] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 290.365287][T21908] ? ksys_write+0x176/0x1b0 [ 290.378255][T21908] __x64_sys_mount+0x67/0x80 [ 290.382876][T21908] x64_sys_call+0x2c84/0x2dc0 [ 290.387576][T21908] do_syscall_64+0xc9/0x1c0 [ 290.392119][T21908] ? clear_bhb_loop+0x55/0xb0 [ 290.396861][T21908] ? clear_bhb_loop+0x55/0xb0 [ 290.401547][T21923] FAULT_INJECTION: forcing a failure. [ 290.401547][T21923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.401567][T21908] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.420519][T21908] RIP: 0033:0x7f04d50e5d19 [ 290.424932][T21908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.444599][T21908] RSP: 002b:00007f04d3751038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.453047][T21908] RAX: ffffffffffffffda RBX: 00007f04d52d5fa0 RCX: 00007f04d50e5d19 [ 290.461054][T21908] RDX: 0000000020002000 RSI: 0000000020001fc0 RDI: 0000000000000000 [ 290.469023][T21908] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 290.476994][T21908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.484957][T21908] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 290.492929][T21908] [ 290.495947][T21923] CPU: 1 UID: 0 PID: 21923 Comm: syz.0.5555 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 290.506720][T21923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 290.516851][T21923] Call Trace: [ 290.520129][T21923] [ 290.523126][T21923] dump_stack_lvl+0xf2/0x150 [ 290.527774][T21923] dump_stack+0x15/0x1a [ 290.532008][T21923] should_fail_ex+0x223/0x230 [ 290.532034][T21923] should_fail+0xb/0x10 [ 290.532058][T21923] should_fail_usercopy+0x1a/0x20 [ 290.532153][T21923] _copy_from_user+0x1e/0xb0 [ 290.532182][T21923] kstrtouint_from_user+0x76/0xe0 [ 290.532207][T21923] ? 0xffffffff81000000 [ 290.532221][T21923] ? selinux_file_permission+0x22a/0x360 [ 290.532291][T21923] proc_fail_nth_write+0x4f/0x150 [ 290.532355][T21923] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 290.532387][T21923] vfs_write+0x281/0x920 [ 290.532411][T21923] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 290.532460][T21923] ? __fget_files+0x17c/0x1c0 [ 290.532525][T21923] ksys_write+0xe8/0x1b0 [ 290.532553][T21923] __x64_sys_write+0x42/0x50 [ 290.532614][T21923] x64_sys_call+0x287e/0x2dc0 [ 290.532642][T21923] do_syscall_64+0xc9/0x1c0 [ 290.532660][T21923] ? clear_bhb_loop+0x55/0xb0 [ 290.532745][T21923] ? clear_bhb_loop+0x55/0xb0 [ 290.532765][T21923] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.532800][T21923] RIP: 0033:0x7f757ed347cf [ 290.532816][T21923] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 290.532889][T21923] RSP: 002b:00007f757d3a7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 290.532949][T21923] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f757ed347cf [ 290.532961][T21923] RDX: 0000000000000001 RSI: 00007f757d3a70a0 RDI: 0000000000000004 [ 290.532972][T21923] RBP: 00007f757d3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 290.532985][T21923] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 290.532999][T21923] R13: 0000000000000000 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 290.533019][T21923] [ 290.797984][T21953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21953 comm=syz.6.5568 [ 290.829450][T21957] FAULT_INJECTION: forcing a failure. [ 290.829450][T21957] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.842542][T21957] CPU: 1 UID: 0 PID: 21957 Comm: syz.6.5570 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 290.853303][T21957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 290.863389][T21957] Call Trace: [ 290.866656][T21957] [ 290.869611][T21957] dump_stack_lvl+0xf2/0x150 [ 290.874242][T21957] dump_stack+0x15/0x1a [ 290.878511][T21957] should_fail_ex+0x223/0x230 [ 290.883198][T21957] should_fail+0xb/0x10 [ 290.887415][T21957] should_fail_usercopy+0x1a/0x20 [ 290.892447][T21957] _copy_from_user+0x1e/0xb0 [ 290.897039][T21957] get_nodes+0x28e/0x330 [ 290.901286][T21957] __se_sys_migrate_pages+0x76/0x370 [ 290.906636][T21957] __x64_sys_migrate_pages+0x55/0x70 [ 290.911995][T21957] x64_sys_call+0x1a8/0x2dc0 [ 