.383578][ T9489] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 682.386686][ T9489] usb 2-1: config 0 descriptor?? [ 682.911582][ T9489] usbhid 2-1:0.0: can't add hid device: -71 [ 682.912027][ T9489] usbhid: probe of 2-1:0.0 failed with error -71 [ 682.914315][ T9489] usb 2-1: USB disconnect, device number 22 00:11:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:11:24 executing program 0: unshare(0x22000600) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x400c6615, 0x0) 00:11:24 executing program 0: unshare(0x22000600) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x400c6615, 0x0) 00:11:24 executing program 0: unshare(0x22000600) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x400c6615, 0x0) [ 684.911490][ T9489] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 685.171475][ T9489] usb 2-1: Using ep0 maxpacket: 16 [ 685.291548][ T9489] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 685.292051][ T9489] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 685.292314][ T9489] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 685.292491][ T9489] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 685.294749][ T9489] usb 2-1: config 0 descriptor?? [ 685.871782][ T9489] usbhid 2-1:0.0: can't add hid device: -71 [ 685.872262][ T9489] usbhid: probe of 2-1:0.0 failed with error -71 [ 685.874900][ T9489] usb 2-1: USB disconnect, device number 23 00:11:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:11:27 executing program 0: unshare(0x22000600) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x400c6615, 0x0) 00:11:27 executing program 0: unshare(0x22000600) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x400c6615, 0x0) 00:11:27 executing program 0: unshare(0x22000600) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x400c6615, 0x0) [ 687.841737][ T92] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 688.081548][ T92] usb 2-1: Using ep0 maxpacket: 16 [ 688.202058][ T92] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 688.202507][ T92] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 688.202854][ T92] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 688.203355][ T92] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 688.208013][ T92] usb 2-1: config 0 descriptor?? [ 688.751901][ T92] usbhid 2-1:0.0: can't add hid device: -71 [ 688.752410][ T92] usbhid: probe of 2-1:0.0 failed with error -71 [ 688.756538][ T92] usb 2-1: USB disconnect, device number 24 00:11:30 executing program 0: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x400c6615, 0x0) 00:11:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:11:30 executing program 0: r0 = creat(0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x400c6615, 0x0) 00:11:30 executing program 0: r0 = creat(0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x400c6615, 0x0) 00:11:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:11:31 executing program 0: r0 = creat(0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x400c6615, 0x0) 00:11:31 executing program 0: creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x400c6615, 0x0) 00:11:32 executing program 0: creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x400c6615, 0x0) 00:11:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:11:33 executing program 0: creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x400c6615, 0x0) 00:11:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000100)={0x0, 0x1, 0xf39d}) 00:11:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b49, &(0x7f0000000040)=0xd) 00:11:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:11:35 executing program 0: r0 = socket(0x1e, 0x5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) 00:11:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000b00)={&(0x7f0000000000), 0xc, &(0x7f0000000a40)=[{&(0x7f0000000b40)=ANY=[], 0x3c}], 0x1, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0xf}, 0x0) 00:11:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @remote}}}}) [ 696.021488][ T9489] usb 2-1: new high-speed USB device number 25 using dummy_hcd [ 696.211423][ T9489] usb 2-1: device descriptor read/64, error -71 [ 696.491427][ T9489] usb 2-1: new high-speed USB device number 26 using dummy_hcd [ 696.701371][ T9489] usb 2-1: device descriptor read/64, error -71 [ 696.822042][ T9489] usb usb2-port1: attempt power cycle [ 697.231648][ T9489] usb 2-1: new high-speed USB device number 27 using dummy_hcd [ 697.332208][ T9489] usb 2-1: device descriptor read/8, error -71 [ 697.601583][ T9489] usb 2-1: new high-speed USB device number 28 using dummy_hcd [ 697.701533][ T9489] usb 2-1: device descriptor read/8, error -71 [ 697.821845][ T9489] usb usb2-port1: unable to enumerate USB device 00:11:50 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:11:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f0000000080)={'tunl0\x00', 0x0}) 00:11:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) 00:11:50 executing program 0: unshare(0x42000600) [ 711.101637][ T92] usb 2-1: new high-speed USB device number 29 using dummy_hcd [ 711.292088][ T92] usb 2-1: device descriptor read/64, error -71 [ 711.561385][ T92] usb 2-1: new high-speed USB device number 30 using dummy_hcd [ 711.751260][ T92] usb 2-1: device descriptor read/64, error -71 [ 711.871725][ T92] usb usb2-port1: attempt power cycle [ 712.281536][ T92] usb 2-1: new high-speed USB device number 31 using dummy_hcd [ 712.372045][ T92] usb 2-1: device descriptor read/8, error -71 [ 712.641697][ T92] usb 2-1: new high-speed USB device number 32 using dummy_hcd [ 712.732277][ T92] usb 2-1: device descriptor read/8, error -71 [ 712.852281][ T92] usb usb2-port1: unable to enumerate USB device 00:12:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:12:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002240)={'ip6_vti0\x00', &(0x7f00000021c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @private2}}) 00:12:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r0) 00:12:05 executing program 0: r0 = socket$packet(0x11, 0xa, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 725.741604][ T29] audit: type=1400 audit(725.690:313): avc: denied { read } for pid=10309 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 726.131443][ T92] usb 2-1: new high-speed USB device number 33 using dummy_hcd [ 726.321921][ T92] usb 2-1: device descriptor read/64, error -71 [ 726.592433][ T92] usb 2-1: new high-speed USB device number 34 using dummy_hcd [ 726.792408][ T92] usb 2-1: device descriptor read/64, error -71 [ 726.912770][ T92] usb usb2-port1: attempt power cycle [ 727.321794][ T92] usb 2-1: new high-speed USB device number 35 using dummy_hcd [ 727.412170][ T92] usb 2-1: device descriptor read/8, error -71 [ 727.681413][ T92] usb 2-1: new high-speed USB device number 36 using dummy_hcd [ 727.772664][ T92] usb 2-1: device descriptor read/8, error -71 [ 727.891920][ T92] usb usb2-port1: unable to enumerate USB device 00:12:20 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000004c0), 0x4) 00:12:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:12:20 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) 00:12:20 executing program 0: semget$private(0x0, 0x4, 0x3b2) 00:12:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) [ 741.171451][ T3668] usb 2-1: new high-speed USB device number 37 using dummy_hcd [ 741.431729][ T3668] usb 2-1: Using ep0 maxpacket: 16 [ 741.551960][ T3668] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 741.552363][ T3668] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 741.552560][ T3668] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 741.556137][ T3668] usb 2-1: config 0 descriptor?? [ 741.594038][ T3668] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 751.802469][ T3668] usb 2-1: USB disconnect, device number 37 00:12:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) 00:12:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:12:31 executing program 0: shmget(0x1, 0x1000, 0x200, &(0x7f0000ffd000/0x1000)=nil) 00:12:31 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x140b, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8}]}, 0x20}}, 0x0) [ 752.351723][ T3668] usb 2-1: new high-speed USB device number 38 using dummy_hcd [ 752.591411][ T3668] usb 2-1: Using ep0 maxpacket: 16 [ 752.732023][ T3668] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 752.732678][ T3668] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 752.732947][ T3668] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 752.736447][ T3668] usb 2-1: config 0 descriptor?? [ 752.775428][ T3668] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 762.982734][ T3668] usb 2-1: USB disconnect, device number 38 00:12:42 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x600003) ioctl$FIONCLEX(r0, 0x5450) 00:12:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:12:43 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@local}) 00:12:43 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 00:12:43 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x600101, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000240)='\x1b\xf2j\f\xc4\xf3\xe4k\xe4*\x8c=hf7>S[\xa07\xaag\xd4n\aro\x03\\\x1e\xf17\\z\x1abt\xa7x\xa1\xc5\xea.L\x8a;\x7f\xef\xc9\xbej\x8f\xfdn\x1d\xb5]\x9e\xe6%\x9c\xc9zk1\xcd\x80sWf\xbc\xc2\x88\xa8\xe4o0\xb4\x93Ca?F0\xf1\x98\xce\xfb\x98\xc2`\"s_O\x11\xcf\xea\rm\xbe\x94\xc9\xbb\xbb\x8e\x80\xa1\xaav\xe1v\x81\x17\x81%<<\xc9\x84\xf9\xc2V\'!\x88\x89\x1bR3=\xc9f\xa6\x843\x15-\x84\x05\xfe,B\xf1\x11K\x0e\x1a,\xbc\x96\xa2\x9c\x92\x03t\xa7\x1d$j\xfb\t\xd9\xda\aeEA\x935\xc2\xdeqY\x8d\xe4X/\xda\xb7\x87\xf4T\xae4\r9\aD`\xd7/\xf0\v\xc2=\x83\xf4CS\xf0Kv\xa1\xe6\xe9\xc7@\x05`kj5\\\xa7eA\x12\xe5\xf6r\xda\x1a$\xde\xb7\x055\xdf\xe86\xc0', 0x0, r0) [ 763.541593][ T3668] usb 2-1: new high-speed USB device number 39 using dummy_hcd [ 763.781489][ T3668] usb 2-1: Using ep0 maxpacket: 16 [ 763.902223][ T3668] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 763.903096][ T3668] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 763.903384][ T3668] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 763.906312][ T3668] usb 2-1: config 0 descriptor?? [ 763.955955][ T3668] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 774.161710][ T22] usb 2-1: USB disconnect, device number 39 00:12:54 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000840)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, 0x0}, 0x0) 00:12:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:12:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9}, 0x14) 00:12:54 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000100), 0x88) 00:12:54 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) [ 774.711782][ T3668] usb 2-1: new high-speed USB device number 40 using dummy_hcd [ 774.951762][ T3668] usb 2-1: Using ep0 maxpacket: 16 [ 775.071883][ T3668] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 775.072525][ T3668] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 775.072810][ T3668] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 775.073030][ T3668] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 775.076934][ T3668] usb 2-1: config 0 descriptor?? [ 775.134709][ T3668] usbhid 2-1:0.0: can't add hid device: -22 [ 775.135043][ T3668] usbhid: probe of 2-1:0.0 failed with error -22 [ 785.344481][ T92] usb 2-1: USB disconnect, device number 40 00:13:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:13:05 executing program 0: r0 = socket$inet6(0x1c, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x6e) 00:13:05 executing program 0: set_robust_list(&(0x7f0000001080), 0x18) 00:13:05 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000045c0), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0x40305829, 0x0) [ 785.891555][ T92] usb 2-1: new high-speed USB device number 41 using dummy_hcd [ 786.131612][ T92] usb 2-1: Using ep0 maxpacket: 16 [ 786.261793][ T92] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 786.262252][ T92] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 786.262520][ T92] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 786.262735][ T92] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 786.267794][ T92] usb 2-1: config 0 descriptor?? [ 786.305166][ T92] usbhid 2-1:0.0: can't add hid device: -22 [ 786.305530][ T92] usbhid: probe of 2-1:0.0 failed with error -22 [ 796.514436][ T3668] usb 2-1: USB disconnect, device number 41 00:13:16 executing program 0: add_key$fscrypt_v1(&(0x7f0000000480), 0x0, &(0x7f0000000500)={0x0, "e226ca86ba51409aa1486c4270674af665233540bd1abeb552a08605b763418879aba2daeef3e063599d3016369d674aba1eadd081557c41d97834f86c952d6f"}, 0x48, 0x0) 00:13:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:13:16 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000080)=""/3, 0x3}, {&(0x7f00000000c0)=""/242, 0xf2}, {&(0x7f00000002c0)=""/78, 0x4e}, {&(0x7f0000000340)=""/89, 0x59}, {&(0x7f00000003c0)=""/86, 0xffffffffffffff42}, {&(0x7f00000001c0)=""/2, 0x2}], 0x6, &(0x7f0000000200)=""/116, 0x74}, 0x0) 00:13:16 executing program 0: process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/61, 0x3d}], 0x1, &(0x7f0000000680)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f0000000500)=""/172, 0xac}, {0x0}, {0x0}], 0x4, 0x0) [ 797.091478][ T94] usb 2-1: new high-speed USB device number 42 using dummy_hcd [ 797.331792][ T94] usb 2-1: Using ep0 maxpacket: 16 [ 797.452009][ T94] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 797.452634][ T94] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 797.453034][ T94] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 797.453304][ T94] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 797.458219][ T94] usb 2-1: config 0 descriptor?? [ 797.494363][ T94] usbhid 2-1:0.0: can't add hid device: -22 [ 797.494635][ T94] usbhid: probe of 2-1:0.0 failed with error -22 [ 807.712684][ T2936] usb 2-1: USB disconnect, device number 42 00:13:27 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000080)) 00:13:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:13:27 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001140), 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r1, r0) 00:13:27 executing program 0: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001100), 0x2, 0x0) 00:13:27 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) [ 808.311849][ T2936] usb 2-1: new high-speed USB device number 43 using dummy_hcd [ 808.562451][ T2936] usb 2-1: Using ep0 maxpacket: 16 [ 808.681650][ T2936] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 808.682273][ T2936] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 808.682497][ T2936] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 808.682694][ T2936] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 808.684807][ T2936] usb 2-1: config 0 descriptor?? [ 809.221832][ T2936] usbhid 2-1:0.0: can't add hid device: -71 [ 809.222361][ T2936] usbhid: probe of 2-1:0.0 failed with error -71 [ 809.224798][ T2936] usb 2-1: USB disconnect, device number 43 00:13:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:13:30 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) r2 = dup2(r1, r0) fcntl$getownex(r2, 0x10, 0x0) 00:13:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x14, 0x3, 0x3, 0x801}, 0x14}}, 0x0) 00:13:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) [ 811.201398][ T9489] usb 2-1: new high-speed USB device number 44 using dummy_hcd [ 811.441464][ T9489] usb 2-1: Using ep0 maxpacket: 16 [ 811.561889][ T9489] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 811.562416][ T9489] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 811.562827][ T9489] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 811.563119][ T9489] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 811.566423][ T9489] usb 2-1: config 0 descriptor?? [ 812.101491][ T9489] usbhid 2-1:0.0: can't add hid device: -71 [ 812.101833][ T9489] usbhid: probe of 2-1:0.0 failed with error -71 [ 812.104890][ T9489] usb 2-1: USB disconnect, device number 44 00:13:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x550c, 0x0) syz_usb_control_io(r1, 0x0, 0x0) 00:13:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 00:13:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 00:13:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b00)={0x34, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}]}, 0x34}}, 0x0) [ 814.081657][ T94] usb 2-1: new high-speed USB device number 45 using dummy_hcd [ 814.322396][ T94] usb 2-1: Using ep0 maxpacket: 16 [ 814.441777][ T94] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 814.442149][ T94] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 814.442397][ T94] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 814.442574][ T94] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 814.445469][ T94] usb 2-1: config 0 descriptor?? [ 814.981707][ T94] usbhid 2-1:0.0: can't add hid device: -71 [ 814.981967][ T94] usbhid: probe of 2-1:0.0 failed with error -71 [ 814.984800][ T94] usb 2-1: USB disconnect, device number 45 00:13:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 00:13:36 executing program 0: syz_clone(0xd4300080, 0x0, 0x0, 0x0, 0x0, 0x0) 00:13:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nicvf0\x00', 0x2}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00'}) 00:13:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'ip6erspan0\x00', 0x2}) [ 817.002173][ T2936] usb 2-1: new high-speed USB device number 46 using dummy_hcd [ 817.251658][ T2936] usb 2-1: Using ep0 maxpacket: 16 [ 817.382084][ T2936] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 817.382554][ T2936] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 817.382846][ T2936] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 817.383294][ T2936] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 817.387013][ T2936] usb 2-1: config 0 descriptor?? [ 817.732226][ T2936] usbhid 2-1:0.0: can't add hid device: -71 [ 817.732497][ T2936] usbhid: probe of 2-1:0.0 failed with error -71 [ 817.734626][ T2936] usb 2-1: USB disconnect, device number 46 00:13:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 00:13:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller1\x00', 0x1}) 00:13:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nicvf0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000100)=[{}, {0x8}]}) 00:13:39 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000200), 0x5bf, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000040)={0x0}) [ 819.681867][ T9489] usb 2-1: new high-speed USB device number 47 using dummy_hcd [ 819.921389][ T9489] usb 2-1: Using ep0 maxpacket: 16 [ 820.041603][ T9489] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 820.042065][ T9489] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 820.042675][ T9489] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 820.042970][ T9489] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 820.045576][ T9489] usb 2-1: config 0 descriptor?? [ 820.421670][ T9489] usbhid 2-1:0.0: can't add hid device: -71 [ 820.422064][ T9489] usbhid: probe of 2-1:0.0 failed with error -71 [ 820.425823][ T9489] usb 2-1: USB disconnect, device number 47 00:13:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 00:13:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000200), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x401c5820, &(0x7f00000005c0)={&(0x7f00000002c0)}) 00:13:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000200), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000180)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064ce, 0x0) 00:13:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000200), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 822.381554][ T9489] usb 2-1: new high-speed USB device number 48 using dummy_hcd [ 822.631465][ T9489] usb 2-1: Using ep0 maxpacket: 16 [ 822.741985][ T9489] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 822.742396][ T9489] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 822.742903][ T9489] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.00 [ 822.743251][ T9489] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 822.746632][ T9489] usb 2-1: config 0 descriptor?? [ 823.101467][ T9489] usbhid 2-1:0.0: can't add hid device: -71 [ 823.101788][ T9489] usbhid: probe of 2-1:0.0 failed with error -71 [ 823.105144][ T9489] usb 2-1: USB disconnect, device number 48 00:13:44 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 00:13:44 executing program 1: r0 = syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000000680)={0x14, 0x0, &(0x7f0000000640)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x2c01}}}, &(0x7f0000000940)={0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:13:44 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local, @remote, @val, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) 00:13:44 executing program 0: r0 = syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x0, 0x0, 0x8}}}}}}}]}}, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000000680)={0x14, &(0x7f0000000540)={0x0, 0x0, 0x2, {0x2}}, 0x0}, 0x0) [ 824.891441][ T9489] usb 2-1: new high-speed USB device number 49 using dummy_hcd [ 824.961509][ T22] usb 1-1: new high-speed USB device number 30 using dummy_hcd [ 825.141361][ T9489] usb 2-1: Using ep0 maxpacket: 8 [ 825.212231][ T22] usb 1-1: Using ep0 maxpacket: 8 [ 825.261737][ T9489] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 825.262137][ T9489] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 825.262416][ T9489] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 825.332061][ T22] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 825.332345][ T22] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 825.332466][ T22] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 825.451848][ T9489] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 825.453637][ T9489] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 825.454494][ T9489] usb 2-1: Product: syz [ 825.454693][ T9489] usb 2-1: Manufacturer: syz [ 825.454857][ T9489] usb 2-1: SerialNumber: syz [ 825.491773][ T22] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 825.492155][ T22] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 825.492364][ T22] usb 1-1: Product: syz [ 825.492508][ T22] usb 1-1: Manufacturer: syz [ 825.492659][ T22] usb 1-1: SerialNumber: syz [ 825.942080][ T9489] usb 2-1: 0:2 : does not exist [ 825.960281][ T9489] usb 2-1: USB disconnect, device number 49 [ 826.261656][ T22] usb 1-1: 0:2 : does not exist [ 826.285441][ T22] usb 1-1: USB disconnect, device number 30 00:13:47 executing program 1: r0 = syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 00:13:47 executing program 0: r0 = syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x0, 0xa3}}}}}}}]}}, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000000680)={0x14, 0x0, &(0x7f0000000640)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x2c01}}}, 0x0) [ 827.782132][ T94] usb 2-1: new high-speed USB device number 50 using dummy_hcd [ 828.022108][ T94] usb 2-1: Using ep0 maxpacket: 8 [ 