290.916661][T21957] do_syscall_64+0xc9/0x1c0 [ 290.921176][T21957] ? clear_bhb_loop+0x55/0xb0 [ 290.925854][T21957] ? clear_bhb_loop+0x55/0xb0 [ 290.930521][T21957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.936440][T21957] RIP: 0033:0x7fd8a0995d19 [ 290.940865][T21957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.960510][T21957] RSP: 002b:00007fd89f001038 EFLAGS: 00000246 ORIG_RAX: 0000000000000100 [ 290.968991][T21957] RAX: ffffffffffffffda RBX: 00007fd8a0b85fa0 RCX: 00007fd8a0995d19 [ 290.977007][T21957] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 290.985047][T21957] RBP: 00007fd89f001090 R08: 0000000000000000 R09: 0000000000000000 [ 290.993017][T21957] R10: 00000000200002c0 R11: 0000000000000246 R12: 0000000000000001 [ 291.000994][T21957] R13: 0000000000000000 R14: 00007fd8a0b85fa0 R15: 00007ffca8f70208 [ 291.008982][T21957] [ 291.149852][T21981] lo speed is unknown, defaulting to 1000 [ 291.168905][T21985] FAULT_INJECTION: forcing a failure. [ 291.168905][T21985] name failslab, interval 1, probability 0, space 0, times 0 [ 291.181635][T21985] CPU: 0 UID: 0 PID: 21985 Comm: syz.6.5584 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 291.192474][T21985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 291.202534][T21985] Call Trace: [ 291.205895][T21985] [ 291.209002][T21985] dump_stack_lvl+0xf2/0x150 [ 291.213633][T21985] dump_stack+0x15/0x1a [ 291.217939][T21985] should_fail_ex+0x223/0x230 [ 291.222638][T21985] should_failslab+0x8f/0xb0 [ 291.227256][T21985] kmem_cache_alloc_noprof+0x52/0x320 [ 291.232645][T21985] ? copy_signal+0x54/0x350 [ 291.237172][T21985] ? copy_sighand+0x52/0x1b0 [ 291.241798][T21985] copy_signal+0x54/0x350 [ 291.246138][T21985] copy_process+0xd34/0x1f90 [ 291.250809][T21985] kernel_clone+0x167/0x5e0 [ 291.255326][T21985] ? vfs_write+0x596/0x920 [ 291.259772][T21985] ? 0xffffffff81000000 [ 291.264043][T21985] __x64_sys_clone+0xe8/0x120 [ 291.268743][T21985] ? 0xffffffff81000000 [ 291.272910][T21985] ? 0xffffffff81000000 [ 291.277076][T21985] x64_sys_call+0x2d7e/0x2dc0 [ 291.281761][T21985] do_syscall_64+0xc9/0x1c0 [ 291.286264][T21985] ? clear_bhb_loop+0x55/0xb0 [ 291.290974][T21985] ? clear_bhb_loop+0x55/0xb0 [ 291.295779][T21985] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.301687][T21985] RIP: 0033:0x7fd8a0995d19 [ 291.306145][T21985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.325829][T21985] RSP: 002b:00007fd89f000fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 291.334265][T21985] RAX: ffffffffffffffda RBX: 00007fd8a0b85fa0 RCX: 00007fd8a0995d19 [ 291.342265][T21985] RDX: ffffffff81000000 RSI: 0000000000000000 RDI: 00000000c510c080 [ 291.350320][T21985] RBP: 00007fd89f001090 R08: 0000000000000000 R09: 0000000000000000 [ 291.358319][T21985] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000002 [ 291.366333][T21985] R13: 0000000000000000 R14: 00007fd8a0b85fa0 R15: 00007ffca8f70208 [ 291.374306][T21985] ? 0xffffffff81000000 [ 291.378503][T21985] [ 291.594168][T22005] lo speed is unknown, defaulting to 1000 [ 291.692743][T22028] SELinux: syz.2.5601 (22028) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 291.731683][T22038] FAULT_INJECTION: forcing a failure. [ 291.731683][T22038] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 291.744850][T22038] CPU: 1 UID: 0 PID: 22038 Comm: syz.5.5604 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 291.755730][T22038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 291.765797][T22038] Call Trace: [ 291.769095][T22038] [ 291.772040][T22038] dump_stack_lvl+0xf2/0x150 [ 291.776665][T22038] dump_stack+0x15/0x1a [ 291.780860][T22038] should_fail_ex+0x223/0x230 [ 291.785592][T22038] should_fail+0xb/0x10 [ 291.789558][T22043] lo speed is unknown, defaulting to 1000 [ 291.789745][T22038] should_fail_usercopy+0x1a/0x20 [ 291.789808][T22038] _copy_from_user+0x1e/0xb0 [ 291.805111][T22038] simple_transaction_get+0xed/0x120 [ 291.810435][T22038] selinux_transaction_write+0x86/0x100 [ 291.816095][T22038] ? __pfx_selinux_transaction_write+0x10/0x10 [ 291.822289][T22038] vfs_write+0x281/0x920 [ 291.826558][T22038] ? __fget_files+0x17c/0x1c0 [ 291.831327][T22038] ksys_write+0xe8/0x1b0 [ 291.835598][T22038] __x64_sys_write+0x42/0x50 [ 291.840218][T22038] x64_sys_call+0x287e/0x2dc0 [ 291.844989][T22038] do_syscall_64+0xc9/0x1c0 [ 291.849514][T22038] ? clear_bhb_loop+0x55/0xb0 [ 291.854288][T22038] ? clear_bhb_loop+0x55/0xb0 [ 291.858989][T22038] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.864979][T22038] RIP: 0033:0x7f04d50e5d19 [ 291.869411][T22038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.889114][T22038] RSP: 002b:00007f04d3751038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 291.897611][T22038] RAX: ffffffffffffffda RBX: 00007f04d52d5fa0 RCX: 00007f04d50e5d19 [ 291.905588][T22038] RDX: 0000000000000027 RSI: 0000000020000040 RDI: 0000000000000003 [ 291.913624][T22038] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 291.921599][T22038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.929577][T22038] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 291.937662][T22038] [ 292.195832][T22071] FAULT_INJECTION: forcing a failure. [ 292.195832][T22071] name failslab, interval 1, probability 0, space 0, times 0 [ 292.208536][T22071] CPU: 0 UID: 0 PID: 22071 Comm: syz.7.5617 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 292.219361][T22071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 292.229478][T22071] Call Trace: [ 292.232769][T22071] [ 292.235704][T22071] dump_stack_lvl+0xf2/0x150 [ 292.240393][T22071] dump_stack+0x15/0x1a [ 292.244593][T22071] should_fail_ex+0x223/0x230 [ 292.249350][T22071] should_failslab+0x8f/0xb0 [ 292.254034][T22071] __kmalloc_node_noprof+0xad/0x410 [ 292.259301][T22071] ? __kvmalloc_node_noprof+0x72/0x170 [ 292.264926][T22071] __kvmalloc_node_noprof+0x72/0x170 [ 292.270253][T22071] cgroup_pidlist_start+0x1c2/0x7f0 [ 292.275550][T22071] cgroup_seqfile_start+0x55/0x70 [ 292.280617][T22071] kernfs_seq_start+0x79/0x130 [ 292.285409][T22071] seq_read_iter+0x277/0x930 [ 292.290064][T22071] kernfs_fop_read_iter+0xc0/0x310 [ 292.295198][T22071] ? __kmalloc_noprof+0x1e3/0x3f0 [ 292.300241][T22071] copy_splice_read+0x3a0/0x5d0 [ 292.305174][T22071] ? __pfx_copy_splice_read+0x10/0x10 [ 292.310557][T22071] splice_direct_to_actor+0x269/0x670 [ 292.315941][T22071] ? __pfx_direct_splice_actor+0x10/0x10 [ 292.321695][T22071] do_splice_direct+0xd7/0x150 [ 292.326482][T22071] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 292.326724][T22084] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 292.332389][T22071] do_sendfile+0x398/0x660 [ 292.338873][T22084] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 292.343269][T22071] __x64_sys_sendfile64+0x110/0x150 [ 292.350709][T22084] vhci_hcd vhci_hcd.0: Device attached [ 292.355779][T22071] x64_sys_call+0xfbd/0x2dc0 [ 292.355805][T22071] do_syscall_64+0xc9/0x1c0 [ 292.355828][T22071] ? clear_bhb_loop+0x55/0xb0 [ 292.355848][T22071] ? clear_bhb_loop+0x55/0xb0 [ 292.379876][T22071] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.385944][T22071] RIP: 0033:0x7f4f511f5d19 [ 292.390366][T22071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.409995][T22071] RSP: 002b:00007f4f4f861038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 292.418469][T22071] RAX: ffffffffffffffda RBX: 00007f4f513e5fa0 RCX: 00007f4f511f5d19 [ 292.426450][T22071] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 292.434046][T22085] usbip_core: unknown command [ 292.434411][T22071] RBP: 00007f4f4f861090 R08: 0000000000000000 R09: 0000000000000000 [ 292.439156][T22085] vhci_hcd: unknown pdu 4227858432 [ 292.447025][T22071] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000001 [ 292.447041][T22071] R13: 0000000000000000 R14: 00007f4f513e5fa0 R15: 00007ffffa9f9e48 [ 292.452144][T22085] usbip_core: unknown command [ 292.461354][ T314] vhci_hcd: stop threads [ 292.468063][T22071] [ 292.472767][ T314] vhci_hcd: release socket [ 292.472813][ T314] vhci_hcd: disconnect device [ 292.513631][T22092] lo speed is unknown, defaulting to 1000 [ 292.645836][T22103] FAULT_INJECTION: forcing a failure. [ 292.645836][T22103] name failslab, interval 1, probability 0, space 0, times 0 [ 292.658543][T22103] CPU: 0 