828.061684][ T8] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 828.151828][ T94] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 828.152203][ T94] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 828.152462][ T94] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 828.311552][ T8] usb 1-1: Using ep0 maxpacket: 8 [ 828.311711][ T94] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 828.312362][ T94] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 828.312917][ T94] usb 2-1: Product: syz [ 828.313246][ T94] usb 2-1: Manufacturer: syz [ 828.313513][ T94] usb 2-1: SerialNumber: syz [ 828.462005][ T8] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 828.462494][ T8] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 828.463106][ T8] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 828.641956][ T94] usb 2-1: 0:2 : does not exist [ 828.652525][ T8] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 828.666507][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 828.669296][ T94] usb 2-1: USB disconnect, device number 50 [ 828.675348][ T8] usb 1-1: Product: syz [ 828.676851][ T8] usb 1-1: Manufacturer: syz [ 828.678337][ T8] usb 1-1: SerialNumber: syz [ 829.201912][ T8] usb 1-1: 0:2 : does not exist [ 829.218475][ T8] usb 1-1: USB disconnect, device number 31 00:13:50 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x203, 0x0) 00:13:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000000c0)=""/211, 0xd3}], 0xffffff1f}, 0x0) 00:13:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'caif0\x00', 0x2}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)) 00:13:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000000c0)=""/211, 0xd3}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001b40)='3', 0x1}], 0x1}, 0x0) 00:13:50 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000840), 0x840, 0x0) 00:13:50 executing program 0: socketpair(0x10, 0x0, 0x7, &(0x7f0000000040)) 00:13:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}]}}, &(0x7f00000004c0)=""/238, 0x2a, 0xee, 0x1}, 0x20) 00:13:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f00000004c0)=""/238, 0x3e, 0xee, 0x1}, 0x20) 00:13:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002800)=@base={0x1b, 0x0, 0x400}, 0x48) 00:13:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0xa, 0xa8, 0x3f, 0x2}, 0x48) close(r0) 00:13:51 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000002200)={0x1c, 0x1c, 0x1}, 0x1c) 00:13:51 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @broadcast, @val, {@ipv6}}, 0x0) 00:13:51 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x50000000) 00:13:51 executing program 0: getresuid(&(0x7f0000001900), &(0x7f0000001940), 0x0) 00:13:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x24, &(0x7f0000000040), &(0x7f0000000000)=0x98) 00:13:51 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @broadcast, @broadcast, @empty, @broadcast}}}}, 0x0) 00:13:51 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 00:13:51 executing program 1: bind(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r1, &(0x7f0000000040)=@in={0x10}, 0x10) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4) setsockopt(r0, 0x84, 0x8001, &(0x7f0000000000)='\x00', 0x5a) 00:13:51 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, 0x0, 0x0) 00:13:51 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000180), 0x90) 00:13:51 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000002900)='./file0\x00', 0x100, 0x0, &(0x7f0000002940)) 00:13:51 executing program 0: open$dir(&(0x7f000000b340)='./file0\x00', 0x80240, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000002ac0)='./file0\x00', 0x101000, 0xa0) 00:13:51 executing program 1: open$dir(&(0x7f000000b340)='./file0\x00', 0x80240, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x40000494) 00:13:52 executing program 0: open$dir(&(0x7f000000b340)='./file0\x00', 0x80240, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f0000000280)) [ 832.077204][ T29] audit: type=1400 audit(832.030:314): avc: denied { watch watch_reads } for pid=10756 comm="syz-executor.1" path="/syzkaller-testdir2912992488/syzkaller.LDCB8n/1400/file0" dev="vda" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 00:13:52 executing program 1: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x8) semtimedop(0x0, 0x0, 0x0, 0x0) rt_sigreturn() mlockall(0x3) r0 = syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)="a00a055f") r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) r2 = dup2(r1, r0) accept(r2, 0x0, 0x0) 00:13:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000400)="bf", 0x1}], 0x1, &(0x7f0000001500)=[@ip_tos_int={{0x14}}], 0x18}, 0xc081) 00:13:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x11}, 0x0) 00:13:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000180), 0x6e, &(0x7f0000000380)=[{&(0x7f0000000200)=""/136, 0x88}], 0x1, &(0x7f00000003c0)}, 0x40000020) sendmsg$inet(r1, &(0x7f0000001540)={0x0, 0xfffffffffffffed9, 0x0}, 0x0) 00:13:53 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1c"], 0xf8}, 0x0) 00:13:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x41) 00:13:53 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000000140)=ANY=[], 0xffffff7c) write$P9_RLOCK(r0, 0x0, 0x0) 00:13:53 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r1, &(0x7f0000000140)=ANY=[], 0xffffff7c) read$FUSE(r0, 0x0, 0x0) 00:13:53 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000000140)=ANY=[], 0xffffff7c) 00:13:53 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000000040)=ANY=[], 0xffffff7c) write$P9_RLERROR(r0, 0x0, 0x0) 00:13:53 executing program 0: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[], 0xffffff7c) write$P9_RATTACH(r0, 0x0, 0x0) 00:13:53 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000000140)=ANY=[], 0xffffff7c) write$P9_RXATTRCREATE(r0, 0x0, 0x0) 00:13:53 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r0, &(0x7f00000000c0)={0xcc, 0x7, 0x0, {0xc3, '\xb5\f\x1c\xba$\x04B/y6\x13\xb8\x1b\x11\xe2w\xeb=\x11#\xef\xd5\x8bi\xd4\x15\xac\x9a\x8f\x99\x9e!\xb0\x93\xd4DQ\xb2yK\x05\xdc\xcb\xdf\x8ck\x04x\xe2\xb8\xf7\xc0;\x9e\x82\xc2\x04n$D \x8a\xf5\x04\xcb\x11\xba\x8a\rV\xec\xd3\x9e\xc2\xb89C.\xc5\xca\x98\xabYp\x83d\xdf\xf3ZCc&\xf9\xaaT\xfb\xdb\xc39\x99\xefm(5\xa5\a^I\xd3\\\x9dV%u\x10\xbdY*\x90\x85\xb5\xea\xe6\xaf\xad\xf0e\x91\x1eh\xf3m\x9c\xc2s\xbb\xe3\x9b\x9b\x81\x8b\xd7gz\x8a\xf6\x91\x99\x13\xda\xe5\x1e\xe6\xff\x87\x8ffL\x93v(`\x8a\xc4\xba\'\x91<\xec`\xb7\xfdm\xf6\xe3Z\x1d\xf0\x81\xdd\xfd/\xe0\x14\x1d\x0486\x90\xd7\xff\xef\x8f]\xae'}}, 0xfffffffffffffeaf) 00:13:53 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0x53) 00:13:53 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000000140)=ANY=[], 0xffffff7c) write$P9_RREAD(r0, 0x0, 0x0) 00:13:53 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000004700), 0x0, 0x0) write$P9_RLOPEN(r0, 0x0, 0xfffffffffffffdb9) 00:13:53 executing program 0: r0 = epoll_create1(0x0) dup2(r0, r0) syz_clone(0x41000000, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_create1(0x0) dup(0xffffffffffffffff) getuid() syz_clone(0x80000, 0x0, 0x0, &(0x7f0000001880), 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x881) 00:13:53 executing program 1: futex(&(0x7f0000000000), 0xb, 0x0, &(0x7f00000000c0), 0x0, 0x0) 00:13:53 executing program 1: socket(0x0, 0x0, 0x0) socketpair(0x11, 0xa, 0xc5, &(0x7f00000000c0)) 00:13:53 executing program 0: r0 = socket(0x11, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x107, 0x1d, 0x0, 0x0) 00:13:53 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6}]}) 00:13:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_DELRULE={0x2c, 0x8, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) [ 833.878428][ T29] audit: type=1326 audit(833.830:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:13:54 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x4}}]}, 0x20}}, 0x0) 00:13:54 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue0\x00'}) 00:13:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000400)={@void, @void, @ipv6=@dccp_packet={0x0, 0x6, "6e4cec", 0x10, 0x21, 0x0, @mcast1, @empty, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, "59b4e2", 0x0, "1eccfe"}}}}}, 0x38) 00:13:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000080)=ANY=[], 0x45, 0x786, &(0x7f00000007c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000600)="1a82c6bfb062484111af1b05429da6953fd64d20b98129b43e35bb84dac2d0ddd522dd27b19d3aa13bfc89b05719a7e28705815739b1f863e621e7352f1eade0bc3d86b59b45413067615d5c56", 0x4d}], 0x1) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x1}], 0x1, 0x0, 0x0, 0x0) 00:13:54 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) 00:13:54 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000340), &(0x7f0000000380)={'fscrypt:', @desc3}, &(0x7f00000003c0)={0x0, "ab8c33a662a3c3b49d4cf0b35da216dbeccac0c2cd42e0ff7e2cf21bf5934f7ad1ce903b5cc25716d7df78372a2cd5043a8ef8e52b87347f7b4026cf9e505534", 0x12}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r1, 0x0) [ 835.105280][T10835] loop1: detected capacity change from 0 to 2048 00:13:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) [ 835.208587][T10835] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 00:13:55 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000040)='FROZEN\x00', 0x7) [ 835.479903][ T9300] EXT4-fs error (device loop1): ext4_validate_block_bitmap:438: comm kworker/u6:2: bg 0: block 234: padding at end of block bitmap is not set [ 835.483597][ T9300] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 117 [ 835.483971][ T9300] EXT4-fs (loop1): This should not happen!! Data will be lost [ 835.483971][ T9300] [ 835.493883][ T2991] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:13:55 executing program 0: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:13:55 executing program 0: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$batadv(0x0, r1) syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), r0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc00c6419, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001300), 0xffffffffffffffff) 00:13:55 executing program 1: syz_io_uring_submit(0x0, 0x0, 0x0) syz_io_uring_setup(0xf56, &(0x7f00000003c0)={0x0, 0x0, 0x2}, &(0x7f0000000440), &(0x7f0000000480)) 00:13:55 executing program 1: ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000bc0)='./file0\x00', &(0x7f0000000e00)=[&(0x7f0000000c00)='\x00', &(0x7f0000000c40)='\x00'], &(0x7f0000000f00)=[&(0x7f0000000ec0)='\x1c-gT\xb6\xcc}\xaa\xcbY\x98u\xd7\xfa\xf9\xbb'], 0x0) 00:13:56 executing program 0: socketpair(0x25, 0x5, 0x400, &(0x7f0000000980)) 00:13:56 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000380)=[0xffffffffffffffff], 0x0, 0x0) [ 836.451474][ T29] audit: type=1400 audit(836.400:316): avc: denied { create } for pid=10861 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 00:13:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x8, 0xcc, &(0x7f0000000080)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:13:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7}]}]}}, 0x0, 0x2e}, 0x20) 00:13:56 executing program 1: bpf$PROG_LOAD(0x22, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) 00:13:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000340)) 00:13:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x184}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:13:56 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000001700)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setpriority(0x1, 0x0, 0x6) 00:13:57 executing program 1: syz_usb_connect$uac1(0x0, 0x7d, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6b, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 00:13:57 executing program 0: r0 = syz_usb_connect$uac1(0x0, 0xa7, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x95, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@input_terminal={0xc}, @mixer_unit={0x6, 0x24, 0x4, 0x0, 0x0, '>'}, @selector_unit={0x5}, @mixer_unit={0x5, 0x24, 0x4, 0x6}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x9, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}, @format_type_ii_discrete={0x9}, @format_type_i_discrete={0x8}]}, {{0x9, 0x5, 0x82, 0x9, 0x9f, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) syz_usb_control_io$uac1(r0, &(0x7f00000003c0)={0x14, 0x0, &(0x7f0000000300)={0x0, 0x3, 0x1a, @string={0x1a, 0x3, "99ad751d2e2937caef415cc82c1a677abd9c968955407740"}}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) [ 837.591702][ T22] usb 2-1: new high-speed USB device number 51 using dummy_hcd [ 837.854125][ T22] usb 2-1: Using ep0 maxpacket: 8 [ 837.894388][ T94] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 837.984532][ T22] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 837.987377][ T22] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 837.988929][ T22] usb 2-1: Duplicate descriptor for config 1 interface 0 altsetting 0, skipping [ 838.162918][ T94] usb 1-1: Using ep0 maxpacket: 32 [ 838.178877][ T22] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 838.179299][ T22] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 838.179545][ T22] usb 2-1: Product: syz [ 838.179717][ T22] usb 2-1: Manufacturer: syz [ 838.179892][ T22] usb 2-1: SerialNumber: syz [ 838.282301][ T94] usb 1-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 838.283757][ T94] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 838.284941][ T94] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 838.285845][ T94] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 838.286971][ T94] usb 1-1: config 1 interface 1 has no altsetting 0 [ 838.461506][ T94] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 838.461958][ T94] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 838.462280][ T94] usb 1-1: Product: syz [ 838.463173][ T94] usb 1-1: Manufacturer: syz [ 838.463511][ T94] usb 1-1: SerialNumber: syz [ 838.563565][ T22] usb 2-1: 0:2 : does not exist [ 838.632753][ T22] usb 2-1: USB disconnect, device number 51 [ 839.147252][ T94] usb 1-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 839.278940][ T94] usb 1-1: USB disconnect, device number 32 00:13:59 executing program 1: syz_usb_connect$uac1(0x0, 0x80, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6e, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0x5, 0x24, 0x4, 0x0, 0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 'E', "f8"}]}, {{0x9, 0x5, 0x1, 0x9, 0x20, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) [ 840.551421][ T2936] usb 2-1: new high-speed USB device number 52 using dummy_hcd 00:14:00 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file0\x00') [ 840.791860][ T2936] usb 2-1: Using ep0 maxpacket: 8 00:14:00 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x181140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x130) [ 840.912366][ T2936] usb 2-1: config 1 has an invalid descriptor of length 130, skipping remainder of the config [ 840.912809][ T2936] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 840.913418][ T2936] usb 2-1: config 1 interface 0 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 9 [ 840.914132][ T2936] usb 2-1: config 1 interface 0 has no altsetting 1 [ 841.072684][ T2936] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 841.073063][ T2936] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 841.073269][ T2936] usb 2-1: Product: syz [ 841.073468][ T2936] usb 2-1: Manufacturer: syz [ 841.073715][ T2936] usb 2-1: SerialNumber: syz [ 841.092088][ T29] audit: type=1804 audit(841.040:317): pid=10937 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir1867395172/syzkaller.DFBzc6/1458/file0" dev="vda" ino=698 res=1 errno=0 00:14:01 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x181140, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', r0, &(0x7f0000000380)='./file0\x00') [ 841.432141][ T2936] usb 2-1: 0:2 : does not exist [ 841.446686][ T2936] usb 2-1: USB disconnect, device number 52 00:14:02 executing program 1: syz_clone(0x0, 0x0, 0xffffff60, 0x0, 0x0, 0x0) 00:14:02 executing program 0: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) 00:14:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, 0x0) 00:14:03 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSTI(r0, 0x5412, 0x0) 00:14:03 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000001140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 00:14:03 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) bind$packet(r0, 0x0, 0x0) 00:14:03 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x60, &(0x7f0000004f80)={0x0, 0x3938700}) 00:14:03 executing program 0: r0 = socket(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast2, @broadcast}, &(0x7f0000000140)=0xc) 00:14:03 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0xc) 00:14:03 executing program 0: r0 = eventfd2(0x0, 0x0) r1 = dup2(r0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf}, 0xf) 00:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/power_supply', 0x0, 0x0) r2 = dup2(r0, r1) write$FUSE_IOCTL(r2, 0x0, 0x0) 00:14:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/power_supply', 0x0, 0x0) dup2(r0, r1) write$P9_RCREATE(r1, 0x0, 0x0) 00:14:03 executing program 0: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) 00:14:03 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/ipc\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') write$P9_RLOPEN(r0, 0x0, 0x0) 00:14:03 executing program 0: msgget$private(0x0, 0x60) 00:14:03 executing program 1: r0 = msgget(0x0, 0x0) msgsnd(r0, &(0x7f00000020c0)={0x2}, 0x8, 0x0) 00:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/power_supply', 0x0, 0x0) dup2(r0, r1) write$P9_RGETATTR(r1, 0x0, 0x0) 00:14:03 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/user\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') dup2(r0, r1) 00:14:03 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x5, &(0x7f0000000300)=@framed={{}, [@btf_id]}, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:14:03 executing program 1: r0 = openat$sndseq(0xffffff9c, &(0x7f0000000a00), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000a40)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$sndseq(0xffffff9c, &(0x7f0000000140), 0xc140) 00:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_FLOW={0x8}]}, 0x24}}, 0x0) 00:14:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x38}}, 0x0) 00:14:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40104593, &(0x7f0000000240)=""/4096) 00:14:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084504, &(0x7f0000000240)=""/4096) 00:14:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0xf00}, 0x300}, 0x0) 00:14:04 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:14:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x12, 0xffff02c2, 0x0, 0xffffff25}, 0x48) 00:14:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 00:14:04 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, &(0x7f0000000080)=""/62, 0x3e, 0x0, 0x0, 0x0) 00:14:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000015c0)={&(0x7f00000000c0)=@abs, 0x8, &(0x7f0000001540)=[{&(0x7f0000000100)="dbe4ae45267def7366fdaa687180029df8ccaacea769432e00168c422a286128bfabae609a3017a0377737c7b6c089ae59fee2accc65bafcef5b8a8381a91141f9728a09f3b5c5362e1bd8b907a5c1bf83008f732ea404685fd88f8f83662c9ba55fc719b871c4f1f410792b742eea47cbb875e16e0235b1c749d84042f11f8f81a287effe960c8fbaaee8e80b1ed1", 0x8f}, {&(0x7f00000001c0)="395062fd196b0d8f5e5ce41b8877ad6051150f007b8c543f4c458d19933dacaa077b6dd2929e63ca031873bd91b8bb80a7e9091ac93185a30c658b79661cd442eeedc21e5c81f6aa78b47ee8c25f969edd4e3caa62dfb29455312f62b7473a24d6537b3e566ac955cf94a63e0dbb6014222f6979f49d714ef138b9d0b0cb119ff3adb664a12feeab46b0def7", 0x8c}, {&(0x7f0000000280)="fb42690a7d7de8c50db357af25950138fa4f8daf8913e8f2c41a7108ce457f875863fc1b4848f3af0473ca6090b33508ae4311ff7550522596406aad6e5df84c5fd11ea1035e47f7969d8ba0b5c16708a840dc951f4e63086f12626adf423c7f943e35314ba54a6782ad07f9661eab759e1a2dfcd4b8694a6dee85b7b9922fdb0b4454aae2197f8f", 0x88}, {&(0x7f0000000340)="1029e24d80e7406f9b5d0671eb44501827f65dc4aa6e23a56017de0a6c6d09962f32b33a1d3439576f4f9de192edc7058adf0ea64ffa5a0cab99135e96aad898cd44bf05d6bf262a8dabda0c7cebe217fd5073f6a84fda5bac1c8b3403530b543d49c727ca8a2cb2f7f545dd3d0205d041a2225d699133fbb22f543be5883cf84d449eff4887b1b568bf6b90ec9cd630ce67daaac7f639be07c0d648fa4fad8654c6ef36107322fb36e0a45e9b830e6b6b7c1f8e19b6f3698feee8b750d0feb2eaaf0b56c5f62e7887e5325e5d84d9c7b401dd8013b709", 