UID: 0 PID: 22103 Comm: syz.2.5628 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 292.669323][T22103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 292.679442][T22103] Call Trace: [ 292.682812][T22103] [ 292.685858][T22103] dump_stack_lvl+0xf2/0x150 [ 292.690483][T22103] dump_stack+0x15/0x1a [ 292.694637][T22103] should_fail_ex+0x223/0x230 [ 292.699312][T22103] should_failslab+0x8f/0xb0 [ 292.703941][T22103] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 292.710287][T22103] ? audit_log_vformat+0x23a/0x490 [ 292.715435][T22103] ? sidtab_sid2str_get+0xb8/0x140 [ 292.720616][T22103] kmemdup_noprof+0x2a/0x60 [ 292.725157][T22103] sidtab_sid2str_get+0xb8/0x140 [ 292.730114][T22103] security_sid_to_context_core+0x1eb/0x2f0 [ 292.736023][T22103] security_sid_to_context+0x27/0x30 [ 292.741344][T22103] avc_audit_post_callback+0x10d/0x530 [ 292.746858][T22103] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 292.752839][T22103] common_lsm_audit+0x90f/0x1010 [ 292.757783][T22103] ? __rcu_read_unlock+0x4e/0x70 [ 292.762831][T22103] ? try_to_unlazy+0x279/0x3b0 [ 292.767629][T22103] ? mntput+0x50/0x70 [ 292.771622][T22103] slow_avc_audit+0xf9/0x140 [ 292.776253][T22103] avc_has_perm+0x129/0x160 [ 292.780789][T22103] selinux_mount+0x2a2/0x2f0 [ 292.785400][T22103] security_sb_mount+0x5b/0xa0 [ 292.790228][T22103] path_mount+0xa5/0xb30 [ 292.794487][T22103] __se_sys_mount+0x27c/0x2d0 [ 292.799169][T22103] __x64_sys_mount+0x67/0x80 [ 292.803780][T22103] x64_sys_call+0x2c84/0x2dc0 [ 292.808478][T22103] do_syscall_64+0xc9/0x1c0 [ 292.813014][T22103] ? clear_bhb_loop+0x55/0xb0 [ 292.817738][T22103] ? clear_bhb_loop+0x55/0xb0 [ 292.822412][T22103] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.828341][T22103] RIP: 0033:0x7fa143285d19 [ 292.832745][T22103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.852429][T22103] RSP: 002b:00007fa1418f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 292.860849][T22103] RAX: ffffffffffffffda RBX: 00007fa143475fa0 RCX: 00007fa143285d19 [ 292.868937][T22103] RDX: 00000000200002c0 RSI: 0000000020000080 RDI: 0000000000000000 [ 292.876937][T22103] RBP: 00007fa1418f7090 R08: 0000000020000400 R09: 0000000000000000 [ 292.884979][T22103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 292.892944][T22103] R13: 0000000000000000 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 292.901029][T22103] [ 292.909060][ T29] kauditd_printk_skb: 1944 callbacks suppressed [ 292.909077][ T29] audit: type=1400 audit(2000000129.780:27286): avc: denied { mounton } for pid=22102 comm="syz.2.5628" path="/515/file0" dev="tmpfs" ino=2703 scontext=root:sysadm_r:sysadm_t tsid=144 tclass=file permissive=0 [ 292.936015][ T29] audit: type=1400 audit(2000000130.030:27287): avc: denied { read write } for pid=22098 comm="syz.7.5627" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 292.959738][ T29] audit: type=1400 audit(2000000130.030:27288): avc: denied { create } for pid=22098 comm="syz.7.5627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 292.979580][ T29] audit: type=1400 audit(2000000130.030:27289): avc: denied { prog_load } for pid=22098 comm="syz.7.5627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 292.998900][ T29] audit: type=1400 audit(2000000130.080:27290): avc: denied { prog_load } for pid=22104 comm="syz.2.5629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 293.018159][ T29] audit: type=1400 audit(2000000130.080:27291): avc: denied { read } for pid=22104 comm="syz.2.5629" dev="nsfs" ino=4026532376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 293.039572][ T29] audit: type=1400 audit(2000000130.080:27292): avc: denied { prog_load } for pid=22104 comm="syz.2.5629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 293.058847][ T29] audit: type=1400 audit(2000000130.080:27293): avc: denied { write } for pid=22104 comm="syz.2.5629" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 293.087368][T22105] lo speed is unknown, defaulting to 1000 [ 293.146630][ T29] audit: type=1400 audit(2000000130.280:27294): avc: denied { read write } for pid=17118 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 293.195694][ T29] audit: type=1326 audit(2000000130.290:27295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.0.