0xd7}, {&(0x7f0000000440)="bf86da4036c822f38e9b3b62410b9aeb4894a5f2062fb10ba8181effa70de3c20ae6842227f62b787815306b7f72f8af4a79571ed6163d3cc587ac4701f8e05f4ffa81656fc547113d297d1f5092a795c9a55445ae4c884ec235dca42338ee7cdf588f7ad5d2245c23f833894bbd0ac40421edf506bdb355bc6d6528d4362b08372f4bc9306f30908e20a0afca482e3fbaeeff076c7e12cf0283a7727435cdc127ca814968914aa8bef6a0587ef51a0fb04be55d3cbae10fa4349e26d5ed5fca9e1e2442cd069386ae15cf9d49b4fd5e2b9f9ecae454c56181504b32a38c752b7d15ad8dbcc73c1b47312e0c64aacd311ed7629680ddaac5fe9452076039f605cdf86c10dc88ed4902157b6244b9642095b24bf5b13f96687316f39e5f5c53e3dff79919bc67c06540b1c66211a7823314307cc58dd4648971c5750189207557f64210f4aa76cbffa4cd30ec2496182fc3586a93c7d9a5894ebdbdbb5582de4ddf3128024da8b3a6fa37d3f7d11f0ca6e529c67e008d8bb78bfe0477ddf6a02343946881cd16e696a33c54a5976f94317a23739ce158658e55388fc4552b5f0c4a275c099d9bb1c50920b7e0cae4856ba2bab8484ff271594f0ef1fb65298f2e6d47f6bef50affa0147bf4c45062993ad71b090659cb57077c5765aaf9f6d188922ef3a91f219d8c884cdb77e59b82ba08ba18b35dfe695e79b1c2610816d9226c035f9f8ecd2248c4471b03bcc9f96295b9944341aaefc8f4ca0cb5204c793b699001f97b0505869f838a169a953cf8427b7aa78427e3dff45a68bacba1956beb64007b77788470df36bba37a1105a8b553c6e9bc5f77a980b7843ac73244d7b59d98a05ce9cc3325891ffec6f06e26e284232e32feb35cbe19377b05b4e1168d6a4ced742b0604cdbc6a83ead6a5ea9c9bb23e970a53ab1d4f84559d77cfe32cfc88e2622869a3b7d257df57fdc129b29e6c0b5625ea74fbe6c4da19b96064c332358d1b744e945182973cb96fee934f5b3cfd7ca960bb0e79a3c8fa7b6bd16923e53a768a5ce5281c0630f227358c7791355f2832f0a00f2fbe4fadb35caa8589048044a8a628551a0941572325896e52619c5970ddc77c626df1f11c939880bafb6249d4309edec467556a1daaa5da075be64d416687d6eab62da210c0ba0def08376ec0422b112266cc6499d2b3424dfa8159213e8204313e1cdc7017d2a02264a271aaa97abffb19c9f32c53d989019349dff2523f4a19287e5b1ad34d1d7b9ee095f264f30d857b492288e8f646092fd9c1d9b577c942bdf4a3602d9c2dac8f5db4630af7794e3ca9ecb6a6923b96904fbb07b2b860758eac61354aa05adaa1bab309cce5accede96fa2560458e89b1351ba72cda9356fa753259933228b7dc0914633f03f7621e3a388eade6f4ddbfc692dc18b21db7e15c5b52347fb4d39bd2fad9f7f9c0c7108933331eff643dd25473b601f53746156f6ae65193d1641056a65811f2427027bd538b576bb489c1552da0dcacf5436e614c3ca63dd3ceb07b07eacdefd4b1629cc925cac87525a36635d81fbcdcd3836fe33ebc3eb7a2ed894f7b6903c92035fbe5d6d2ad8c3465a64d61729e44cbb13a156d67bc6a8bfa0e4fe578f1c3d430c214971215c99822220879d2584e764047eab8f4d45a4785a652454a94ae85e63806a808e3f0f3964cbc2c0d8aaefe8803db308d5c30d337ec39883bd8427f74549ccf5b2c257e09d3b866658bfee34ae34bdc3cedafda76266121abf996fdd9e44cd84430cddaf67414670f5d527cb8bcb10871d9e27dbf22eefc7fcf85759738591c7be71e21def1f8e54ef2e084a12a429397e23299cbedc9c14a5377ce82cede597aa1ef0d628c0006141f6be5392139bf5cc08e99c337df8a8604c9fc73618881c81dcf092dd8adf78bdd1f93010f4f26cf505279a6e80edb0174d6e614db9209c82a90183e46fa2c42e66536112718796e52678896af7b7e005162ac211b57c01241c3c5714750b66d4fdc7902d3d2d4521f04d1d091e34ba4e37ab443a5e0bc6b362255c8dec890c84fc6eda2c3a81d7ba805559607f665a6cc86c8c77b2f2e0a175dc31d17df8bc886f26afecf6e6f1d79a8c35f9fc51d5a73107a2d6c6c33d283f7dfb438ff1798753c54f27c45797571dc5d37aad71e5e88ab8f25a573589bad7073cc7b29a0b4df451322f96da4bdd6c1bfdb92fac4cafac1be1b9c4fa2d9266be4cfe694f59cdda97244b527718ca259cb1776f03f0a0c828a1f72afe6a6519d4d5f5614f73ca3bcaa59cfb3bd017df16adb28b2a4f14ba42f1c35426e26338e24ce199e10d138baeb557fc2e49d998fa16fe49f0b1e85578df465b26fe422dc29ddc44f572bf594d10d6d57fdfde610744079321ea542013e16cbf89d9dc745a8370569020780b7fe2426e39dfb23d80fdf175a3193926ffbe887997bca07dc6bfbe4696904ea983702dde996ea75a357d26dfd577d8b5a222d12678085e612cae667189775a8e951c1172460072dca7c85077e4aab47fb228cf8254d5d666573aaf4d6e4a90d87339200d600b4cc81a85f05036579f65fb967bec9c9d1e355cb9394f9604fc9de0ba266788c8f8900e20a310840ef32db8356908e6ca1597d4f402cddff9d5d883a47d17b21c089ce5d6f4d5293c7c11953e2b3eb2fa41f9fd05bd30d0197d1d046595ec9da5059cd591197dbe96448063dba33d93c868ca7f12e6febb42a8a6a91ae2d250f2f72bba061bc4ed55bf4f2083296ef201bccef3d4dee70bdfbc4d5024e65f2c7eeef41eb9046e16a77dd67cbdab630abc88b3b1755d9449d18f9c98122000007ce328f731a766269ba6697b9525a9efcd8ae3a159e23236ba759055df500e7b9a08ab8e25bcab2bc7af05d2df6a2d390972a83925b4e97479972349de53515a1f663bbfc7aa05a7cb130d54fafc22ee11812909ebf3e91cceb6b615e88d62ee64279a6b46a58b153d460430b780e9a4b0f8668b51b0a48a1b62b87cdff9c0904dd7eb7b5f9184b3b8748ecaee0ba2a16ce30fc9bd899ee06730cd43b4c5057a80566df7b625698d8fb5990ebe2a900a200bb3d9d40a58d77c70dbb4af3e2a565dfdf58be671eaff5c0ad158a035e14cb61cdc01af675b48b79179f4bd7e553f09e0c37cb6500926109a0f4f23791d318fb7c130f052f56b2a332c9bc4b9c9bcd44582dabfbf5e562226f86bde6d56fe429aa5b6d376acd8d5f4e37a427aa579ce2e8227b8ed141c8ada8971b29ed9e8481e632efe8c5cdb93d31ef8153d93fceb4703962a9b57f2bd9096e1c257eb0e0a9d3ceb7e0e40a5e674967d72d98591956bb69620bbd960e57468d8e71f056b3cd55448d1b83ef27fcbeb104229d6fa278d903eebc9954f4e8b14e14c625e9676a42f161aad0fcf4480e7c7eaeb6bbdfe24fd95ca0dcff67fdd3c53cfa1619298b5b31720f5bb6e7a1d96533515a36902c019e47ce49e67caaa29011da814e47bf5d2f98ea451d4c5249e85c5c7f7fd454302b306848097b4d936b82fec215f7103ddc929e73012a33d9e64e50006b2371c8d624a7e018bafbaa6f83f025d92159ec4a5c1be7a910ec8c0034eb0be59f57e54abc29864029825156693a17ca7369d1267069fe8e3d8d83abe6801bb48c73c2d2c336c9304496a4fdc9388485085af0878f3ced529824a28a901d26867f133846e92e424ec4c4fe03ba31cb9431c791d008862f283e675da4828e58aaf73d8537a057ce3f6a175aeba7a7f62e06ccfb6c5e3c54e0ee661d4f3349dbc7dfca263e6c02044dae251e5d2b41dd97d3f172ee989b32a8ebd35e314e1229fc5ca3320f9ccbc1af8a48e4e5dd42eba6451794b7b95116ea9ca7317090aee4852bc6761229b03681a5953ef7c81786954e0551cb03c9574f7c8822ceb8d2566b1a5defb83fe8374bfc84c3c5c8f751a36cdfae6516ca3457dfc8b6f46265968ab801b2aab27acadd69bd01170493ffd6466d17004132dd12ba41219d2e4f8d07687fa09c8b70fc6098dd8175e3775433b00887d2d7f28c7cd37660604965d351ca60879b838421507407ab6070668d0bb0296fa57e54fcd0ae13fca32b658967771aea0c5fdac7f7d6e7ff78cd702ddd2bdd7075206625877d9c06db3f81e6c4e276055e1614bc7fbaf8d43a75b2fabc70b399dd1f510c62b4f78df58ac49af6ee8f5bd5fa563240003260eda33f69ddcab2e7c02b1fbae8ab48f9e9087bb18e1e1f1a827453a60ad34ef64636b6974cf06eb8d8bcf9ad2bcab411bda57fd265789ddead6cdfc9bf4c504d5fc8ceec80f7768f62c89a9f1eecd6e9f617232ee2cf6e7ef53460b1b0018259c8cfe4b4dd4916304a95f798172fb2a55e738312d42b769847698a3b595f4dada39cf0648517a65c333bfe71279372c3cfc6e3e378a478dfac79b70b47777de6e3516e3ff5abb6aae3b66a2e313d0108e04c7c4b2d6295742ccf04942552006a66dd422ffcd148405a765d6804855992e6f9e925b950edaf33abea96691e219ad014c306ef1fd2fd949b046654a45d8265579b3979cfa9f9830b619fd027b3fb47275659ccbe7f60645c297f70a85dd6e37cfbe9611b50e98818fa5f25000534a190fea9b75a1a8b79bfc8349471f09e2a8f127d771716ad24dac1465b50e8123dfe8317a657eb8b77499e88b592ab829c71f2cb48232a862b2d89492a66d1bcc738", 0xd0a}], 0x5}, 0x0) 00:14:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000000a40)='g', 0x1}, {0x0}, {0x0}, {&(0x7f0000000c80)='@', 0x1}], 0x4}, 0x0) 00:14:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001e80)=[{0x0}, {&(0x7f0000000ac0)='4', 0x1}, {0x0}, {&(0x7f0000000c80)='@', 0x1}], 0x4}, 0x0) 00:14:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@base={0x5, 0x0, 0x0, 0x0, 0x800}, 0x48) 00:14:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000280)=""/194, 0xc2, 0x842, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000033c0)={0x0, 0x0, &(0x7f0000003340)=[{&(0x7f0000000140)="a0594112a3b55db1f69f7aeba0a6e7374f7f72c461231fdbf336b04fb6b3e59ad85f7384f27efd68258eef04eb7fc5cbc80d2089e0ac503f833e85da1bb215f06099e446b14337b2947c47d5916bc20154fd600c6b184ea10fbc479090f08bd913a90eb580cd7552f8ed5eec8db15150ed59072437f73b959170a020026e73d0d08208b47d1ca19ee6046f1e0a4188e3134dec1b372715dd3d81179248b9e0ec5b71edbc2e6e", 0xa6}, {&(0x7f0000000200)="496a7abcbdc2811ec91b88e3c936fff0b517f824f1b9ff17b89caa50d4", 0x1d}], 0x2}, 0x0) 00:14:06 executing program 1: bpf$BPF_PROG_DETACH(0xe, &(0x7f0000000000)={@map, 0xffffffffffffffff, 0x0, 0x2010, 0x0, @link_id}, 0x20) 00:14:06 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)=@generic={&(0x7f0000000900)='\x00'}, 0x18) 00:14:06 executing program 1: socketpair(0x10, 0x0, 0x0, &(0x7f0000001140)) 00:14:07 executing program 0: bpf$BPF_PROG_DETACH(0x2, &(0x7f0000000000)={@map, 0xffffffffffffffff, 0x0, 0x0, 0x0, @link_id}, 0x20) 00:14:07 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 00:14:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x414d6714bf78e135}, 0x9c) 00:14:07 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:07 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:14:07 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x200, 0xa000) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) dup2(r1, r0) 00:14:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000440)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS]}, 0x33fe0}}, 0x0) 00:14:08 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:08 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x2, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 00:14:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 00:14:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x2, &(0x7f0000001300)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000001340)='GPL\x00', 0x0, 0x20, &(0x7f0000001380)=""/32, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:14:09 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000500000008000200000000"], 0x30}}, 0x0) [ 849.359844][T11056] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 00:14:09 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(0x0, 0x0) r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) pidfd_getfd(r0, r0, 0x0) sendfile(r1, r2, 0x0, 0xffffdffa) sendfile(r0, r1, 0x0, 0x800000a1) 00:14:09 executing program 0: syz_emit_ethernet(0x6b2, &(0x7f0000000680)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 00:14:10 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:10 executing program 0: mprotect(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@remote, @remote, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @broadcast, @local={0xac, 0x14, 0x0}, @local}}}}, 0x0) 00:14:10 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) poll(&(0x7f0000000100)=[{r0, 0x80}], 0x1, 0x0) 00:14:10 executing program 0: timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000bc0)={0x2020}, 0x7ffff000) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x8881) getgroups(0x1, &(0x7f0000003480)=[0x0]) stat(&(0x7f00000059c0)='./file0\x00', &(0x7f0000005a00)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) sched_setscheduler(0x0, 0x0, 0x0) 00:14:11 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:11 executing program 0: r0 = socket(0x1, 0x5, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/67, 0x43, 0x0, 0x0, 0x0) 00:14:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000340)=[{{&(0x7f00000001c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0xfffffeff}}], 0x1, 0x0) 00:14:11 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:11 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:11 executing program 0: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x4044854, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 00:14:11 executing program 0: prctl$PR_CAPBSET_READ(0x17, 0xfffffffffdfffffc) 00:14:11 executing program 1: r0 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:11 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r0, 0x10, 0x0) 00:14:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000600)={@dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1000000}) 00:14:11 executing program 1: r0 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x89a1, &(0x7f0000000600)={@dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1}) 00:14:11 executing program 1: r0 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:11 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r0, 0x2}, 0x18) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890b, &(0x7f0000000600)={@dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 00:14:11 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r0, 0x2}, 0x18) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:12 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r0, 0x2}, 0x18) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:12 executing program 0: socket$inet6(0x64, 0x0, 0x0) 00:14:12 executing program 1: r0 = socket(0x0, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8918, 0x0) 00:14:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x33, &(0x7f0000000140)={@private0}, 0x14) 00:14:12 executing program 1: r0 = socket(0x0, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') read$eventfd(r0, 0x0, 0x0) 00:14:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x49, &(0x7f0000000140)={@private0}, 0x14) 00:14:12 executing program 1: r0 = socket(0x0, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newtfilter={0x24, 0x2c, 0x7fb944fd59d0a3b1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0x5}, {0x0, 0x7}}}, 0x24}}, 0x0) 00:14:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='schedstat\x00') read$eventfd(r0, 0x0, 0x0) 00:14:12 executing program 1: r0 = socket(0x1d, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0xd, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}]}, 0x34}}, 0x0) 00:14:12 executing program 1: r0 = socket(0x1d, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000000, &(0x7f00000001c0)=ANY=[], 0x1, 0x522, &(0x7f0000000f80)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 00:14:12 executing program 1: r0 = socket(0x1d, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:12 executing program 1: r0 = socket(0x1d, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) [ 852.944084][T11139] loop0: detected capacity change from 0 to 512 [ 852.963696][T11139] EXT4-fs error (device loop0): ext4_ext_check_inode:520: inode #15: comm syz-executor.0: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 24833, max 4(4), depth 0(0) [ 852.968470][T11139] EXT4-fs error (device loop0): ext4_orphan_get:1397: comm syz-executor.0: couldn't read orphan inode 15 (err -117) [ 852.970536][T11139] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 00:14:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x44, 0x0, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x8, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}]}]}, 0x44}}, 0x0) [ 853.003234][ T2989] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 853.080376][T11141] can: request_module (can-proto-0) failed. [ 853.092549][T11148] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 853.094522][T11148] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:13 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:13 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) [ 853.262429][T11151] can: request_module (can-proto-0) failed. 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:13 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) [ 853.429773][T11159] can: request_module (can-proto-0) failed. 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:13 executing program 0: r0 = socket(0x0, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 0: r0 = socket(0x0, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:13 executing program 0: r0 = socket(0x0, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:13 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 0: r0 = socket(0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) bind$can_j1939(r0, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 0: r0 = socket(0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) bind$can_j1939(r0, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) bind$can_j1939(r0, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 0: r0 = socket(0x2, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 0: socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 0: socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:14 executing program 0: socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, 0x0, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, 0x0, 0x0) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, 0x0, 0x0) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004b80)={0x10}, 0x10}], 0x1}, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, 0x0, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, 0x0, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, 0x0}, 0x0) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, 0x0, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, 0x0}, 0x0) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, 0x0}, 0x0) 00:14:15 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, 0x0}, 0x0) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, 0x0}, 0x0) 00:14:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00') pread64(r0, &(0x7f0000001340)=""/140, 0xfffffe12, 0x4000) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, 0x0}, 0x0) 00:14:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x10) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)}, 0x0) 00:14:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, &(0x7f0000000200)) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)}, 0x0) 00:14:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f00000014c0)='./file0\x00', 0x0, 0x1) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)}, 0x0) 00:14:15 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{0x0}], 0x1}, 0x0) 00:14:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000380)) 00:14:16 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000900) 00:14:16 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{0x0}], 0x1}, 0x0) 00:14:16 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x2}, 0x18) sendmsg$netlink(r0, &(0x7f0000005780)={0x0, 0x0, &(0x7f0000005600)=[{0x0}], 0x1}, 0x0) 00:14:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000001200), 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000001240)) 00:14:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x24, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x20, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}]}]}]}]}, 0x44}}, 0x0) 00:14:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x1, &(0x7f0000000800)=@raw=[@exit], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:14:16 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 00:14:16 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4100, &(0x7f0000000240)=ANY=[], 0x12, 0x4d8, &(0x7f0000000540)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFSUUID(r0, 0x40246608, &(0x7f0000000000)={0x0, 0x0, "a2b281bec60a378f0bf1cbb3754b08da"}) 00:14:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:14:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x3}]}}, 0x0, 0x26}, 0x20) [ 856.644819][T11303] loop0: detected capacity change from 0 to 512 00:14:16 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) socketpair(0xa, 0x0, 0x0, &(0x7f0000001780)) [ 856.792919][T11303] EXT4-fs error (device loop0): ext4_validate_block_bitmap:438: comm syz-executor.0: bg 0: block 64: padding at end of block bitmap is not set [ 856.812448][T11303] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6628: Corrupt filesystem [ 856.832488][T11303] EXT4-fs (loop0): 1 orphan inode deleted [ 856.833884][T11303] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 00:14:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x20, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 857.084475][ T2989] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:14:17 executing program 0: bpf$PROG_LOAD_XDP(0x3, &(0x7f0000001a00)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xe0) 00:14:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newnexthop={0x24, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x1000000}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8}}]}, 0x24}}, 0x0) 00:14:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newnexthop={0x18, 0x69, 0x1}, 0x18}}, 0x0) 00:14:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newnexthop={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0xb}}]}, 0x24}}, 0x0) 00:14:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)=@ipmr_newroute={0x1c, 0x18, 0x1}, 0x1c}}, 0x0) 00:14:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000001600010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="14000a00000000de"], 0x2c}}, 0x0) 00:14:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) [ 858.312122][T11329] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 00:14:18 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg$unix(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x2040) 00:14:18 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000005ac0), 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 00:14:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x10, 0x0, 0x0) 00:14:18 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000005ac0), 0x0, 0x0) connect$unix(r0, 0x0, 0x0) 00:14:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@raw=[@map_idx_val, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:14:18 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x3ec, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:14:19 executing program 1: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1000f0}, 0x20) 00:14:19 executing program 0: r0 = socket(0xf, 0x3, 0x2) getpeername$l2tp6(r0, 0x0, 0x0) [ 859.234141][ T29] audit: type=1400 audit(859.190:318): avc: denied { getattr } for pid=11344 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 00:14:19 executing program 1: socketpair(0x29, 0x5, 0xfffffffe, &(0x7f0000000000)) 00:14:19 executing program 0: semtimedop(0x0, &(0x7f0000000180)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f00000001c0)={0x0, 0x989680}) 00:14:19 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) ioctl$FBIO_WAITFORVSYNC(r0, 0x40044620, 0x0) 00:14:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x1ff, 0x2}, 0x48) 00:14:19 executing program 1: ioctl$IOMMU_DESTROY$hwpt(0xffffffffffffffff, 0x3b80, 0x0) pipe2$9p(&(0x7f0000001000), 0x4080) 00:14:19 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f00000026c0), 0x2) 00:14:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:14:19 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x32, 0x0, @remote, @broadcast}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}}}}}}, 0x0) [ 860.273099][T11363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11363 comm=syz-executor.0 00:14:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x4, 0x7503, 0x1ff}, 0x48) 00:14:20 executing program 0: syz_emit_ethernet(0x12, &(0x7f0000000080)={@link_local, @dev, @void, {@llc={0x4, {@llc={0xd4, 0x0, "cb", '\x00'}}}}}, 0x0) 00:14:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0xe}, [@RTA_OIF={0x8, 0x4, r1}]}, 0x24}}, 0x0) [ 860.807328][T11369] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 860.807923][T11369] IPv6: NLM_F_CREATE should be set when creating new route [ 860.808426][T11369] IPv6: NLM_F_CREATE should be set when creating new route 00:14:20 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 00:14:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000240)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000080), 0x88) 00:14:21 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f00000037c0), 0x0, 0x0) 00:14:21 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 00:14:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000040), &(0x7f0000000100)=0x90) 00:14:21 executing program 0: capset(&(0x7f0000000280), 0x0) 00:14:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000ac0)=[{&(0x7f00000008c0)=""/39, 0xfffffffffffffe55}, {0x0}, {0x0}], 0x3, 0x0, 0x0) 00:14:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) 00:14:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/ldiscs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000ac0)=[{&(0x7f00000008c0)=""/51, 0x33}], 0x1, 0x80000001, 0x0) 00:14:22 executing program 0: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x42) 00:14:22 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) fchmodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 00:14:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) 00:14:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x10, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:14:22 executing program 1: getgroups(0x2, &(0x7f0000000080)=[0xee01, 0x0]) 00:14:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001a000100000000000000000002000000004d0077cd98"], 0x24}}, 0x0) 00:14:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0x8) [ 862.822213][T11401] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 00:14:22 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x240, 0x4) 00:14:22 executing program 1: r0 = msgget(0x0, 0x238) msgsnd(r0, 0x0, 0xfffffffffffffe78, 0x800) r1 = shmget(0x2, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) msgget(0x2, 0x68a) shmctl$IPC_RMID(r1, 0x0) 00:14:22 executing program 0: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) fchownat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x1000) 00:14:22 executing program 1: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') 00:14:22 executing program 0: r0 = openat$urandom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)) 00:14:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) 00:14:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f00000001c0)={@val, @void, @eth={@broadcast, @random="813776b00550", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x32) 00:14:23 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000240)=""/4087, 0xff7) 00:14:23 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/4087, 0xff7) 00:14:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000180)={0x18, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x4}]}, 0x18}}, 0x0) 00:14:23 executing program 1: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) 00:14:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000540)='syzkaller\x00', 0x3, 0xa2, &(0x7f0000000580)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:14:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)='A', &(0x7f0000000100)=@udp}, 0x20) 00:14:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'geneve0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="2000000010000104000100000475000000000000", @ANYRES32=r1, @ANYBLOB="c2"], 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x48, 0x0, r1, 0x22a0b}}, 0x20}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:14:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0xe}}, 0x0, 0x1a}, 0x20) [ 863.642396][T11437] geneve0: entered allmulticast mode 00:14:23 executing program 0: bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 00:14:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002c80)={&(0x7f0000001bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 00:14:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000340)='syz0\x00', 0x1ff) 00:14:23 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40202, 0x0) 00:14:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000340)='syz0\x00', 0x1ff) 00:14:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000340)='syz0\x00', 0x1ff) 00:14:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000340)='syz0\x00', 0x1ff) 00:14:23 executing program 1: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, r0+60000000}, 0x0) 00:14:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000340)='syz0\x00', 0x1ff) 00:14:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = dup2(r1, r0) sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0xffffffffffffff2c}}, 0x0) 00:14:23 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) 00:14:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005f40)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x800}, 0xc, &(0x7f0000005f00)=[{&(0x7f0000005f80)={0x808, 0x2e, 0x0, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0xd9, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="c1730bcf2abde65f5177f8e13c193bda5d163ad2067d8a1ef7a5cebc76ef419b603016e84e102ba1b180c9c2880b8b1817af7fc8a24a16dbc7dff2e27d50dfef4e3bffdb5067debed04635306bb069bc1b3d8779e550f226a17f1e4c427aaa06acada38d49185056cfe9c2e1499211ece5d65adae8051c537d890429d8c36834426552aadcac79b145955c41a34c61d11445b7cbbc84809c49e0202589969f53a37ead3f72f5e307ed06bcd72f70e8a952211a603d7ac8024c913fe8d1371b386b77b093a1c3392372686fc8a8"]}, @nested={0x241, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="51fa81cd8f55971514bdd75438b4e5085bec94ae4c80980ec5236119ee1a7c63c44ac7d15d48e9e227ec89a97a5e499f7617356cf23f5bb8089e4d4653e223b49dbac452f2cfe2d7eb315e69785ed088840729ed7b8e9ccb57f1d2c4f6f47eb791e29bf8f5e6e0ab4fc1ab4eb7729edac6b53cb73b7993f10d58efab3f6351cb441af2ddf275f3442e66c74004e1115be672c20497bd5208131bc0b25bc1f4716179ac5b217b83ad37fd", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="f4face0e05234a7de8f3897c3d806780c64db0e967e1d10ab915f70571749b693fa0bf0ab8f45215ab3b9a6b68a2680a65c7b7ed3fb6f696873e47039391b88fb99135a21ff341e8ad9260c342cd0b64c42c0bafadca2f0a9bec4dbe6d9efe14de91630e1bedcad4dd222d39307fe1f8ba2f9a28e0f5eb96f85d8a5def94e6e93c25fe1031b4177477d5aa68e0fe2fd577db63dd5d5ef04b363fa6abed846bbf98a72101ee22a306", @generic="1859e16fac40e2d95eebf89a86c5b659ec7a7a7e91ad09ea97bb03ce7791988fcdc314d679ca36092087bb09337953a6092c7d76f2e2b662da1e6e7d4d1daf", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="bcfd3df21802990d32dfcae7cf9679ed5b489df58394a02d0a8798b7d7963673cbb073e2f79fec51df5a79b8bdbd2ac33491b8bb49eea0ec15444ee2bcaa5d132ee20358679b83ffcf5015382c027255c7a88ae03b50110d02b5c3ef6cb233c886dc3a18b4ee0e681fab18c6162a23a2f7ec25e60c489addcdd2431a1c2c9809f088213369e10342ac73c21d"]}, @nested={0x20d, 0x0, 0x0, 0x1, [@generic="f67ce485b4d8de2c80a1ce54bb68c5d9a4737daf7cee83d0ef87f0a3043bbbfa5ec7bc469da8b2c9f7ceaf9881d9", @generic="eff7a961aff16fc1b7ed51976c115a2a5cedeba6da4b0efb035c2b913a8ae6ef51b33fe6e2475cf9dcb97ac4c3a47a5dcb0cda33c9efd7c0722b1b064433d61ccb8864e042f9b5786cacf4a666228b094a2062be074d25906a76d8cf93d2c89d99e8f21de58eb50b9f4aa8ff6da00cd47ab12f8c3de0ecda36cd9cd8e98f6f08b51337efa0b73eebb3ed547e79c4f90a32fa107878122572d3c5cd4e8e6a358a3c1d9c9aa957e7f42eabf380dcbb145867d635dc964901d021a6b3028036dca8e1d41ad7c0e71fa971b1e597d364027cae0bf87d8803987c3a680336c0727af2228893337e08e9c76cef8dc25966d9b735d68cca69b857ae", @generic="d4841db3b58d61e426939448c255590c8815bfed601eee07db15c665e697615531969be7d205bfcb4805", @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}, @generic="76cc189580c2c48425b52020e311714611fb79b7ba3c9c55405440ea7910819fe31080054c0ac5aa53fcc3108c63dcd2ba0d1d7ab5d4789af81c98836c086d374aed5024604de75992cfa0f4eddeaa57ee4cfa865d44abc8a1abe86bc01607a80774f2d7d526220d207390674b1d3adf931afdd3db5573d11692996a6d4e054bbfc293c947ce1898533fe848bac43f8744f5b0b4e7e99c2f7e2060bf26"]}, @nested={0xa5, 0x0, 0x0, 0x1, [@generic="512015886e014c4b4e07cf1991bcf27d441fe066d2fd474afe1fdee14f15b12f8556904089ad80a0d1f0e8f0beff45a582cac745854050a8da8b9298710008d7c04d207957ffefee535a1d95637a599fbea57b899fefc2d8ed5e86ca1172cf7fc72b92008bf2f91e2b12ea59f22b5ded014243ab1c443733d4e0ff48a517c88ec0da2266e0fd1fccc5e63288213ede5a8c", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @nested={0x209, 0x0, 0x0, 0x1, [@generic="83b78e9e64f6ad92f7a6c737d0e1266bd5afb5c7b2a4589cb9fbd8dcc3b57c83c98be46e6d268b54bb47c49163b78b73a427314b39138f6570ddef4bbdfd45efa2b0da75d5a532200d8fa190187686421377f45c444c0f4df199a4bbb47bcf16cf1152d228346293e6c81566f8432bfa1b35870c85fb0ea1bb", @generic="175e92e3a557e85cb88c35d2e01e2f3143a6d24f617343c8df6365f39457366ab2e1f7b0e2eda2571603e2f360a8e94df6e9036aefb9e6a6711fdf4485a99ec4bcf5129075f60028da2a3b196a74e82aed82451ed74b5a283c195b9a7c58b7d7ceab8b2e8900f9aff27499742a79e0f3cf2a8f98d8d14b84b89a9b9a0470210d9d0340f1fa72f7ad4f49a8fc336782ca95c6173510cdb95fc00aaaaf122d827019a4fbfd2cbcce5e396489ef701dfe548bceadf90bcd2461a9d529c1142dc1b7b4eb4bbef2ac11f8b829a052bed7b6a680948910595b0788888acf06a42a43561e7a5bacd6a7c0b6b19e599762b18704d9a283aa2b9577396a", @generic="2981b0e86cb70e7400e7cdcc472f0227b761dab28f8a12c0ec2ba69dead45e0978136fe971e811977ac6e9e13eab7bfb73571bbb8f68011793f35ee968127d9aae9d443f8e4a2aede3003b858a829fe591906f4817b8b8221cd8d3d3e2e747b5ce3eec8222091bc98adfb89173296a80faca40116a9d4c7f1c67ab509e3f6e20d16e24a9957b12fb59eed9f48b2d8c72702b92"]}]}, 0x808}, {&(0x7f0000002a00)={0x167c, 0x25, 0x0, 0x0, 0x0, "", [@generic="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", @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast2}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @typed={0x1d, 0x0, 0x0, 0x0, @binary="7665497a9349dc5af198acbdf428ee9c1737a3a4155ca40604"}, @generic="b5adb7b718ba80778417737f06c85bf3873fa13fcfce04984bf3b964727429a33111388bbca1ded5a2a4f2754dd2b8b8bcd9deef8b6000838b32dececd582c4e3856d88376f3df0640c0ea29fc56e53bd41d4fb1eb3e0735d3bdf9963344ff0317", @nested={0x5c1, 0x0, 0x0, 0x1, [@generic="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"]}]}, 0x167c}], 0x2}, 0x0) 00:14:24 executing program 1: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x6}, &(0x7f0000000140)={0x0, r0+60000000}, 0x0) 00:14:24 executing program 0: r0 = shmget(0x3, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ff4000/0xc000)=nil, 0x5000) 00:14:25 executing program 1: mknodat$null(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x103) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r1 = getgid() fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r0, r1, 0x0) 00:14:25 executing program 0: mq_open(&(0x7f0000000000)='\t\x16\xb8p\x00]Y1\xdd\xf6\xca\xa2\xa6\x1ba\xea0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) sched_setscheduler(r0, 0x3, &(0x7f0000000100)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) creat(&(0x7f00000004c0)='./file0\x00', 0x28) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r5 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r5, &(0x7f00000007c0)=[{&(0x7f0000000040)="3f9ebe239545703482cbae9a17ba12fc50ab1b6e3e", 0x15}, {&(0x7f0000000700)="7fd895b7394a24909e3ef63c0ed6366f4a98c38f4c9843245642e011281e192428a3e6eff2974f0ef41dc5d3878b6bfca03ebf75b5c105407e91198c558f98cede4c46c336575976f8d11fb6d6cf51a0b271d87b39e14da839d0b1a51491311dc6b0e1c2c9f9c9e46bdeb56b6af6fc8d9c3a1202e27768b8aab1baac1532cc315708bc68e692ba2e95e472e0356c93e012a50890fb461de628e66c34e653a46e80", 0xa1}], 0x2, 0x81806, 0x0) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) 00:14:25 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 00:14:25 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x350, 0x1c0, 0xffffffff, 0xffffffff, 0x1c0, 0xffffffff, 0x2b8, 0xffffffff, 0xffffffff, 0x2b8, 0xffffffff, 0x3, 0x0, {[{{@ip={@multicast1, @broadcast, 0x0, 0x0, 'geneve0\x00', 'bond_slave_0\x00'}, 0x0, 0x98, 0x1c0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:random_device_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) 00:14:25 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891d, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) 00:14:33 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/user\x00') ioctl$NS_GET_NSTYPE(r0, 0x10, 0x0) 00:14:33 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/user\x00') ioctl$NS_GET_NSTYPE(r0, 0x5460, 0x0) 00:14:33 executing program 1: fanotify_mark(0xffffffffffffffff, 0x2, 0x40000010, 0xffffffffffffff9c, 0x0) 00:14:33 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8937, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) 00:14:33 executing program 0: socketpair(0x6, 0x0, 0x1f, 0x0) 00:14:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x121, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) 00:14:33 executing program 0: renameat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0/file0\x00') 00:14:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x101, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) 00:14:33 executing program 1: shmget(0x2, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) 00:14:33 executing program 0: chown(&(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 00:14:33 executing program 1: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x20048895, 0x0, 0x0) 00:14:33 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x4, 0x4}, {0x4, 0x7fff}], 0x2, 0x0) 00:14:33 executing program 1: chown(&(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) 00:14:34 executing program 0: renameat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, 0x0) 00:14:34 executing program 1: mknod(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) 00:14:34 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4) 00:14:34 executing program 1: ptrace(0x8, 0x0) 00:14:34 executing program 0: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getflags(r0, 0x11) 00:14:34 executing program 1: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x14000810, 0x0, 0x0) 00:14:34 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) 00:14:34 executing program 1: open$dir(&(0x7f0000000000)='./file1\x00', 0x280, 0x1a7) truncate(&(0x7f0000000080)='./file1\x00', 0x10000) truncate(&(0x7f00000001c0)='./file1\x00', 0x80000) 00:14:34 executing program 0: connect$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x2, 0x1}, 0xc) 00:14:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x63, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 00:14:34 executing program 0: setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000140), 0xc) 00:14:34 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) 00:14:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000014c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000001500)=@abs={0x1}, 0x6e) 00:14:34 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f0000000140), 0x10) connect$inet(r0, &(0x7f0000000080), 0x10) 00:14:34 executing program 0: chown(0x0, 0xffffffffffffffff, 0xffffffffffffffff) 00:14:34 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000000)={0x19, 0x0, 0x3}, 0x0) 00:14:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000096c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newtaction={0x64, 0x1d, 0x1, 0x0, 0x0, {}, [{0x50, 0x1, [@m_vlan={0x4c, 0x0, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) 00:14:34 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing', 0x183000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:14:34 executing program 0: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x80, 0x0, 0x3c) 00:14:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x21, &(0x7f00000000c0)={0x2, 0x0, @private}, 0x10) [ 874.868293][ T29] audit: type=1400 audit(874.820:320): avc: denied { read } for pid=11568 comm="syz-executor.1" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 874.870464][ T29] audit: type=1400 audit(874.820:321): avc: denied { open } for pid=11568 comm="syz-executor.1" path="/sys/kernel/tracing" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 00:14:34 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "0cb7e4", 0x8, 0x0, 0x0, @private0, @local, {[@routing={0x0, 0x0, 0x1, 0x1}]}}}}}, 0x0) 00:14:34 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "0cb7e4", 0x8, 0x0, 0x0, @private0, @local, {[@routing={0x0, 0x0, 0x1}]}}}}}, 0x0) 00:14:34 executing program 0: openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x1200) 00:14:34 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "0cb7e4", 0x8, 0x0, 0x0, @private0, @local, {[@routing={0x0, 0x0, 0x1, 0x4}]}}}}}, 0x0) 00:14:35 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop0', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:14:35 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "0cb7e4", 0x8, 0x0, 0x0, @private0, @local, {[@routing={0x0, 0x0, 0x1, 0x4, 0x300}]}}}}}, 0x0) 00:14:35 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0xfffffffd, 0x4) 00:14:35 executing program 0: setresuid(0x0, 0xee00, 0xee00) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{}]}) 00:14:35 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:14:35 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing', 0x0, 0x0) 00:14:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x30}, 0x20) 00:14:35 executing program 0: syz_emit_ethernet(0x11, &(0x7f0000000080)={@broadcast, @random="6c7621d7cc94", @void, {@x25}}, 0x0) 00:14:35 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x0) 00:14:35 executing program 0: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xd, "28391d68435c86be7d6a71d76f6c58ad60437e"}) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e1d113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) io_submit(r0, 0x1, &(0x7f0000000ac0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}]) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) 00:14:35 executing program 1: socket$packet(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000bc00000095000000000000003d789ade838a5ad00c21573d9f5ec0798d497a5d0ab93dbb1df77098cac396739a7e7d4ecd279fcafbb3069de877bb57b6111b5d6f597206f0902cf2c1d66e1ef4ea6deeaf8739f04831630ee05dcc2bf595f13f6f501e8b53bff400000000000000004130fd875789e46307b8f29cfe149360bea59a42011aabc5001093a06d23b6cf4f033c6000c3ab63ee036fe7023574b86ce453bc8964c32f955d4100005b08f7567764f92e16938155e303f9a78644e801f101000000a5ddd62c7addb24fcc053a230355cee250cb376879ae14b9e1ab98703b1fb0a4141ae3c08d264831d0f6365469c3562185000000000000000057bfcc8cb605561993f8e731123c08e5830672a8ebeabe99826e328744cdf5c88e0cf4cecae5fe2e319c8ca049ee7f08b40dd9c6b74349d82a153a3307adec5841242358380001264a375046c83de95ebabf46f181db8edd5b2309d2b55a2f9565d9d7bd34c5c43f035e94051617716de2035ecbcf5eff4df25681f7007a00b7f00329c70eaff5347e6ea860ad4d421096c38f85f0e8007ab937b749401d9c11278bb38e6147bed71d31919043af34712653b5f9c852649f66902cbb25edbea0"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:14:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x84b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) splice(r4, 0x0, r5, 0x0, 0xf3a, 0x0) splice(r1, 0x0, r5, 0x0, 0x78, 0x0) write(r3, 0x0, 0x0) 00:14:36 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x9, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 00:14:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000040)=@ax25={{0x3, @null}, [@null, @bcast, @netrom, @default, @default, @rose, @netrom]}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/39, 0x27}, {&(0x7f0000000980)=""/166, 0xa6}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000880)=""/206, 0xce}, {&(0x7f0000000a80)=""/177, 0xb1}, {&(0x7f0000000b40)=""/152, 0x98}], 0x3}}], 0x1, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x54}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0x53}, {&(0x7f0000000fc0)=""/4096, 0x51b}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 00:14:38 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x9, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 00:14:38 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x9, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 00:14:38 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x541b, &(0x7f0000000100)) [ 878.631463][ T29] audit: type=1326 audit(878.570:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11635 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:14:38 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x9, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 00:14:39 executing program 1: write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) 00:14:39 executing program 1: write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) 00:14:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001fc0)=""/142, 0x8e}, {&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000002080)=""/251, 0xfb}], 0x3}}], 0x1, 0x0, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000040)=@ax25={{0x3, @null}, [@null, @bcast, @netrom, @default, @default, @rose, @netrom]}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/39, 0x27}, {&(0x7f0000000980)=""/178, 0xb2}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000880)=""/206, 0xce}, {&(0x7f0000000a80)=""/177, 0xb1}, {&(0x7f0000000b40)=""/152, 0x98}], 0x3}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000), 0xc, 0x0}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0x53}, {&(0x7f0000000fc0)=""/4096, 0x51b}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 00:14:41 executing program 1: write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) 00:14:41 executing program 1: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x9, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 00:14:41 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "0cb7e4", 0x8, 0x2c, 0x0, @private0, @local, {[@routing={0x0, 0x0, 0x1}]}}}}}, 0x0) 00:14:41 executing program 1: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x9, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 00:14:41 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pidfd_send_signal(r0, 0x12, 0x0, 0x0) 00:14:41 executing program 1: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x9, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 00:14:41 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pidfd_send_signal(r0, 0x900, 0x0, 0x0) 00:14:41 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x9, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) 00:14:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0258ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 00:14:42 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x9, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) [ 882.309619][ T29] audit: type=1400 audit(882.260:323): avc: denied { nlmsg_read } for pid=11684 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 00:14:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6gretap0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:14:42 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x9, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) 00:14:42 executing program 1: getrandom(&(0x7f0000000080)=""/240, 0xfffffffffffffe77, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) madvise(&(0x7f0000000000/0x400000)=nil, 0x400038, 0x9) 00:14:42 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000040)=@ax25={{0x3, @null}, [@null, @bcast, @netrom, @default, @default, @rose, @netrom]}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/39, 0x27}, {&(0x7f0000000980)=""/178, 0xb2}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000880)=""/206, 0xce}, {&(0x7f0000000a80)=""/177, 0xb1}, {&(0x7f0000000b40)=""/152, 0x98}], 0x3}}], 0x1, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000c00)=@generic, 0x80, 0x0, 0x0, &(0x7f0000002100)=""/112, 0x70}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x14b}, {&(0x7f0000000280)=""/85, 0x53}, {&(0x7f0000000fc0)=""/4096, 0x51b}, {&(0x7f0000000400)=""/106, 0x68c}, {&(0x7f0000000740)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 00:14:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x5) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) 00:14:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0258ff000000000000000058000b4824ca945f64009400000000000ebc000000080000008000f010000100070c10000000000067596c677994427fa8014000000000000000", 0x58}], 0x1) 00:14:45 executing program 0: socket$packet(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000bc00000095000000000000003d789ade838a5ad00c21573d9f5ec0798d497a5d0ab93dbb1df77098cac396739a7e7d4ecd279fcafbb3069de877bb57b6111b5d6f597206f0902cf2c1d66e1ef4ea6deeaf8739f04831630ee05dcc2bf595f13f6f501e8b53bff400000000000000004130fd875789e46307b8f29cfe149360bea59a42011aabc5001093a06d23b6cf4f033c6000c3ab63ee036fe7023574b86ce453bc8964c32f955d4100005b08f7567764f92e16938155e303f9a78644e801f101000000a5ddd62c7addb24fcc053a230355cee250cb376879ae14b9e1ab98703b1fb0a4141ae3c08d264831d0f6365469c3562185000000000000000057bfcc8cb605561993f8e731123c08e5830672a8ebeabe99826e328744cdf5c88e0cf4cecae5fe2e319c8ca049ee7f08b40dd9c6b74349d82a153a3307adec5841242358380001264a375046c83de95ebabf46f181db8edd5b2309d2b55a2f9565d9d7bd34c5c43f035e94051617716de2035ecbcf5eff4df25681f7007a00b7f00329c70eaff5347e6ea860ad4d421096c38f85f0e8007ab937b749401d9c11278bb38e6147bed71d31919043af34712653b5f9c852649f66902cbb25edbea0"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x2300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:14:45 executing program 1: symlinkat(&(0x7f0000000600)='./file0\x00', 0xffffffffffffffff, 0x0) 00:14:45 executing program 1: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) 00:14:45 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x3b, &(0x7f0000001900), &(0x7f0000001940)=0x4) 00:14:45 executing program 0: getsockname$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) 00:14:45 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={0x1c, 0x1c, 0x1}, 0x1c) 00:14:45 executing program 0: setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) 00:14:45 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000100)=0x6, 0x4) sendto(r0, &(0x7f0000000200)="58b36317f392", 0x6, 