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f757ed35d19 code=0x7ffc0000 [ 293.687795][T22144] FAULT_INJECTION: forcing a failure. [ 293.687795][T22144] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 293.698986][T22146] FAULT_INJECTION: forcing a failure. [ 293.698986][T22146] name failslab, interval 1, probability 0, space 0, times 0 [ 293.701071][T22144] CPU: 0 UID: 0 PID: 22144 Comm: syz.2.5645 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 293.724391][T22144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 293.734618][T22144] Call Trace: [ 293.737890][T22144] [ 293.740814][T22144] dump_stack_lvl+0xf2/0x150 [ 293.745414][T22144] dump_stack+0x15/0x1a [ 293.749654][T22144] should_fail_ex+0x223/0x230 [ 293.754387][T22144] should_fail_alloc_page+0xfd/0x110 [ 293.759744][T22144] __alloc_pages_noprof+0x109/0x340 [ 293.764950][T22144] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 293.770326][T22144] vma_alloc_folio_noprof+0x1a0/0x2f0 [ 293.775825][T22144] handle_mm_fault+0xdd7/0x2ac0 [ 293.780683][T22144] exc_page_fault+0x296/0x650 [ 293.785439][T22144] asm_exc_page_fault+0x26/0x30 [ 293.790319][T22144] RIP: 0010:__put_user_4+0x11/0x20 [ 293.795484][T22144] Code: 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 [ 293.815161][T22144] RSP: 0018:ffffc90006febd98 EFLAGS: 00050202 [ 293.821234][T22144] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000020000440 [ 293.829357][T22144] RDX: 000000000000076b RSI: 0000000000000000 RDI: ffffffff88c188ac [ 293.837372][T22144] RBP: 0000000000000000 R08: 0001ffff86644a27 R09: 0000000000000000 [ 293.845370][T22144] R10: 0001ffffffffffff R11: 0001c90006febd70 R12: 0000000000000246 [ 293.853339][T22144] R13: ffff888113cfe000 R14: 0000000020000440 R15: ffff888128caf800 [ 293.861316][T22144] vt_do_diacrit+0x39c/0x690 [ 293.865912][T22144] ? security_capable+0x81/0x90 [ 293.870768][T22144] vt_ioctl+0xe16/0x1810 [ 293.875094][T22144] ? tty_jobctrl_ioctl+0x2ab/0x810 [ 293.880209][T22144] tty_ioctl+0x815/0xbe0 [ 293.884531][T22144] ? __pfx_tty_ioctl+0x10/0x10 [ 293.889327][T22144] __se_sys_ioctl+0xc9/0x140 [ 293.893927][T22144] __x64_sys_ioctl+0x43/0x50 [ 293.898550][T22144] x64_sys_call+0x1690/0x2dc0 [ 293.903293][T22144] do_syscall_64+0xc9/0x1c0 [ 293.907822][T22144] ? clear_bhb_loop+0x55/0xb0 [ 293.912494][T22144] ? clear_bhb_loop+0x55/0xb0 [ 293.917176][T22144] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.923075][T22144] RIP: 0033:0x7fa143285d19 [ 293.927500][T22144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.947241][T22144] RSP: 002b:00007fa1418f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.955646][T22144] RAX: ffffffffffffffda RBX: 00007fa143475fa0 RCX: 00007fa143285d19 [ 293.963618][T22144] RDX: 0000000020000440 RSI: 0000000000004b4a RDI: 0000000000000003 [ 293.971638][T22144] RBP: 00007fa1418f7090 R08: 0000000000000000 R09: 0000000000000000 [ 293.979614][T22144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.987583][T22144] R13: 0000000000000000 R14: 00007fa143475fa0 R15: 00007ffe6a35b728 [ 293.995551][T22144] [ 293.998568][T22146] CPU: 1 UID: 0 PID: 22146 Comm: syz.7.5646 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 294.009371][T22146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 294.019524][T22146] Call Trace: [ 294.022819][T22146] [ 294.025759][T22146] dump_stack_lvl+0xf2/0x150 [ 294.030405][T22146] dump_stack+0x15/0x1a [ 294.034573][T22146] should_fail_ex+0x223/0x230 [ 294.039256][T22146] should_failslab+0x8f/0xb0 [ 294.043878][T22146] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 294.050214][T22146] ? sidtab_sid2str_get+0xb8/0x140 [ 294.055331][T22146] kmemdup_noprof+0x2a/0x60 [ 294.059916][T22146] sidtab_sid2str_get+0xb8/0x140 [ 294.064937][T22146] security_sid_to_context_core+0x1eb/0x2f0 [ 294.070834][T22146] security_sid_to_context+0x27/0x30 [ 294.076128][T22146] avc_audit_post_callback+0x9d/0x530 [ 294.081507][T22146] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 294.087524][T22146] common_lsm_audit+0x90f/0x1010 [ 294.092525][T22146] slow_avc_audit+0xf9/0x140 [ 294.097221][T22146] avc_has_perm+0x129/0x160 [ 294.101732][T22146] selinux_bpf+0xa1/0xc0 [ 294.105998][T22146] security_bpf+0x45/0x80 [ 294.110398][T22146] __sys_bpf+0x19f/0x7a0 [ 294.114644][T22146] __x64_sys_bpf+0x43/0x50 [ 294.119071][T22146] x64_sys_call+0x2914/0x2dc0 [ 294.123752][T22146] do_syscall_64+0xc9/0x1c0 [ 294.128252][T22146] ? clear_bhb_loop+0x55/0xb0 [ 294.132923][T22146] ? clear_bhb_loop+0x55/0xb0 [ 294.137630][T22146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 294.143531][T22146] RIP: 0033:0x7f4f511f5d19 [ 294.148007][T22146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.167612][T22146] RSP: 002b:00007f4f4f861038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 294.176101][T22146] RAX: ffffffffffffffda RBX: 00007f4f513e5fa0 RCX: 00007f4f511f5d19 [ 294.184075][T22146] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 294.192103][T22146] RBP: 00007f4f4f861090 R08: 0000000000000000 R09: 0000000000000000 [ 294.200074][T22146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.208046][T22146] R13: 0000000000000000 R14: 00007f4f513e5fa0 R15: 00007ffffa9f9e48 [ 294.216027][T22146] [ 294.334610][T22168] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(4) [ 294.341204][T22168] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 294.348721][T22168] vhci_hcd vhci_hcd.0: Device attached [ 294.413540][T22169] usbip_core: unknown command [ 294.418313][T22169] vhci_hcd: unknown pdu 4227858432 [ 294.423431][T22169] usbip_core: unknown command [ 294.437475][ T7385] vhci_hcd: stop threads [ 294.441743][ T7385] vhci_hcd: release socket [ 294.446226][ T7385] vhci_hcd: disconnect device [ 294.637286][T22228] FAULT_INJECTION: forcing a failure. [ 294.637286][T22228] name failslab, interval 1, probability 0, space 0, times 0 [ 294.647950][T22231] FAULT_INJECTION: forcing a failure. [ 294.647950][T22231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 294.649936][T22228] CPU: 0 UID: 0 PID: 22228 Comm: syz.0.5681 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 294.649964][T22228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 294.683971][T22228] Call Trace: [ 294.687240][T22228] [ 294.690164][T22228] dump_stack_lvl+0xf2/0x150 [ 294.694809][T22228] dump_stack+0x15/0x1a [ 294.698998][T22228] should_fail_ex+0x223/0x230 [ 294.703742][T22228] ? bpf_prog_create_from_user+0x16c/0x240 [ 294.709598][T22228] should_failslab+0x8f/0xb0 [ 294.714221][T22228] __kmalloc_cache_noprof+0x4e/0x320 [ 294.719585][T22228] bpf_prog_create_from_user+0x16c/0x240 [ 294.725342][T22228] ? __pfx_seccomp_check_filter+0x10/0x10 [ 294.731083][T22228] do_seccomp+0x648/0xa60 [ 294.735413][T22228] ? ksys_write+0x176/0x1b0 [ 294.739920][T22228] __x64_sys_seccomp+0x40/0x50 [ 294.744764][T22228] x64_sys_call+0x27fc/0x2dc0 [ 294.749483][T22228] do_syscall_64+0xc9/0x1c0 [ 294.754008][T22228] ? clear_bhb_loop+0x55/0xb0 [ 294.758697][T22228] ? clear_bhb_loop+0x55/0xb0 [ 294.763428][T22228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 294.769335][T22228] RIP: 0033:0x7f757ed35d19 [ 294.773752][T22228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.793394][T22228] RSP: 002b:00007f757d3a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 294.801836][T22228] RAX: ffffffffffffffda RBX: 00007f757ef25fa0 RCX: 00007f757ed35d19 [ 294.809801][T22228] RDX: 0000000020000380 RSI: 0000000000000004 RDI: 0000000000000001 [ 294.817811][T22228] RBP: 00007f757d3a7090 R08: 0000000000000000 R09: 0000000000000000 [ 294.825777][T22228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.833830][T22228] R13: 0000000000000000 R14: 00007f757ef25fa0 R15: 00007fff12ebdfa8 [ 294.841813][T22228] [ 294.844826][T22231] CPU: 1 UID: 0 PID: 22231 Comm: syz.7.5683 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 294.855599][T22231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 294.865724][T22231] Call Trace: [ 294.869094][T22231] [ 294.872036][T22231] dump_stack_lvl+0xf2/0x150 [ 294.876664][T22231] dump_stack+0x15/0x1a [ 294.880854][T22231] should_fail_ex+0x223/0x230 [ 294.885632][T22231] should_fail_alloc_page+0xfd/0x110 [ 294.890940][T22231] __alloc_pages_noprof+0x109/0x340 [ 294.896172][T22231] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 294.901569][T22231] folio_alloc_mpol_noprof+0x36/0x70 [ 294.906861][T22231] shmem_get_folio_gfp+0x3d1/0xd90 [ 294.911985][T22231] shmem_write_begin+0xa2/0x180 [ 294.916893][T22231] generic_perform_write+0x1a8/0x4a0 [ 294.920688][T22239] lo speed is unknown, defaulting to 1000 [ 294.922189][T22231] shmem_file_write_iter+0xc2/0xe0 [ 294.933075][T22231] iter_file_splice_write+0x5f1/0x980 [ 294.938557][T22231] ? __pfx_iter_file_splice_write+0x10/0x10 [ 294.944577][T22231] direct_splice_actor+0x160/0x2c0 [ 294.949709][T22231] splice_direct_to_actor+0x302/0x670 [ 294.955144][T22231] ? __pfx_direct_splice_actor+0x10/0x10 [ 294.960817][T22231] do_splice_direct+0xd7/0x150 [ 294.965590][T22231] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 294.971502][T22231] do_sendfile+0x398/0x660 [ 294.975935][T22231] __x64_sys_sendfile64+0x110/0x150 [ 294.981200][T22231] x64_sys_call+0xfbd/0x2dc0 [ 294.985950][T22231] do_syscall_64+0xc9/0x1c0 [ 294.990465][T22231] ? clear_bhb_loop+0x55/0xb0 [ 294.995147][T22231] ? clear_bhb_loop+0x55/0xb0 [ 294.999858][T22231] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 295.005784][T22231] RIP: 0033:0x7f4f511f5d19 [ 295.010212][T22231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.029851][T22231] RSP: 002b:00007f4f4f861038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 295.038279][T22231] RAX: ffffffffffffffda RBX: 00007f4f513e5fa0 RCX: 00007f4f511f5d19 [ 295.046263][T22231] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 295.054266][T22231] RBP: 00007f4f4f861090 R08: 0000000000000000 R09: 0000000000000000 [ 295.062249][T22231] R10: 0000000080000000 R11: 0000000000000246 R12: 0000000000000002 [ 295.070231][T22231] R13: 0000000000000000 R14: 00007f4f513e5fa0 R15: 00007ffffa9f9e48 [ 295.078270][T22231] [ 295.243459][T22259] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 295.251748][T22259] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 295.449518][T22266] lo speed is unknown, defaulting to 1000 [ 295.762774][T22301] FAULT_INJECTION: forcing a failure. [ 295.762774][T22301] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 295.776002][T22301] CPU: 0 UID: 0 PID: 22301 Comm: syz.7.5712 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 295.786800][T22301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 295.796872][T22301] Call Trace: [ 295.800151][T22301] [ 295.803085][T22301] dump_stack_lvl+0xf2/0x150 [ 295.807739][T22301] dump_stack+0x15/0x1a [ 295.811992][T22301] should_fail_ex+0x223/0x230 [ 295.816714][T22301] should_fail+0xb/0x10 [ 295.820884][T22301] should_fail_usercopy+0x1a/0x20 [ 295.826033][T22301] _copy_from_user+0x1e/0xb0 [ 295.830646][T22301] do_tcp_setsockopt+0x205/0x1550 [ 295.835738][T22301] ? selinux_socket_setsockopt+0x1c9/0x200 [ 295.841560][T22301] tcp_setsockopt+0x50/0xb0 [ 295.846116][T22301] sock_common_setsockopt+0x64/0x80 [ 295.851328][T22301] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 295.857274][T22301] __sys_setsockopt+0x187/0x200 [ 295.862196][T22301] __x64_sys_setsockopt+0x66/0x80 [ 295.867227][T22301] x64_sys_call+0x282e/0x2dc0 [ 295.872069][T22301] do_syscall_64+0xc9/0x1c0 [ 295.876662][T22301] ? clear_bhb_loop+0x55/0xb0 [ 295.876689][T22301] ? clear_bhb_loop+0x55/0xb0 [ 295.876714][T22301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 295.891993][T22301] RIP: 0033:0x7f4f511f5d19 [ 295.896436][T22301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.916119][T22301] RSP: 002b:00007f4f4f861038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 295.924592][T22301] RAX: ffffffffffffffda RBX: 00007f4f513e5fa0 RCX: 00007f4f511f5d19 [ 295.932624][T22301] RDX: 000000000000000e RSI: 0000000000000006 RDI: 0000000000000003 [ 295.940599][T22301] RBP: 00007f4f4f861090 R08: 00000000000000d8 R09: 0000000000000000 [ 295.948628][T22301] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000001 [ 295.956685][T22301] R13: 0000000000000000 R14: 00007f4f513e5fa0 R15: 00007ffffa9f9e48 [ 295.964724][T22301] [ 