0x0, &(0x7f0000000340)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 00:14:45 executing program 1: shmget(0x2, 0x2000, 0x0, &(0x7f0000ff9000/0x2000)=nil) 00:14:46 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000500)=[{r1, 0x10}, {}, {r0, 0x2}], 0x3, &(0x7f0000000540)={0x6580, 0x101}, &(0x7f0000000580)={[0x0, 0x100]}, 0x10) 00:14:46 executing program 0: pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) symlinkat(&(0x7f0000000600)='./file0\x00', r0, &(0x7f0000000680)='./file0\x00') 00:14:46 executing program 1: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)={@loopback, @broadcast}, &(0x7f0000000640)=0xc) 00:14:46 executing program 0: ppoll(&(0x7f0000000500)=[{}], 0x1, &(0x7f0000000540), 0x0, 0x0) 00:14:46 executing program 1: pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000500)=[{r0}, {}, {}], 0x3, &(0x7f0000000540)={0x0, 0x101}, &(0x7f0000000580), 0x10) 00:14:46 executing program 0: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 00:14:46 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffa000/0x1000)=nil) 00:14:46 executing program 1: pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000500)=[{r0}, {}, {}], 0x3, &(0x7f0000000540)={0x6580}, &(0x7f0000000580), 0x10) 00:14:46 executing program 0: shmget(0x1, 0x2000, 0x608, &(0x7f0000ff9000/0x2000)=nil) 00:14:46 executing program 1: pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000500)=[{r0}], 0x1, &(0x7f0000000540)={0x0, 0x101}, 0x0, 0x0) 00:14:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@sndrcv={0x2c}, @dstaddrv4={0x10, 0x84, 0x9}, @sndinfo={0x1c}], 0x58}, 0x0) 00:14:47 executing program 0: pipe2(&(0x7f0000000640), 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) 00:14:47 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 00:14:47 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4c}}, 0x0) 00:14:47 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x54, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x42, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@dmm={0x7}]}}}]}}]}}, 0x0) 00:14:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) [ 887.692066][ T8] usb 2-1: new high-speed USB device number 53 using dummy_hcd 00:14:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/140, 0xfffffd6a}], 0x1, 0x0, 0x36}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x11, 0x3, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000240)={0x0, 0xea60}, 0x10) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendto$unix(r1, &(0x7f0000000140)="3c0c0399ef41c8ec8478f80029845e0797684cf51c09d4b68bab7d8ab84dc2a84f571393d80a1d2ac40d22f77b481098ccf8368d9c94d9b8b93dd7ed195f03588afc8ec521daa4263b5979", 0xffffff84, 0x0, 0x0, 0x0) [ 888.051647][ T8] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 00:14:48 executing program 0: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 888.231901][ T8] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 888.232384][ T8] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 888.232711][ T8] usb 2-1: Product: syz [ 888.233052][ T8] usb 2-1: Manufacturer: syz [ 888.233238][ T8] usb 2-1: SerialNumber: syz [ 888.277095][ T8] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 888.482857][ T8] usb 2-1: USB disconnect, device number 53 00:14:49 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0, 0x0, 0x0, 0x2}, 0x0) 00:14:49 executing program 0: r0 = socket(0x1e, 0x2, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 00:14:50 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0xa, 0x2, 0x0, @mcast1}, 0x1c, 0x0}, 0x0) 00:14:50 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@private1, @loopback, @remote, 0x401}) 00:14:50 executing program 1: accept4(0xffffffffffffffff, 0x0, 0x0, 0x100000) 00:14:50 executing program 0: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000200)) 00:14:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000480)={0xa, 0x4e23, 0x0, @dev, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=[@hoplimit={{0x14}}, @dstopts={{0x18}}], 0x30}, 0x0) 00:14:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000480)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=[@dstopts={{0x18}}], 0x18}, 0x0) 00:14:50 executing program 1: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB='e'], 0x0, 0x0) 00:14:50 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/clients\x00', 0x0, 0x0) 00:14:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffff8}, 0x1c) 00:14:50 executing program 0: socket(0x11, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) 00:14:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @dev}}) 00:14:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000001c0)={0x20, 0x0, 0x0, 0x0, 0x0, "5ff749cbd7e63e17"}) 00:14:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/140, 0xfffffd6a}], 0x1, 0x0, 0x36}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x11, 0x3, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000240)={0x0, 0xea60}, 0x10) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendto$unix(r1, &(0x7f0000000140)='<', 0x1, 0x0, 0x0, 0x0) 00:14:50 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0xa, 0x0, 0x0, @mcast2, 0x3f}, 0x1c, 0x0}, 0x0) 00:14:50 executing program 0: pipe2$watch_queue(0x0, 0x80) read$FUSE(0xffffffffffffffff, &(0x7f0000001f80)={0x2020}, 0x2020) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x0, 0xcf, &(0x7f0000000180)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbd, 0x1, 0x1, 0x0, 0x0, 0x7d, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x8, 0x0, 0x2}, [@mbim_extended={0x8, 0x24, 0x1c, 0x1, 0x0, 0x81}, @mdlm_detail={0x5f, 0x24, 0x13, 0x0, "6d794fcc25f3bceec484b9175b545660487af66977a3db80281ae730e5f4bc772da1badf0341a3d89ecc63dd448b7c4f9c8a22cf92a748e9fc44ee8dbd18c7f608c20657203fe5afd96891b8819a69252ed48b260ef2f23bc38197"}, @dmm={0x7, 0x24, 0x14, 0x9, 0x20}, @ncm={0x6, 0x24, 0x1a, 0x4, 0x7e1143096373693f}, @obex={0x5}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x40, 0x0, 0x0, 0x81}}], {{0x9, 0x5, 0x82, 0x2, 0x0, 0x2, 0x80, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x8, 0x3, 0xdc}}}}}]}}]}}, &(0x7f0000000440)={0xa, &(0x7f0000000280)={0xa, 0x6, 0x250, 0x0, 0x0, 0x8, 0x20, 0x8}, 0x22, &(0x7f00000002c0)={0x5, 0xf, 0x22, 0x3, [@ssp_cap={0x10, 0x10, 0xa, 0x3, 0x1, 0x1f, 0xf, 0x3, [0x3f00]}, @generic={0x3, 0x10, 0x3}, @ss_cap={0xa}]}, 0x1, [{0x0, 0x0}]}) 00:14:50 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440), 0xffffffffffffffff) 00:14:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000002300)=[{{&(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x200000d0) 00:14:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x2029, 0x4) [ 891.291430][ T9489] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 891.731615][ T9489] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 891.732117][ T9489] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 891.732394][ T9489] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 891.732834][ T9489] usb 1-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 891.981523][ T9489] usb 1-1: string descriptor 0 read error: -22 [ 891.981985][ T9489] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 891.982460][ T9489] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 892.023437][ T9489] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 892.225395][ T22] usb 1-1: USB disconnect, device number 33 00:14:53 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0x6, 0x0, 0x0, @mcast1}, 0x1c, 0x0}, 0x0) 00:14:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000480)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=[@rthdr_2292={{0x18}}], 0x18}, 0x0) 00:14:53 executing program 1: syz_open_dev$mouse(&(0x7f0000000480), 0x0, 0x50002) 00:14:53 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) 00:14:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0xfffffffffffffe69) 00:14:54 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}, 0x3f}, 0x1c, 0x0}, 0x0) 00:14:54 executing program 1: syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x2) 00:14:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {0x2, 0x0, 0x0, 0x7ff}]}) 00:14:54 executing program 1: r0 = socket(0x1e, 0x2, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={0x0}}, 0x24004941) 00:14:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@private2, @private0, @local, 0x0, 0x0, 0x512}) 00:14:54 executing program 0: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xffffffffffffffff, 0xa87375c9a4b61e62) 00:14:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000002300)=[{{&(0x7f00000002c0)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c, 0x0}}], 0x1, 0x200000d0) 00:14:54 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0x2, 0x0, 0x0, @mcast1}, 0x1c, 0x0}, 0x0) 00:14:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0xcc, 0x0, &(0x7f0000001000)) 00:14:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x8904, 0x0) 00:14:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x33, &(0x7f0000000180)="b14d6b2a", 0x4) 00:14:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x80086601, 0x0) 00:14:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x3, r0, 0x0, 0x20) 00:14:54 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x51, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x3}, [@mdlm_detail={0x4}]}}}]}}]}}, 0x0) 00:14:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) 00:14:54 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000080)) 00:14:54 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0xa, 0x0, 0x0, @mcast1}, 0x18, 0x0}, 0x0) [ 895.142536][ T9489] usb 2-1: new high-speed USB device number 54 using dummy_hcd [ 895.511448][ T9489] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 895.681869][ T9489] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 895.682473][ T9489] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 895.682691][ T9489] usb 2-1: Product: syz [ 895.682899][ T9489] usb 2-1: Manufacturer: syz [ 895.683134][ T9489] usb 2-1: SerialNumber: syz [ 895.742533][ T9489] usb 2-1: bad CDC descriptors [ 895.954101][ T9489] usb 2-1: USB disconnect, device number 54 00:14:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x890b, 0x0) 00:14:57 executing program 0: r0 = socket(0x2, 0x2, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) 00:14:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000480)={0xa, 0x4e23, 0x0, @dev, 0x9}, 0x1c, 0x0}, 0x0) 00:14:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@remote}, 0x14) 00:14:57 executing program 0: r0 = socket(0x1e, 0x2, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 00:14:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000480)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}], 0x28}, 0x0) 00:14:57 executing program 1: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) 00:14:57 executing program 1: syz_clone(0x211080, 0x0, 0x0, 0x0, 0x0, 0x0) 00:14:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000001c0)='bond_slave_0\x00') 00:14:57 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, r0+10000000}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) 00:14:58 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x51, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3f, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@mdlm_detail={0x4}]}}}]}}]}}, 0x0) 00:14:58 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f0000000180)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[{{0x9, 0x5, 0x81, 0x3, 0x0, 0x1}}]}}}]}}]}}, &(0x7f0000000440)={0x0, 0x0, 0x11, &(0x7f00000002c0)={0x5, 0xf, 0x11, 0x1, [@ssp_cap={0xc}]}}) [ 898.421782][ T9489] usb 1-1: new high-speed USB device number 34 using dummy_hcd [ 898.701712][ T94] usb 2-1: new high-speed USB device number 55 using dummy_hcd [ 898.791421][ T9489] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 898.951478][ T9489] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 898.951907][ T9489] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 898.952097][ T9489] usb 1-1: Product: syz [ 898.952359][ T9489] usb 1-1: Manufacturer: syz [ 898.952489][ T9489] usb 1-1: SerialNumber: syz [ 898.993290][ T9489] usb 1-1: bad CDC descriptors [ 899.171759][ T94] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 899.172316][ T94] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 899.172609][ T94] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 899.172931][ T94] usb 2-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 899.207064][ T9489] usb 1-1: USB disconnect, device number 34 [ 899.352023][ T94] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 899.355392][ T94] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 899.358338][ T94] usb 2-1: Product: syz [ 899.362059][ T94] usb 2-1: Manufacturer: syz [ 899.364023][ T94] usb 2-1: SerialNumber: syz [ 899.404839][ T94] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 899.614830][ T9489] usb 2-1: USB disconnect, device number 55 00:15:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x890c, 0x0) 00:15:00 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x4}, 0x20) 00:15:00 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x53, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x41, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@ncm={0x6}]}}}]}}]}}, 0x0) 00:15:01 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0xa, 0x0, 0x0, @mcast1}, 0x2000709c, 0x0}, 0x0) 00:15:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) [ 901.193564][ T92] usb 1-1: new high-speed USB device number 35 using dummy_hcd 00:15:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000480)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}, 0x0) [ 901.551441][ T92] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 901.711459][ T92] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 901.711845][ T92] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 901.712224][ T92] usb 1-1: Product: syz [ 901.712371][ T92] usb 1-1: Manufacturer: syz [ 901.712517][ T92] usb 1-1: SerialNumber: syz [ 901.753569][ T92] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 901.972076][ T2936] usb 1-1: USB disconnect, device number 35 00:15:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x8903, 0x0) 00:15:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000300)) 00:15:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @empty}}}, 0x88) 00:15:03 executing program 0: r0 = socket(0x1e, 0x2, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24004941) 00:15:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x80087601, 0x0) 00:15:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x8901, 0x0) 00:15:03 executing program 1: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 00:15:03 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) 00:15:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x5421, 0x0) 00:15:03 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080), 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000180)) 00:15:03 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8241, 0x0) 00:15:03 executing program 0: socketpair(0x28, 0x0, 0x200, &(0x7f0000000000)) 00:15:03 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) 00:15:03 executing program 0: socketpair(0x2, 0x5, 0x1000, &(0x7f0000000000)) 00:15:03 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='_', 0x1, r0) keyctl$describe(0x3, r0, 0x0, 0x20) 00:15:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'erspan0\x00', 0x1}) 00:15:03 executing program 1: openat$cgroup(0xffffffffffffffff, &(0x7f00000023c0)='syz0\x00', 0x200002, 0x0) 00:15:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000080)='R', 0x1}], 0x1}, 0x55) 00:15:04 executing program 1: socketpair(0x2, 0x0, 0x1000, &(0x7f0000000000)) 00:15:04 executing program 0: socketpair(0x2, 0x0, 0xffefffe0, &(0x7f0000000040)) 00:15:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="528d", 0x2}], 0x1}, 0x55) 00:15:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) close(r0) 00:15:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) 00:15:04 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x410002, 0x0) 00:15:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)='R', 0x1}], 0x1}, 0x0) 00:15:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)='R', 0x1}], 0x1}, 0x55) 00:15:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 00:15:04 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x12b202, 0x0) 00:15:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) 00:15:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x55) 00:15:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 00:15:04 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001900)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 00:15:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'vxcan1\x00'}) 00:15:04 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'erspan0\x00', 0x1}) 00:15:04 executing program 0: r0 = socket(0x2, 0x1, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 00:15:04 executing program 1: r0 = socket(0x2, 0x1, 0x0) write$FUSE_POLL(r0, 0x0, 0x0) 00:15:04 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 00:15:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'erspan0\x00', 0x1}) 00:15:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xf}, @map_val={0x18, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0x73, 0x63, &(0x7f0000000100)=""/99, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x0, 0x95, 0x8}, 0x10, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000200)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x2, 0x2, 0x1, 0xb}, {0x0, 0x2}, {0x2, 0x1, 0x10, 0x5}, {0x3, 0x1, 0x5, 0xa}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@ifindex, r0, 0x28, 0x6f}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 00:15:04 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto$packet(r0, 0x0, 0xffffffd5, 0x0, 0x0, 0x0) 00:15:04 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x20044851, 0x0, 0x8) 00:15:04 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x200480c4, 0x0, 0x52) 00:15:04 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20840, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) 00:15:04 executing program 1: r0 = socket(0x10, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x40) 00:15:04 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x188c1, 0x0, 0xfffffffffffffe68) 00:15:05 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x40060c1, 0x0, 0x0) 00:15:05 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendto$packet(r0, 0x0, 0x31, 0x0, 0x0, 0x0) 00:15:05 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x20004084, 0x0, 0xfffffffffffffefb) 00:15:05 executing program 1: r0 = socket(0x2, 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 00:15:05 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) socketpair(0x11, 0x0, 0x0, &(0x7f0000000240)) 00:15:05 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) read$snddsp(r0, &(0x7f0000000540)=""/4096, 0x1000) 00:15:05 executing program 0: r0 = socket(0x1, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000000), 0x0, 0x40) 00:15:05 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20840, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x20008091, 0x0, 0x0) 00:15:05 executing program 1: sched_rr_get_interval(0x0, &(0x7f0000000240)) 00:15:05 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x6480, 0x0) 00:15:05 executing program 1: sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 00:15:05 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x10000, 0x5}, &(0x7f0000000100)={0x0, r0+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x81]}, 0x8}) 00:15:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000000)={&(0x7f0000000100), 0xfffffffffffffd29, &(0x7f0000000080)={&(0x7f00000000c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0x0, 0x9, @link_local}]}, 0x2c}}, 0x0) 00:15:05 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x2041, 0x0) read$snddsp(r0, 0x0, 0x0) 00:15:05 executing program 1: socket(0x10, 0x2, 0x95f6) 00:15:05 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom0\x00', 0x0, 0x0) 00:15:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000a80)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={&(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void, @val={0x3}}}}, 0x28}}, 0x0) 00:15:05 executing program 1: socketpair(0xa, 0x2, 0x0, &(0x7f0000000a00)) 00:15:05 executing program 0: r0 = socket(0x1, 0x3, 0x0) bind$unix(r0, 0xffffffffffffffff, 0x0) 00:15:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) shutdown(r0, 0x0) 00:15:05 executing program 0: pselect6(0x40, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x989680}, 0x0) 00:15:05 executing program 1: syz_genetlink_get_family_id$ieee802154(&(0x7f0000001a40), 0xffffffffffffffff) 00:15:05 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8901, 0x0) 00:15:06 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000004580)) 00:15:06 executing program 1: socket(0x1, 0x0, 0x201) 00:15:06 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x20}}, 0x48841) [ 906.431777][ T29] audit: type=1400 audit(906.370:324): avc: denied { write } for pid=12117 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 00:15:06 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) 00:15:06 executing program 0: syz_open_procfs(0x0, &(0x7f0000000c00)='net/raw\x00') syz_open_procfs(0x0, &(0x7f0000001180)='net/udp6\x00') 00:15:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0) 00:15:06 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000046c0)={0x0, 0x0, 0x20000}, 0x20) 00:15:06 executing program 1: mount$binderfs(0x0, 0x0, &(0x7f0000000840), 0x0, 0x0) 00:15:06 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') 00:15:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x40}}, 0x0) 00:15:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 00:15:07 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x59bc81, 0x0) 00:15:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 00:15:07 executing program 0: syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) setresuid(0x0, 0x0, 0xee01) socketpair(0xf, 0xa, 0x5, &(0x7f0000000dc0)) 00:15:07 executing program 1: bpf$LINK_GET_NEXT_ID(0x15, 0x0, 0x0) 00:15:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x30}}, 0x0) 00:15:07 executing program 1: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 00:15:07 executing program 0: sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x6a712a0585a04d46) 00:15:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={0x0}}, 0x0) 00:15:07 executing program 1: getuid() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x8000}, {0x0, 0x0, 0x0, 0x8000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20040040) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000680)) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f00000006c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000dc0)) 00:15:08 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f0000001100)) 00:15:08 executing program 1: clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000800)={{0x0, 0x2710}, {0x0, r0/1000+10000}}, 0x0) 