296.136522][T22339] FAULT_INJECTION: forcing a failure. [ 296.136522][T22339] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.149713][T22339] CPU: 1 UID: 0 PID: 22339 Comm: syz.5.5728 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 296.151028][T22338] lo speed is unknown, defaulting to 1000 [ 296.160516][T22339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 296.160533][T22339] Call Trace: [ 296.160541][T22339] [ 296.160550][T22339] dump_stack_lvl+0xf2/0x150 [ 296.187145][T22339] dump_stack+0x15/0x1a [ 296.191404][T22339] should_fail_ex+0x223/0x230 [ 296.196092][T22339] should_fail+0xb/0x10 [ 296.200268][T22339] should_fail_usercopy+0x1a/0x20 [ 296.205332][T22339] _copy_from_user+0x1e/0xb0 [ 296.210073][T22339] kstrtouint_from_user+0x76/0xe0 [ 296.215147][T22339] ? 0xffffffff81000000 [ 296.219357][T22339] ? selinux_file_permission+0x22a/0x360 [ 296.225076][T22339] proc_fail_nth_write+0x4f/0x150 [ 296.230156][T22339] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 296.235869][T22339] vfs_write+0x281/0x920 [ 296.240197][T22339] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 296.245768][T22339] ? __fget_files+0x17c/0x1c0 [ 296.250459][T22339] ksys_write+0xe8/0x1b0 [ 296.254704][T22339] __x64_sys_write+0x42/0x50 [ 296.259304][T22339] x64_sys_call+0x287e/0x2dc0 [ 296.263983][T22339] do_syscall_64+0xc9/0x1c0 [ 296.268566][T22339] ? clear_bhb_loop+0x55/0xb0 [ 296.273253][T22339] ? clear_bhb_loop+0x55/0xb0 [ 296.277925][T22339] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.283837][T22339] RIP: 0033:0x7f04d50e47cf [ 296.288249][T22339] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 296.307853][T22339] RSP: 002b:00007f04d3751030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 296.316282][T22339] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f04d50e47cf [ 296.324262][T22339] RDX: 0000000000000001 RSI: 00007f04d37510a0 RDI: 0000000000000003 [ 296.332256][T22339] RBP: 00007f04d3751090 R08: 0000000000000000 R09: 0000000000000000 [ 296.340219][T22339] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 296.348249][T22339] R13: 0000000000000000 R14: 00007f04d52d5fa0 R15: 00007ffe50b77b28 [ 296.356271][T22339] [ 296.489096][T22353] netdevsim netdevsim5: loading /lib/firmware/. failed with error -22 [ 296.497391][T22353] netdevsim netdevsim5: Direct firmware load for . failed with error -22 [ 296.522169][T22363] ================================================================== [ 296.530253][T22363] BUG: KCSAN: data-race in mas_replace_node / mtree_range_walk [ 296.537795][T22363] [ 296.540112][T22363] write to 0xffff888109e0ba00 of 8 bytes by task 22360 on cpu 0: [ 296.547832][T22363] mas_replace_node+0x1b8/0x430 [ 296.552680][T22363] mas_wr_store_entry+0x1fbf/0x2d10 [ 296.557881][T22363] mas_store_prealloc+0x6bf/0x960 [ 296.562897][T22363] vma_complete+0x3a7/0x760 [ 296.567391][T22363] __split_vma+0x5d6/0x6a0 [ 296.571805][T22363] vms_gather_munmap_vmas+0x171/0x7a0 [ 296.577168][T22363] do_vmi_align_munmap+0x1a4/0x390 [ 296.582271][T22363] do_vmi_munmap+0x1eb/0x230 [ 296.586856][T22363] __se_sys_mremap+0x62c/0xf10 [ 296.591621][T22363] __x64_sys_mremap+0x67/0x80 [ 296.596300][T22363] x64_sys_call+0x27e8/0x2dc0 [ 296.600995][T22363] do_syscall_64+0xc9/0x1c0 [ 296.605491][T22363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.611390][T22363] [ 296.613702][T22363] read to 0xffff888109e0ba00 of 8 bytes by task 22363 on cpu 1: [ 296.621323][T22363] mtree_range_walk+0x33d/0x460 [ 296.626167][T22363] mas_walk+0x16e/0x320 [ 296.630325][T22363] lock_vma_under_rcu+0x95/0x260 [ 296.635258][T22363] exc_page_fault+0x150/0x650 [ 296.639937][T22363] asm_exc_page_fault+0x26/0x30 [ 296.644799][T22363] [ 296.647117][T22363] value changed: 0xffff888109e0b406 -> 0xffff888109e0ba00 [ 296.654214][T22363] [ 296.656533][T22363] Reported by Kernel Concurrency Sanitizer on: [ 296.662684][T22363] CPU: 1 UID: 0 PID: 22363 Comm: syz.7.5737 Not tainted 6.13.0-rc2-syzkaller-00333-ga0e3919a2df2 #0 [ 296.673459][T22363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 296.683512][T22363] ==================================================================