00:15:08 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x80108906, 0x0) 00:15:08 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8912, 0x0) 00:15:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) 00:15:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='0'], 0x30}}, 0x0) [ 908.892527][T12168] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12168 comm=syz-executor.1 00:15:08 executing program 0: request_key(&(0x7f0000000140)='logon\x00', 0x0, 0x0, 0x0) 00:15:08 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000004400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 00:15:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:15:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000001540)={0x10}, 0x10}}, 0x0) 00:15:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x24, 0x0, 0x400, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x70}, @val={0x8}, @void}}}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fddbdf25430000000800030096ad995e7c0fefe0e9d0b51215b4100b11a017db03bb9d0dbc9426a7513367de2d6ea3e9e3918a2c561b423ace5a43e7ad0a345fbaf6bd95d2242d00382680c17a1b0be63064480d145b1bda5f", @ANYRES32=0x0, @ANYBLOB="0c00580008000000000000000c00580018000000000000000c0058001d00000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x20040085}, 0x20) 00:15:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x7f, 0x0, 0x8}, {}]}) 00:15:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=@known='security.apparmor\x00', 0x0, 0x0, 0x0) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', 0x0, 0x0) 00:15:11 executing program 0: mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2\x00', 0x1ff) getresuid(&(0x7f0000000ac0), 0x0, 0x0) 00:15:11 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000cc0)) 00:15:11 executing program 0: recvmsg$unix(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) socketpair(0x10, 0x0, 0x1000, &(0x7f0000001c80)) 00:15:11 executing program 0: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/114) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000080)=""/239) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)={0x0, 0x1}) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 00:15:11 executing program 1: syz_open_dev$loop(&(0x7f0000002840), 0x0, 0x0) 00:15:11 executing program 0: r0 = getpgid(0x0) capget(&(0x7f0000000100)={0x20080522, r0}, &(0x7f0000000140)) 00:15:11 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x4020940d, 0x0) 00:15:11 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a00)) 00:15:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'erspan0\x00', 0x0}) 00:15:11 executing program 1: syz_open_procfs(0x0, &(0x7f0000000c00)='net/raw\x00') 00:15:12 executing program 0: pselect6(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x7}, 0x0, 0x0, 0x0) 00:15:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000003300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:15:12 executing program 0: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x40) 00:15:12 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) 00:15:12 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) 00:15:12 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x29, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) 00:15:12 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x2, 0x0) 00:15:12 executing program 1: r0 = getpgrp(0x0) sched_rr_get_interval(r0, &(0x7f00000000c0)) 00:15:12 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200), 0x0, 0x189d81) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 912.376635][ T29] audit: type=1400 audit(912.330:325): avc: denied { append } for pid=12225 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 00:15:12 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:15:12 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200), 0x0, 0x189d81) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 00:15:12 executing program 1: socketpair(0x3, 0x0, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000c40)) 00:15:12 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200), 0x0, 0x189d81) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 00:15:12 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200), 0x0, 0x189d81) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 00:15:12 executing program 1: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f00000002c0)={0x701000}, 0x18) 00:15:12 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='_', 0x1, 0xfffffffffffffffb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 00:15:12 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, 0x0, 0x0) [ 912.717559][T12243] trusted_key: encrypted_key: insufficient parameters specified 00:15:12 executing program 0: sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) socketpair(0xa, 0x2, 0x9, &(0x7f0000000a00)) 00:15:12 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5421, 0x0) 00:15:12 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='setgroups\x00') 00:15:12 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) write$hidraw(r0, 0x0, 0xfe9f) 00:15:12 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8907, 0x0) 00:15:12 executing program 0: syz_clone(0xc00d4000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:13 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000c40), 0x40200, 0x0) 00:15:13 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 00:15:13 executing program 0: r0 = getpgrp(0xffffffffffffffff) ptrace(0x8, r0) 00:15:13 executing program 1: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 00:15:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000b40), r0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000013c0)={&(0x7f0000001300), 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x14}, 0x14}}, 0x0) 00:15:13 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000180)) 00:15:13 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000040)=""/180, 0xb4}], 0x1, 0x9f15, 0x0) 00:15:13 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x2041, 0x0) write$cgroup_pid(r0, &(0x7f0000000080)=0xffffffffffffffff, 0xfffffc5b) 00:15:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001480)) 00:15:13 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_matches\x00') 00:15:13 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x801c581f, 0x0) 00:15:13 executing program 1: syz_open_procfs(0x0, &(0x7f0000000980)='loginuid\x00') 00:15:13 executing program 0: pselect6(0x40, &(0x7f0000000500), 0x0, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0x989680}, 0x0) 00:15:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={0x0, 0x0, 0x122}, 0x20) 00:15:13 executing program 0: syz_usb_connect$uac1(0x6, 0x71, &(0x7f0000000700)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 00:15:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000a40), r0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000014c0)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0) 00:15:13 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x3, 0x0) 00:15:13 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0xc020660b, 0x0) 00:15:15 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000019c0)='net/ipv6_route\x00') 00:15:15 executing program 1: syz_open_procfs(0x0, &(0x7f0000000280)='net/rt_acct\x00') 00:15:15 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000400), 0x24, 0x0) [ 915.323622][ T29] audit: type=1400 audit(915.280:326): avc: denied { setattr } for pid=12304 comm="syz-executor.1" name="AF_VSOCK" dev="sockfs" ino=26232 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 00:15:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 00:15:15 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040)={0x8000000000000001, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000080)={0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x81]}, 0x8}) 00:15:15 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) 00:15:15 executing program 0: ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000005c80)={&(0x7f00000057c0)={0x10, 0x0, 0x0, 0x2001100}, 0xc, &(0x7f0000005c40)={&(0x7f0000005800)={0x424, 0x3f4, 0x400, 0x0, 0x0, {0x0, 0x2, 0x0, [0x3f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7e3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xab, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f], [0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x101, 0x0, 0x0, 0xe2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff8001, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x5, 0x10001, 0x7, 0x0, 0x0, 0x0, 0x81, 0x8], [0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x62ef, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x0, 0xdae8, 0x7], 0x3, ['max']}}, 0x424}, 0x1, 0x0, 0x0, 0x4800}, 0x40) [ 915.499504][ T29] audit: type=1400 audit(915.450:327): avc: denied { nlmsg_write } for pid=12312 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 00:15:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1a}]]}, 0x30}}, 0x0) 00:15:17 executing program 1: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/114) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000080)=""/239) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)={0x0, 0x1}) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) sendmsg$alg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="8ef5ec20f246888396176cb9de3a754d784da909691a11cc36daa56ff674fe97eac9c0089f9f70e141a6e4237c2dc4f5e7eb9a4f218be98bfa850bcad030c7537d7230b7c825eddfe30f01e303a8acd1676e0c2497a4521b4a804e1170aed7b90578fe910ed2c15130a83a5429d14b9482f51d75fc1bcf421956e7e0a14aaa79de7744", 0x83}, {0x0}], 0x2, &(0x7f0000000580)=[@assoc={0x18, 0x117, 0x4, 0x10000}], 0x18, 0x4000000}, 0x8014) shmctl$IPC_STAT(0x0, 0x2, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f00000006c0)=""/185) shmctl$IPC_RMID(r0, 0x0) 00:15:17 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mount_setattr(r0, &(0x7f0000004680)='./file0\x00', 0x0, &(0x7f00000046c0)={0x2}, 0x20) 00:15:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000014c0)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0) 00:15:17 executing program 1: rt_sigsuspend(&(0x7f0000000480), 0x8) 00:15:18 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000000)='big_key\x00', 0x0, 0xfffffffffffffff8) 00:15:18 executing program 0: sendmsg$AUDIT_USER(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x0, 0x80, 0x30, 0x4, 0x0, @empty, @loopback, 0x700, 0x1, 0x7ff}}) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1e, 0x0, 0x0, 0x7, 0x400, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x48) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f2, 0x20, 0x0, 0x25dfdbfd, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000400)={r0, 0x1, 0x6, @random="78a70ec82415"}, 0x10) sendto$packet(r1, &(0x7f0000000440)="c61cff9a76676be39b8dba3efe390eace9ca26a9df8cdeb19fe9aedf43ff637fbf42577790b906452c5e8ba285a22352b321319b5f3622703132a3361ee4f7e5fc374b831357897849983ffc55af541886f7863b59c221f317e1", 0x5a, 0x4000010, 0x0, 0x0) mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000500)='./binderfs2\x00', 0x1ff) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000005c0)={'ip6gre0\x00', &(0x7f0000000540)={'ip6_vti0\x00', r2, 0x29, 0x9, 0x3, 0x0, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x700, 0x40, 0x4}}) syz_open_dev$loop(&(0x7f0000002840), 0x0, 0x400) 00:15:18 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x2, 0x0) 00:15:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0x33, 0x0, 0x10000}, {0x6, 0x0, 0x0, 0x7}]}) 00:15:20 executing program 0: socket$inet(0x2, 0x0, 0xbaf) 00:15:20 executing program 0: syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0xc4240) [ 920.648919][ T29] audit: type=1326 audit(920.600:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12332 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:15:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000c00)='net/raw\x00') ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 00:15:21 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000c00)='net/raw\x00') 00:15:21 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) 00:15:21 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x180000) 00:15:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1a}]]}, 0x30}}, 0x0) 00:15:21 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 00:15:21 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e40), 0xf00, 0x0) 00:15:21 executing program 0: socketpair(0x3, 0x0, 0x0, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000c40)) 00:15:21 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='_', 0x1, 0xfffffffffffffffb) [ 922.142291][T12357] trusted_key: encrypted_key: insufficient parameters specified 00:15:22 executing program 1: syz_open_dev$rtc(&(0x7f0000000040), 0x6, 0xc4240) 00:15:22 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8903, 0x0) 00:15:22 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 00:15:22 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000280)='veth1_to_bond\x00') 00:15:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={0x0, 0x0, 0x122, 0x0, 0x0, 0x5}, 0x20) 00:15:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x98}]}) 00:15:22 executing program 0: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000380)={0x0, 0x2}, 0x18) 00:15:22 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x208100, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 00:15:23 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x7) 00:15:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000200)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 00:15:23 executing program 1: sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) 00:15:23 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:15:23 executing program 0: pselect6(0x40, &(0x7f0000000500), &(0x7f0000000540), 0x0, &(0x7f00000005c0)={0x0, 0x989680}, 0x0) 00:15:23 executing program 1: syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x2) 00:15:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="300000001c"], 0x30}}, 0x0) 00:15:23 executing program 1: sched_getattr(0x0, &(0x7f0000000200)={0x38}, 0x38, 0x0) 00:15:23 executing program 0: request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x17', 0xfffffffffffffffa) 00:15:23 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) 00:15:23 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000cc0)) 00:15:23 executing program 0: bpf$LINK_GET_NEXT_ID(0x1d, 0x0, 0x0) 00:15:23 executing program 0: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000007ac0)) 00:15:24 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x10000}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={[0x81]}, 0x8}) 00:15:24 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) 00:15:24 executing program 1: syz_open_procfs(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000c40)) 00:15:24 executing program 0: pselect6(0x40, &(0x7f0000000500), 0x0, &(0x7f0000000580)={0x9}, &(0x7f00000005c0)={0x0, 0x989680}, &(0x7f0000000640)={&(0x7f0000000600)={[0x9]}, 0x8}) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) 00:15:24 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 00:15:24 executing program 0: bpf$LINK_GET_NEXT_ID(0x23, 0x0, 0x0) 00:15:24 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000005c80)={&(0x7f00000057c0)={0x10, 0x0, 0x0, 0x2001100}, 0xc, &(0x7f0000005c40)={&(0x7f0000005800)={0x424, 0x3f4, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2a], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f], 0x1, ['\x00']}}, 0x424}}, 0x0) 00:15:24 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000500)='./binderfs2\x00', 0x1ff) syz_open_dev$loop(0x0, 0x0, 0x0) 00:15:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={0x0}}, 0x0) 00:15:24 executing program 1: socket(0xd9735d560131ffa3, 0x0, 0x0) 00:15:24 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={0x0, 0x989680}, 0x0) 00:15:24 executing program 0: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000004240)='cpu.pressure\x00', 0x2, 0x0) 00:15:25 executing program 1: bpf$LINK_GET_NEXT_ID(0x18, 0x0, 0x0) 00:15:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{}, {0x2, 0x0, 0x0, 0x7ff}]}) 00:15:25 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000cc0)={@map, 0xffffffffffffffff, 0x0, 0x0, 0x0, @prog_id}, 0x20) 00:15:25 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:25 executing program 1: pselect6(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x7}, 0x0, 0x0, &(0x7f0000000380)={0x0}) 00:15:25 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000009c0)='ns/user\x00') 00:15:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000e80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x14}, 0x14}}, 0x0) 00:15:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fddbdf254300000008"], 0x40}}, 0x0) 00:15:25 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, 0x0, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4000010, 0x0, 0x0) mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000500)='./binderfs2\x00', 0x1ff) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000005c0)={'ip6gre0\x00', &(0x7f0000000540)={'ip6_vti0\x00', r1, 0x0, 0x9, 0x3, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x700, 0x40, 0x4, 0x4}}) syz_open_dev$loop(0x0, 0x6, 0x400) 00:15:25 executing program 1: syz_open_dev$loop(&(0x7f0000002840), 0x0, 0x400) 00:15:26 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x2041, 0x0) write$tun(r0, &(0x7f0000000000)={@void, @val, @eth={@dev, @broadcast, @void, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "fc96ae19ffe23b35ba41ccfada6b2ef51e48b2e6ed17f0202e92889ce8893b1999767c88d70857926659dbcd48ebfecf7c4798c821b2229e7b859c030220fb56"}}}}}, 0x60) 00:15:26 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8940, 0x0) 00:15:26 executing program 0: syz_clone(0x84000800, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b1") sched_rr_get_interval(0x0, &(0x7f0000000240)) 00:15:26 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001a80)={0x0, 0x989680}) read$snddsp(r0, &(0x7f0000000540)=""/4096, 0x1000) 00:15:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fsopen(&(0x7f0000000380)='binfmt_misc\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000003c0)='/sys/kernel/debug/binder/state\x00', 0x0, r0) 00:15:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 00:15:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 00:15:26 executing program 1: syz_open_dev$sndpcmp(&(0x7f0000000100), 0x7, 0x0) 00:15:26 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8904, 0x0) 00:15:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f00000004c0)=ANY=[@ANYRES64], 0x14}}, 0x0) 00:15:27 executing program 0: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/114) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000080)=""/239) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)={0x0, 0x1}) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) sendmsg$alg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="8ef5ec20f246888396176cb9de3a754d784da909691a11cc36daa56ff674fe97eac9c0089f9f70e141a6e4237c2dc4f5e7eb9a4f218be98bfa850bcad030c7537d7230b7c825eddfe30f01e303a8acd1676e0c2497a4521b4a804e1170aed7b90578fe910ed2c15130a83a5429d14b9482f51d75fc1bcf421956e7e0a14aaa79de7744", 0x83}, {&(0x7f0000000280)="45caf91a5dc33fbeb1e38255594371ecb379ba95ce0a56fced98a97433614dcb77c00f650eabf0de11777ff10afa6fe3be7d19980d992625ef0be0dc719032f4352a71f0321da00822c1390589b8ffc472b522a8025c279656586ce8eae1c98e783f2b0be7d1d1e205e778b2bf65ba7966adb25590fbc60a67d89a6e60c7f02e48c8b29e1d15c963ce44564bee97dfb77f08c5cd5240d9d5a20d57c22516facb079dfba395cdf48b08a95fba2447afa62ff33d578659033c5da76c9807fee22990b63622f08f7b04fb1552c7373b73017d5eb7623f11b3ed15b638f15d82422b2370cd25a9578bc759324aa38659feff9d946cc38b", 0xf5}, {&(0x7f0000000380)="d217b1b7aa8ef85e2a3e887011d937675773fffd4e3d7f208f0d927660c5ecc9b6a34464dc95148990bbf0a1bc9ad0156cea85829e5afb72a1a7ca6eaa002b2534a149c9fb25647ea4c0747a1303d64f0186f018bf2c20172304a15727ca9417241debbcacaa101bc88ac1ba03e3514d7c9abd2074d25ecf5561c4aa279edb287728", 0x82}, {&(0x7f0000000440)="9a8b760dd23dead6d5373b407d0f5a099a93cc0e7021d1191d0bb336fc1267097a570189cac4ac22efb30e7c7c90bf7c5fd0ead803f39cadcdbff7c398efafdcec1bc9fe98464601f87bbf58229e32ee054ab1c3cbbdbe236a5912878a0b3fe72a81fb851476231c1e4b283b8d03e2fac79c53f85a4b72959fcb8a5f43fb0aab25f96ee1df3a50e7073dec77ba034c07cb1ae1e925c4943be10affbbd4e62fb417626d00731d9459646e999b1e115189733967a4db3b3fb32d48a7ce71628413ac2dbdc3d15005c2d3d1", 0xca}], 0x4, &(0x7f0000000580)=[@assoc={0x18, 0x117, 0x4, 0x10000}], 0x18, 0x4000000}, 0x8014) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000600)=""/26) shmctl$IPC_RMID(0x0, 0x0) 00:15:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x2}]}) 00:15:27 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$snddsp(r0, &(0x7f0000000280)=""/230, 0xe6) 00:15:27 executing program 0: getresgid(&(0x7f0000000340), 0x0, 0x0) 00:15:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fddbdf2543"], 0x40}}, 0x0) 00:15:27 executing program 0: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') 00:15:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=@flushpolicy={0x10}, 0x10}}, 0x0) 00:15:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fddbdf2543000000080003"], 0x40}}, 0x0) 00:15:27 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0xf4, 0x0, 0x60000}, 0x20) 00:15:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000005c80)={&(0x7f00000057c0), 0xc, &(0x7f0000005c40)={&(0x7f0000005800)={0x420}, 0x420}}, 0x0) 00:15:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000014c0)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x1c}}, 0x0) 00:15:27 executing program 1: socketpair(0x28, 0x0, 0x8000, &(0x7f0000000040)) 00:15:27 executing program 0: bpf$LINK_GET_NEXT_ID(0x16, 0x0, 0x0) 00:15:27 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x989680}, &(0x7f0000000640)={&(0x7f0000000600), 0x8}) 00:15:27 executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x80000043) 00:15:27 executing program 1: capget(&(0x7f0000000100)={0x20080522}, 0x0) 00:15:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@flushpolicy={0x10}, 0x10}}, 0x0) 00:15:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f00000004c0)=ANY=[], 0x14}}, 0x0) 00:15:27 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, 0x0) [ 928.090606][T12506] binder: 12504:12506 ioctl 40046210 0 returned -14 00:15:28 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 00:15:28 executing program 0: bpf$LINK_GET_NEXT_ID(0x22, 0x0, 0x0) 00:15:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 00:15:28 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000002700), 0x8) 00:15:28 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb97f}, &(0x7f0000000040), &(0x7f0000000080)={0x10000}, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x81]}, 0x8}) 00:15:28 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0xf4}, 0x20) 00:15:28 executing program 0: getresuid(&(0x7f0000000ac0), 0x0, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000000)) 00:15:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) 00:15:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 00:15:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4}, {0x6, 0x0, 0x0, 0x7}]}) [ 928.501613][ T29] audit: type=1326 audit(928.450:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12527 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:15:28 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5460, 0x0) 00:15:28 executing program 0: request_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='pimreg0\x00', 0x0) 00:15:28 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x80086601, 0x0) 00:15:28 executing program 1: syz_clone(0x84000480, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 00:15:28 executing program 0: r0 = getpgrp(0x0) prlimit64(r0, 0x0, &(0x7f0000000000), &(0x7f0000000080)) 00:15:29 executing program 0: semget(0x1, 0x0, 0x6b4) 00:15:29 executing program 1: r0 = semget(0x1, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/33) 00:15:29 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 00:15:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) 00:15:29 executing program 0: getrusage(0x82181857de90ffed, 0x0) 00:15:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:15:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@multicast2, @multicast1}, 0x8) 00:15:29 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair(0x1, 0x0, 0x8, 0x0) 00:15:29 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x686f83, 0x0) 00:15:29 executing program 0: r0 = shmget(0x3, 0x4000, 0x300, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_RMID(r0, 0x0) 00:15:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f0000000000)="ed", 0x1) 00:15:29 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000002080)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000001c0)={0x50004001}) 00:15:30 executing program 1: epoll_create1(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') 00:15:30 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x0, 0x0) 00:15:30 executing program 0: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/139) r0 = semget(0x1, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/33) 00:15:30 executing program 1: clock_getres(0xb1039c5cb909d796, 0x0) 00:15:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0xc, 0x0, &(0x7f0000000000)) 00:15:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 00:15:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 00:15:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @multicast2}, 0x8) 00:15:30 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x3aa07, 0x0) 00:15:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @multicast2}, 0x8) 00:15:31 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2c0c0, 0x0) 00:15:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @multicast2}, 0x8) 00:15:31 executing program 0: r0 = semget(0x1, 0x0, 0xa6) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/33) 00:15:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0xfffffffffffffff6) 00:15:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @multicast2}, 0x8) 00:15:31 executing program 0: r0 = getpgid(0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x4, @tid=r0}, &(0x7f0000000040)) 00:15:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@dev, @dev}, 0xc) 00:15:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000500)) 00:15:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000000)="db", 0x1) 00:15:32 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x102c2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:15:32 executing program 1: r0 = semget(0x1, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, 0x0) [ 932.255584][ T29] audit: type=1800 audit(932.210:330): pid=12603 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="vda" ino=694 res=0 errno=0 [ 932.259319][ T29] audit: type=1804 audit(932.210:331): pid=12603 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir1867395172/syzkaller.DFBzc6/1824/file0" dev="vda" ino=694 res=1 errno=0 00:15:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2}, 0x8) 00:15:32 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 00:15:32 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002080)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000001c0)) 00:15:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f00000001c0), 0x10) 00:15:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x40000005}) 00:15:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r0, &(0x7f0000000000)='\"', 0x1) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) 00:15:32 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) [ 933.423339][ T2936] usb 2-1: new high-speed USB device number 56 using dummy_hcd [ 933.763224][ T2936] usb 2-1: Using ep0 maxpacket: 16 [ 933.932664][ T2936] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 934.222045][ T2936] usb 2-1: string descriptor 0 read error: -22 [ 934.223342][ T2936] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 934.223946][ T2936] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 934.287027][ T2936] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 934.490313][ T92] usb 2-1: USB disconnect, device number 56 00:15:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1e, 0x0, &(0x7f0000000040)) 00:15:35 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x54, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x42, 0x1, 0x1, 0x0, 0x0, 0x7, [{{0x9, 0x4, 0x0, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@network_terminal={0x7}]}}}]}}]}}, 0x0) [ 935.911815][ T22] usb 1-1: new high-speed USB device number 36 using dummy_hcd 00:15:35 executing program 1: socket$inet6(0xa, 0x3, 0x1c) 00:15:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) 00:15:36 executing program 1: socket$inet6(0xa, 0x17f, 0x0) [ 936.161462][ T22] usb 1-1: Using ep0 maxpacket: 16 [ 936.281951][ T22] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 936.282437][ T22] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 936.282724][ T22] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 936.282951][ T22] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 [ 936.283205][ T22] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 936.442001][ T22] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 936.442435][ T22] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 936.442675][ T22] usb 1-1: Product: syz [ 936.442972][ T22] usb 1-1: Manufacturer: syz [ 936.443161][ T22] usb 1-1: SerialNumber: syz [ 936.483426][ T22] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 936.684613][ T9489] usb 1-1: USB disconnect, device number 36 00:15:38 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={0x0, 0x0, 0x38}, 0x18) 00:15:38 executing program 1: syz_io_uring_setup(0x6d53, &(0x7f00000001c0)={0x0, 0x6341, 0x8}, &(0x7f0000000240), &(0x7f0000000280)) 00:15:38 executing program 0: socket$inet6(0x2d, 0x0, 0x0) 00:15:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 00:15:38 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00'}) 00:15:38 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="50000000120001ee"], 0x50}}, 0x0) 00:15:38 executing program 1: r0 = socket(0xa, 0x2, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:15:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x19, 0x0, 0x0, 0x9}, 0x48) 00:15:38 executing program 1: r0 = socket(0xa, 0x2, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:15:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f0000000040)) 00:15:38 executing program 1: r0 = socket(0xa, 0x2, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:15:38 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[{{0x9, 0x5, 0x81, 0x3, 0x400}}]}}}]}}]}}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 00:15:38 executing program 1: r0 = socket(0xa, 0x2, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:15:38 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x7, [{{0x9, 0x4, 0x0, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[{{0x9, 0x5, 0x81, 0x3, 0x400}}], {}, {{0x9, 0x5, 0x3, 0x2, 0x3ff}}}}}]}}]}}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1, [{0xe6, 0x0}]}) [ 938.961578][ T9489] usb 1-1: new high-speed USB device number 37 using dummy_hcd [ 939.061718][ T8] usb 2-1: new high-speed USB device number 57 using dummy_hcd [ 939.211395][ T9489] usb 1-1: Using ep0 maxpacket: 16 [ 939.301407][ T8] usb 2-1: Using ep0 maxpacket: 16 [ 939.332293][ T9489] usb 1-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 0 [ 939.421768][ T8] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 939.422032][ T8] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 939.422293][ T8] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 939.422794][ T8] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1023 [ 939.571844][ T9489] usb 1-1: string descriptor 0 read error: -22 [ 939.572396][ T9489] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 939.572698][ T9489] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 939.613715][ T9489] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 939.662205][ T8] usb 2-1: language id specifier not provided by device, defaulting to English [ 939.791691][ T8] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 939.792094][ T8] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 939.792314][ T8] usb 2-1: Product: syz [ 939.792447][ T8] usb 2-1: Manufacturer: syz [ 939.793040][ T8] usb 2-1: SerialNumber: syz [ 939.815736][ T9489] usb 1-1: USB disconnect, device number 37 [ 939.822498][T12686] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 [ 939.853236][ T8] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 940.055656][ T94] usb 2-1: USB disconnect, device number 57 00:15:41 executing program 0: socket(0x11, 0x2, 0x3f) 00:15:41 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x40041, 0x0) [ 941.430295][T12711] random: crng reseeded on system resumption 00:15:41 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x48380) read$hidraw(r0, 0x0, 0x0) 00:15:41 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[{{0x9, 0x5, 0x81, 0x3, 0x400}}], {}, {{0x9, 0x5, 0x3, 0x2, 0x3ff}}}}}]}}]}}, 0x0) [ 941.891485][ T22] usb 2-1: new high-speed USB device number 58 using dummy_hcd [ 942.132135][ T22] usb 2-1: Using ep0 maxpacket: 16 [ 942.251639][ T22] usb 2-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 0 [ 942.412269][ T22] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 942.413140][ T22] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 942.413372][ T22] usb 2-1: Product: syz [ 942.413478][ T22] usb 2-1: Manufacturer: syz [ 942.413596][ T22] usb 2-1: SerialNumber: syz [ 942.432279][T12715] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 942.452769][ T22] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 942.664493][ T8] usb 2-1: USB disconnect, device number 58 00:15:43 executing program 0: r0 = eventfd2(0x51ec, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) 00:15:44 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x6c, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5a, 0x1, 0x1, 0x0, 0x0, 0x7, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@network_terminal={0x7, 0x24, 0xa, 0x0, 0x3e, 0x6}, @dmm={0x7, 0x24, 0x14, 0xcc8e, 0x1f}, @mbim_extended={0x8, 0x24, 0x1c, 0xa99e, 0x1}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x400, 0x55}}], {{0x9, 0x5, 0x82, 0x2, 0x400, 0x0, 0x5}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x0, 0x9, 0x80}}}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x0, 0xa5, 0xb5, 0x9, 0x20, 0x8}, 0x0, 0x0, 0x2, [{0xe6, 0x0}, {0x69, &(0x7f0000000200)=@string={0x69, 0x3, "3d3f661e5a3f420dca9d100d5faed1b6603a0f2b6aeabf11a92620e997773e098ac6a3eb50950627d5c0f222e7076f4e9aa60d642af7fb9c962835f3c7454c4074c47743c630e52ac289d278f42e69987b44cc75baa663ed9da93850ede35030d9ad73b8965d20"}}]}) 00:15:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x80000000007) 00:15:44 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), r0) 00:15:44 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, &(0x7f00000042c0)={0x2020}, 0x1959) [ 944.371589][ T8] usb 1-1: new high-speed USB device number 38 using dummy_hcd [ 944.611764][ T8] usb 1-1: Using ep0 maxpacket: 16 [ 944.731834][ T8] usb 1-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 0 [ 944.982795][ T8] usb 1-1: language id specifier not provided by device, defaulting to English [ 945.103090][ T8] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 945.103453][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 945.103558][ T8] usb 1-1: Product: syz [ 945.103641][ T8] usb 1-1: Manufacturer: 㼽Ṧ㽚ൂ鷊ഐ깟뛑㩠⬏ᆿ⚩瞗ा욊镐✆샕⋲ߧ乯Ꚛ損鳻⢖䗇䁌쑴䍷テ⫥观磒⻴顩䑻痌ꚺꦝ倸ぐ귙롳嶖 [ 945.104232][ T8] usb 1-1: SerialNumber: syz [ 945.122308][T12731] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 945.122721][T12731] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 945.143507][ T8] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 945.344494][ T92] usb 1-1: USB disconnect, device number 38 00:15:46 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x0, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r5, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r5, &(0x7f0000002080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x10, 0x60000000}}, @ip_pktinfo={{0x1c, 0x40000000, 0x8, {0x0, @local, @empty}}}], 0x30}}], 0x300, 0xa1c) 00:15:46 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x29c940, 0x0) 00:15:46 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x100) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r4, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r4, &(0x7f0000002080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x10, 0x60000000}}, @ip_pktinfo={{0x1c, 0x40000000, 0x8, {0x0, @local, @empty}}}], 0x30}}], 0x300, 0xa1c) 00:15:49 executing program 1: mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f00000002c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) 00:15:49 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x35) 00:15:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_FLAGS(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0xfffffffffffffd7c}}, 0x0) 00:15:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[], 0x5c}}, 0x0) 00:15:49 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$FUSE(r0, &(0x7f00000015c0)={0x2020}, 0x2020) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) 00:15:49 executing program 1: getgroups(0x2, &(0x7f00000023c0)=[0xee00, 0xee01]) 00:15:49 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, 0x0) 00:15:49 executing program 1: getresgid(&(0x7f0000000040), 0x0, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/63) 00:15:49 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x9}]}) 00:15:49 executing program 0: socketpair(0x28, 0x0, 0xa97a, &(0x7f0000000000)) 00:15:49 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, 0x0, 0xfecf) 00:15:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x9, 0x0, 0x3, 0x1f}, {0x0, 0x4, 0x2, 0x2}]}) 00:15:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000008c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:15:49 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, 0x0) 00:15:49 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getdents64(r0, 0x0, 0x0) 00:15:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x1) 00:15:49 executing program 0: memfd_create(&(0x7f0000000140)='/dev/vcsa\x00', 0x0) 00:15:50 executing program 0: r0 = shmget(0x0, 0x1000, 0x40, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000080)=""/20) getuid() getgroups(0x0, &(0x7f00000000c0)) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x200000, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000280)) shmctl$IPC_SET(r0, 0x1, &(0x7f00000002c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x80, 0x3, 0x80, 0x5, 0xffffffffffffffff, r1, 0x1ff}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000000)=""/124) 00:15:50 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$FUSE(r0, 0x0, 0xf0ffffff7f0000) 00:15:50 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x70840, 0x0) 00:15:50 executing program 0: timer_create(0x2, 0x0, 0x0) 00:15:50 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {}]}) 00:15:50 executing program 0: syz_clone(0xc0020180, 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:50 executing program 1: shmget(0x1, 0x1000, 0x10, &(0x7f0000ffc000/0x1000)=nil) 00:15:50 executing program 0: syz_clone(0xc0020180, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:50 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0xa6040, 0x0) 00:15:50 executing program 1: getresgid(&(0x7f0000002600), &(0x7f0000002640), &(0x7f0000002680)) 00:15:50 executing program 1: getresgid(&(0x7f0000002600), 0x0, 0x0) 00:15:50 executing program 0: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, 0x0) shmget(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) syz_clone(0xc0020180, 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 00:15:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0), r1) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), r0) 00:15:50 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0), r0) 00:15:50 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x8915, &(0x7f0000000000)) 00:15:50 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x8953, &(0x7f0000000000)) 00:15:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={0x0, 0x14}}, 0x0) 00:15:51 executing program 0: syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r0) 00:15:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r1) 00:15:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r0) 00:15:51 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) socket$kcm(0x29, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) syz_extract_tcp_res(0x0, 0x0, 0x0) 00:15:51 executing program 1: syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0), 0xffffffffffffffff) 00:15:51 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x60142, 0x0) fallocate(r0, 0x10, 0x3200, 0x10000) 00:15:51 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) [ 951.621524][ T9489] usb 1-1: new high-speed USB device number 39 using dummy_hcd [ 951.811721][ T9489] usb 1-1: device descriptor read/64, error -71 [ 952.091683][ T9489] usb 1-1: new high-speed USB device number 40 using dummy_hcd [ 952.281523][ T9489] usb 1-1: device descriptor read/64, error -71 [ 952.401852][ T9489] usb usb1-port1: attempt power cycle [ 952.811305][ T9489] usb 1-1: new high-speed USB device number 41 using dummy_hcd [ 952.901618][ T9489] usb 1-1: device descriptor read/8, error -71 [ 953.181720][ T9489] usb 1-1: new high-speed USB device number 42 using dummy_hcd [ 953.271375][ T9489] usb 1-1: device descriptor read/8, error -71 [ 953.392006][ T9489] usb usb1-port1: unable to enumerate USB device 00:16:06 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) socket$kcm(0x29, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) syz_extract_tcp_res(0x0, 0x0, 0x0) 00:16:06 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) rt_sigsuspend(&(0x7f0000000240), 0x8) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000940)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000680)) clock_gettime(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) accept4$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000380)={0x0, 0x3938700}, &(0x7f00000003c0)={[0x9]}, 0x8) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='lo\x00', 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000740)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000140)={{r2}, 0x10000, 0x1}) [ 966.771657][ T22] usb 1-1: new high-speed USB device number 43 using dummy_hcd [ 966.971911][ T22] usb 1-1: device descriptor read/64, error -71 [ 967.261599][ T22] usb 1-1: new high-speed USB device number 44 using dummy_hcd [ 967.461572][ T22] usb 1-1: device descriptor read/64, error -71 [ 967.582647][ T22] usb usb1-port1: attempt power cycle [ 968.002103][ T22] usb 1-1: new high-speed USB device number 45 using dummy_hcd [ 968.112075][ T22] usb 1-1: device descriptor read/8, error -71 [ 968.392190][ T22] usb 1-1: new high-speed USB device number 46 using dummy_hcd [ 968.512323][ T22] usb 1-1: device descriptor read/8, error -71 [ 968.631763][ T22] usb usb1-port1: unable to enumerate USB device 00:16:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000005d80)=[{{&(0x7f00000034c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000023c0)=[{&(0x7f0000005a40)="d3bed44e683202b569b414332e878bc95b827433e8e6fd7741475ad3ec5792bd4b166db01441d135591212e1b753ae1ceab92c707b8211e261e52c69919f0a8ee1c588c567b1cf37a693c5b5622f20bfaf7cbf7b4a9b0229608373a19ae9f521f6e38f60883b571cbb857aea150e4ca1051ceb38f79a9a8be02993aec7df4398ee8aab7ac6", 0x85}, {&(0x7f0000003600)="d4b571729af9e9f9ab4d8cafe1d936bb783bb8ab150e3f8412e947bd51f9bb3551d452d9a98e8d83f00088dc666ee1a88708643bc510ccf4f8e23b5de8f136949b1828d48a938cd9b3030a2bc7bca4d8fd2384ba1f940c1f148d7c1c3a967ff8a0100f80b54797087167cd62d9d182aaa175a3fae4681bc1b6095e12794279cb0a0b68ba6c951990a28e1f06cac29d51f87c3d949b3a8fddc21a2198233f67730641042c1b868e811275b2ad7cec259fa33ea7556bcda02ed2c80c06ee5abe8f965706886902d9499c59f817e2758ed6bb5c5b9e69bedd60f58a5e1ec2c1e51ba0fb318a849d80f26b9243926159c3798e8e3bb25cbe270d5e", 0xf9}, {&(0x7f0000003700)="91607841bd3b9c37031d951a52a995919ae313f3f9b0fe4907e9e6a3af9b594c2bb60728380d79e961c63af9d43843313044d9219a6fb93583f842e922ac9eca01631eb081a71d2797041a263bdbe2ae16eca9ff34494bd180327c71d0e2aa715ae1c8a26e1b057dfe0a89064b9f917d727aa6294a869f3eab04584dffcc71ad4eb4629abaae78cfb863acd15673124aa3d87bfd226129ef58aab2e9447ca4d1745a4a395515e7ca778aafb847e833bdf4f2e26dfebc49", 0xb7}], 0x3, &(0x7f00000037c0)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}], 0x18, 0x48044}}, {{0x0, 0x0, &(0x7f00000059c0)=[{&(0x7f0000003800)="5fb53fa04dac2c8d942c72503e9df8a19b1f676c8c51341ca8a1e5688bbffe6a98924e60a53624f4713c7528951a8376d33865f1c5c27954a3815e0729c15567a1bbcd628cae3e16b3727ab9d6d92aa4724a3373a968e63f9974f9157778d63f15804d24b4a31c5ef1e3a34a915ec564ad5f0c93889ee3c1dd65bd28c538e6460d2713010450618ae641f0b2f01e341cff48d8daea36df89198190b372c3af608545f56cf125c1", 0xa7}, {&(0x7f00000038c0)="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", 0x7dc}, {&(0x7f00000048c0)="d876695433926c84c64acdd69b97bfba824665be7d42a0d422ef6241f51f6df02fbe5c775277f99e0b408aa17d247046866b1c7a0c3567036dac31b9b8df81a88ac99d4f5e0bde5495324ce710b564107c53cca3bfa23f1f358091ce0a9525ad73463b596145d71809b3a8a6d4c6", 0x6e}, {&(0x7f0000004940)="17c13a35a5ace528cc663a6f2e79e8530dae0fd1a10c6a6bbd2a669a70e562c732fbe5aaf6606e4f6a9a5fd73be1197dd4d149b05530d588fadb4b43b336384dd68b5075971d5bd21abf5559b8d0f74cd3e0c63212aeeda19f", 0x59}, {&(0x7f00000049c0)}], 0x5, 0x0, 0x0, 0x20000814}}, {{&(0x7f0000005c00)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000005cc0)=[{&(0x7f0000005c80)="9bd436ffd033b0", 0x7}], 0x1, &(0x7f0000005d00)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0x60, 0x80080}}], 0x3, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000000500)=@ethernet={0x0, @local}, &(0x7f0000000700)=0x80) connect$unix(0xffffffffffffffff, &(0x7f0000003440)=@abs={0x1, 0x0, 0x4e20}, 0x6e) sched_setscheduler(r0, 0x1, &(0x7f00000022c0)=0x3) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r4 = open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) sendfile(r4, r3, 0x0, 0x100801700) 00:16:11 executing program 1: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f0000000080)={0x14, &(0x7f0000000000)={0x0, 0x5, 0x26, {0x26, 0x23, "2ca505718caea5634c728fccdf98bb7be96be96e42195fc4d55f3278b5394f2dd7672ef7"}}, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000004c0)={0x44, &(0x7f00000000c0)={0x20, 0x13, 0xb9, "a404fe86f247c3e9e6645e8e4e80c39cd86789060f8a86ee2ba97f9565d84f9fd6a7674e1959eafd0ce47bfc71e6307362ee8070e8152e2998a4d2ba69e2e8110051e987508d6383a02afdd2a6077c87be34dd7b70325526d9398500150628f3ef995e68eb26912556c15b4e71fce81f800757fa413e2e4d3a9199ebfd7d881e2d0f560a89030b3b4c345feb40c37595247323b61b15ce7ce3dbd5bd280d82a0fc135beba9946277918c31d9626df1b0a601c8db4492726523"}, &(0x7f0000000200)={0x0, 0xa, 0x1, 0x3f}, &(0x7f0000000240)={0x0, 0x8, 0x1, 0x8}, &(0x7f0000000280)={0x20, 0x80, 0x1c, {0x2, 0x1ff, 0x4, 0x7, 0x8000, 0x4, 0x7, 0xe3e, 0x6, 0x3f, 0xcf, 0x9}}, &(0x7f00000003c0)={0x20, 0x85, 0x4, 0x7fff}, &(0x7f0000000400)={0x20, 0x83, 0x2, 0x1}, &(0x7f0000000440)={0x20, 0x87, 0x2, 0x2}, &(0x7f0000000480)={0x20, 0x89, 0x2, 0x1}}) r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, &(0x7f00000005c0)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x4000095, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000700)={0x2c, &(0x7f0000000540)={0x0, 0x6, 0x68, {0x68, 0x3, "9b0f5fdfdd7c243fa1e975e8aca394cb7f1d414b8f202269dc8e1cab6218e040085f0965f2a37e56bd60d08f6eecc804bed709b6109d674622a11bf195bb4beb5ac8118df87f51a05ae59ddbaaebbd5d8d1b502bd0d05bf8860841bef4fa6c43fbe09f70c0ce"}}, &(0x7f0000000600)={0x0, 0x3, 0x3, @string={0x3, 0x3, "a0"}}, &(0x7f0000000640)={0x0, 0xf, 0x16, {0x5, 0xf, 0x16, 0x2, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0x7, 0x4, 0x8}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x6, 0x8, 0x8, 0x3}]}}, &(0x7f0000000680)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3f, 0x8, 0xc0, 0x9, "79d95bb7", "f8bfd9d9"}}, &(0x7f00000006c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x3, 0x0, 0xc1, 0xe5, 0xff, 0x7, 0x20}}}, &(0x7f0000000b40)={0x84, &(0x7f0000000740)={0x40, 0x0, 0x2, 'ot'}, &(0x7f0000000780)={0x0, 0xa, 0x1, 0x3}, &(0x7f00000007c0)={0x0, 0x8, 0x1, 0x8}, &(0x7f0000000800)={0x20, 0x0, 0x4, {0x2, 0x1}}, &(0x7f0000000840)={0x20, 0x0, 0x4, {0x100, 0x1}}, &(0x7f0000000880)={0x40, 0x7, 0x2, 0xea}, &(0x7f00000008c0)={0x40, 0x9, 0x1, 0x5}, &(0x7f0000000900)={0x40, 0xb, 0x2, "ccfb"}, &(0x7f0000000940)={0x40, 0xf, 0x2}, &(0x7f0000000980)={0x40, 0x13, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}}, &(0x7f00000009c0)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000a00)={0x40, 0x19, 0x2, "9f27"}, &(0x7f0000000a40)={0x40, 0x1a, 0x2, 0x9}, &(0x7f0000000a80)={0x40, 0x1c, 0x1, 0x1}, &(0x7f0000000ac0)={0x40, 0x1e, 0x1, 0x1}, &(0x7f0000000b00)={0x40, 0x21, 0x1, 0x3}}) r1 = socket(0x8000000010, 0x2, 0x0) write(r1, &(0x7f00000002c0)="fc0000001c000704ab5b2509b868030002ab087a0100000001481093210001c0f0030584050060100000000000039815fa2c53c28648000000b9d95662537a00bc000c00f0ff7f0000b400600033d44000040560916a0033f436313012dafd5a32e273fc83ab82d710f74cec184406f90d435ef8b29d3ef3d92c94170e5bba2e177312e081bea05d3a021e8ca062914a46ccfc510bb73c9455cdc8363ae4f5df77bc4cfd6239ec2a0f0d1bcae5fa0f5f9dcdd51af51af8502943283f4bb102b2b8f5566791cf190201ded815b2ccd243f395ed94e0ad91bd6433802e0784f2013cd1890058a10000c880ac801fe4af000049f0d4796f0000090548de", 0xfc) socket$inet_tcp(0x2, 0x1, 0x0) [ 971.921948][T12932] netlink: 'syz-executor.1': attribute type 12 has an invalid length. 00:16:21 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) socket$kcm(0x29, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) syz_extract_tcp_res(0x0, 0x0, 0x0) 00:16:21 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@un=@file={0xa}, 0xa) 00:16:21 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) bind$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) 00:16:21 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000001080), 0x98) [ 981.761356][ T2936] usb 1-1: new high-speed USB device number 47 using dummy_hcd [ 981.951386][ T2936] usb 1-1: device descriptor read/64, error -71 [ 982.221278][ T2936] usb 1-1: new high-speed USB device number 48 using dummy_hcd [ 982.411477][ T2936] usb 1-1: device descriptor read/64, error -71 [ 982.531809][ T2936] usb usb1-port1: attempt power cycle [ 982.941627][ T2936] usb 1-1: new high-speed USB device number 49 using dummy_hcd [ 983.032094][ T2936] usb 1-1: device descriptor read/8, error -71 [ 983.301350][ T2936] usb 1-1: new high-speed USB device number 50 using dummy_hcd [ 983.391343][ T2936] usb 1-1: device descriptor read/8, error -71 [ 983.511392][ T2936] usb usb1-port1: unable to enumerate USB device 00:16:36 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 00:16:36 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) socket$kcm(0x29, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) syz_extract_tcp_res(0x0, 0x0, 0x0) 00:16:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000240)=ANY=[@ANYBLOB="d2", @ANYRES32=0x0], &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000000)={r3}, &(0x7f00000000c0)=0xb0) 00:16:36 executing program 1: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x441) [ 996.911562][ T92] usb 1-1: new high-speed USB device number 51 using dummy_hcd [ 997.121527][ T92] usb 1-1: device descriptor read/64, error -71 [ 997.403345][ T92] usb 1-1: new high-speed USB device number 52 using dummy_hcd [ 997.591539][ T92] usb 1-1: device descriptor read/64, error -71 [ 997.711583][ T92] usb usb1-port1: attempt power cycle [ 998.131616][ T92] usb 1-1: new high-speed USB device number 53 using dummy_hcd [ 998.231575][ T92] usb 1-1: device descriptor read/8, error -71 [ 998.511498][ T92] usb 1-1: new high-speed USB device number 54 using dummy_hcd [ 998.622143][ T92] usb 1-1: device descriptor read/8, error -71 [ 998.742228][ T92] usb usb1-port1: unable to enumerate USB device 00:16:51 executing program 1: fsopen(&(0x7f00000014c0)='ocfs2_dlmfs\x00', 0x0) 00:16:51 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) socket$kcm(0x29, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) 00:16:51 executing program 1: bpf$MAP_CREATE(0x15, &(0x7f0000001980)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:16:51 executing program 1: bpf$MAP_CREATE(0x12, &(0x7f0000001980)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:16:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = dup2(r1, r0) sendmsg$NL80211_CMD_ABORT_SCAN(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 1012.031544][ T92] usb 1-1: new high-speed USB device number 55 using dummy_hcd [ 1012.221616][ T92] usb 1-1: device descriptor read/64, error -71 [ 1012.491523][ T92] usb 1-1: new high-speed USB device number 56 using dummy_hcd [ 1012.681598][ T92] usb 1-1: device descriptor read/64, error -71 [ 1012.801987][ T92] usb usb1-port1: attempt power cycle [ 1013.211473][ T92] usb 1-1: new high-speed USB device number 57 using dummy_hcd [ 1013.301815][ T92] usb 1-1: device descriptor read/8, error -71 [ 1013.571464][ T92] usb 1-1: new high-speed USB device number 58 using dummy_hcd [ 1013.661692][ T92] usb 1-1: device descriptor read/8, error -71 [ 1013.781741][ T92] usb usb1-port1: unable to enumerate USB device 00:17:06 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) socket$kcm(0x29, 0x0, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) 00:17:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x0, 0x6, 0x15, 0x882}, 0x48) 00:17:06 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000001480)) 00:17:06 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) [ 1027.071872][ T8] usb 1-1: new high-speed USB device number 59 using dummy_hcd [ 1027.261621][ T8] usb 1-1: device descriptor read/64, error -71 [ 1027.533258][ T8] usb 1-1: new high-speed USB device number 60 using dummy_hcd [ 1027.741521][ T8] usb 1-1: device descriptor read/64, error -71 [ 1027.861826][ T8] usb usb1-port1: attempt power cycle [ 1028.272057][ T8] usb 1-1: new high-speed USB device number 61 using dummy_hcd [ 1028.361842][ T8] usb 1-1: device descriptor read/8, error -71 [ 1028.631984][ T8] usb 1-1: new high-speed USB device number 62 using dummy_hcd [ 1028.721595][ T8] usb 1-1: device descriptor read/8, error -71 [ 1028.851824][ T8] usb usb1-port1: unable to enumerate USB device 00:17:16 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) socket$kcm(0x29, 0x0, 0x0) 00:17:16 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 1036.894270][ T29] audit: type=1400 audit(1036.850:332): avc: denied { read } for pid=13005 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 00:17:16 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) 00:17:17 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) 00:17:17 executing program 0: openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x80000, 0x0) 00:17:19 executing program 0: openat$damon_kdamond_pid(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 00:17:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x3) 00:17:19 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0xc0045103, &(0x7f0000000040)=0xffffffff) 00:17:19 executing program 0: openat$damon_kdamond_pid(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 00:17:19 executing program 1: syz_open_dev$dri(&(0x7f0000003a40), 0x0, 0x0) 00:17:19 executing program 0: openat$damon_kdamond_pid(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 00:17:19 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000840)={'wg0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:17:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:17:19 executing program 0: openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 00:17:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003f80)={0x0, 0x3, &(0x7f0000003e00)=@framed, &(0x7f0000003e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:17:19 executing program 0: openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 00:17:19 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) 00:17:19 executing program 0: openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 00:17:19 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0xc01c64ae, &(0x7f0000000100)) 00:17:19 executing program 0: shmget(0x3, 0x3000, 0x4b0968b4fca1af57, &(0x7f0000ffb000/0x3000)=nil) 00:17:20 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={0xffffffffffffffff}, 0x4) 00:17:20 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:17:20 executing program 1: syz_open_dev$hiddev(&(0x7f0000000740), 0x0, 0x0) 00:17:20 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, &(0x7f0000000500)) 00:17:20 executing program 1: process_madvise(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) 00:17:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 00:17:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x0, 0x0, 0x0, 0xc7, 0x1}, 0x48) 00:17:20 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001a80), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, 0x0) 00:17:20 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) process_madvise(r0, &(0x7f0000000800)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) 00:17:20 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f0000000400)) 00:17:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000440)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 00:17:20 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x200000, 0x10002) 00:17:20 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 00:17:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x30, &(0x7f0000000100)=""/48, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:17:20 executing program 1: ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) mkdirat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2\x00', 0x1ff) 00:17:20 executing program 0: syz_open_dev$dri(&(0x7f0000000140), 0x4, 0x4003) 00:17:20 executing program 1: syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 00:17:20 executing program 0: syz_open_dev$dri(0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x40401, 0x0) 00:17:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000840)={'wg0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) [ 1041.052643][T13081] random: crng reseeded on system resumption 00:17:21 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "743126e14bf4690c27daf99917e15792be9e608a1a4c72697ee076b933d853b4"}}) 00:17:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000fc0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000001080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0xa, 0x0, 0x0, @private2}}}, 0x48) 00:17:21 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001040)=@o_path={0x0, 0x0, 0x4010}, 0x18) 00:17:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000004900)={0x6, 0x2, &(0x7f0000004640)=@raw=[@map_fd], &(0x7f0000004680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:17:21 executing program 0: syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x10200) 00:17:21 executing program 1: ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, 0x0) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000001680), 0xa0000, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000016c0)={0xc}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) openat$drirender128(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:17:21 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f0000000400)) 00:17:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x5452, 0x0) 00:17:21 executing program 1: syz_io_uring_setup(0x2985, &(0x7f0000000100)={0x0, 0xd2e4, 0x8}, &(0x7f0000000180), &(0x7f00000001c0)) 00:17:21 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@rand_addr=' \x01\x00', @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast2}, 0x2, @in=@remote}}, 0xe8) 00:17:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0}) 00:17:21 executing program 0: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(0xffffffffffffffff, 0xc01064c1, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f00000006c0)={0x1d, 0x0, 0x2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80), 0x0) 00:17:21 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x5451, 0x0) 00:17:21 executing program 1: syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x4003) 00:17:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}) 00:17:21 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) 00:17:21 executing program 1: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000800)) [ 1041.871667][ T29] audit: type=1400 audit(1041.810:333): avc: denied { create } for pid=13116 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 00:17:21 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x42040) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0xc01064c5, &(0x7f0000000100)={&(0x7f00000000c0)=[r1], 0x1}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x40401, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r3, 0x3312, 0x81) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f0000000240)) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4}) 00:17:21 executing program 1: syz_clone3(&(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001f40)}, 0x58) [ 1041.987924][T13122] random: crng reseeded on system resumption 00:17:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000480), r0) 00:17:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000008c0)={0x14, r1}, 0x14}}, 0x0) [ 1042.038437][T13125] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:17:22 executing program 1: socketpair(0x1d, 0x0, 0x9, &(0x7f0000000080)) 00:17:22 executing program 1: openat$mice(0xffffffffffffff9c, &(0x7f0000002980), 0x0) 00:17:22 executing program 1: syz_io_uring_setup(0x1a62, &(0x7f0000000140)={0x0, 0x0, 0x2}, 0x0, 0x0) 00:17:22 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) 00:17:22 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, 0x0, 0x0) 00:17:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 00:17:22 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, 0x0) 00:17:22 executing program 1: syz_clone(0x200000, &(0x7f0000000100)="d3a6c9d799e3da930010b83e5ab9575507c6b05a3dd7158799e438101ce3192c44abd356e09adf544da655152eeb7a1355f599755e7a5438e7a5354131011f10c6925ef43fffef4887b4931d787de6eec6fd0ecc901df46603c4002ab8fefa166f9f3e63bb8799c5b2481dd0c667a522a02f7237bdbd5b2eefbd116068c53ee5042466024dd7914d9f3a272e81ee5801878f4592280a48fa19ddf782f0329754d9074bc49fd3fe972722a0d46004ef42ea08710e4dd154ede97d1cfdd2f9e01548e196f915aac764dcb3fd353a8a", 0xce, 0x0, &(0x7f0000000240), &(0x7f0000000280)) 00:17:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}}, 0x90) [ 1042.392870][ T29] audit: type=1400 audit(1042.350:334): avc: denied { ioctl } for pid=13141 comm="syz-executor.0" path="socket:[28259]" dev="sockfs" ino=28259 ioctlcmd=0x6410 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 00:17:22 executing program 0: ustat(0x23, &(0x7f0000000000)) 00:17:22 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000c80)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0, 0x0, 0x1, 0x1}) [ 1042.475001][ T29] audit: type=1400 audit(1042.430:335): avc: denied { getattr } for pid=13148 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 00:17:22 executing program 0: pipe2$9p(&(0x7f0000000000), 0x4080) 00:17:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800}, 0x90) 00:17:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000480), r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) [ 1042.582101][T13156] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1042.585179][T13156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13156 comm=syz-executor.1 00:17:22 executing program 1: syz_io_uring_setup(0x5c04, &(0x7f0000002780), 0x0, 0x0) syz_io_uring_setup(0x20f2, &(0x7f0000002880), &(0x7f0000002900), &(0x7f0000002940)) 00:17:22 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x30, &(0x7f0000000100)=""/48, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x90) 00:17:22 executing program 1: ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(0xffffffffffffffff, 0xc01064c5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200), 0xa2841, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x40401, 0x0) 00:17:22 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, 0x0) [ 1042.739395][T13163] random: crng reseeded on system resumption 00:17:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 00:17:22 executing program 0: syz_io_uring_setup(0x1d40, &(0x7f0000002480)={0x0, 0x0, 0x4}, &(0x7f0000002500), &(0x7f0000002540)) 00:17:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001ec0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0xffffffffffffff2e) 00:17:22 executing program 0: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0xfffffd50) 00:17:22 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x4e89a0fd26d979a2) 00:17:23 executing program 0: openat$mice(0xffffffffffffff9c, &(0x7f0000001080), 0x200800) 00:17:23 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001a80), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:17:23 executing program 1: ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 00:17:23 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x1000, &(0x7f00000000c0)={0x0, 0x74}, 0x20) 00:17:23 executing program 0: ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x40401, 0x0) 00:17:23 executing program 1: socket(0x1d, 0x0, 0x4e3) [ 1043.296015][T13186] random: crng reseeded on system resumption 00:17:23 executing program 0: syz_io_uring_setup(0x740a, &(0x7f0000000080)={0x0, 0x0, 0x100}, &(0x7f0000000100), &(0x7f0000000140)) 00:17:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003f80)={0x11, 0x3, &(0x7f0000003e00)=@framed, &(0x7f0000003e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003f00), &(0x7f0000003f40)}, 0x90) 00:17:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x5421, 0x0) 00:17:23 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0189436, 0x0) 00:17:23 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0xc0045103, 0x0) 00:17:23 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 00:17:23 executing program 0: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000700)={0xc}) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000007c0)={0xc}) 00:17:23 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000001280)={0x0, 0x0, 0x0}) 00:17:23 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f00000026c0)) 00:17:24 executing program 1: ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000001a80), 0x101800, 0x0) 00:17:24 executing program 0: socket(0x38, 0x0, 0x0) 00:17:24 executing program 1: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000002980), 0x0) 00:17:24 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) 00:17:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x99b3}]}) 00:17:24 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0}) 00:17:24 executing program 0: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002600)=@o_path={0x0}, 0x18) 00:17:24 executing program 1: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x3ba0, &(0x7f00000000c0)={0x38}) 00:17:24 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000840)={'wg0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000280)}, 0x90) 00:17:25 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x0}) 00:17:25 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003f80)={0x11, 0x3, &(0x7f0000003e00)=@framed, &(0x7f0000003e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x778e}, 0x90) 00:17:25 executing program 1: openat$drirender128(0xffffffffffffff9c, &(0x7f0000001a80), 0x101800, 0x0) 00:17:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000002000)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 00:17:25 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 00:17:25 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003f80)={0x11, 0x3, &(0x7f0000003e00)=@framed, &(0x7f0000003e40)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003ec0), 0x10}, 0x90) 00:17:25 executing program 1: syz_extract_tcp_res$synack(0x0, 0x1, 0x0) syz_clone3(&(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:17:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:17:26 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000002b00), 0x40101, 0x0) 00:17:26 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) syz_io_uring_setup(0x1a62, &(0x7f0000000140)={0x0, 0x0, 0x2}, &(0x7f00000001c0), &(0x7f0000000200)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001ec0), 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000002000)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 00:17:26 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x4}, 0x0) 00:17:26 executing program 1: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000005c0), 0x140, 0x0) 00:17:26 executing program 1: syz_io_uring_setup(0x1a62, &(0x7f0000000140)={0x0, 0xf6c9, 0x2, 0x0, 0x292}, &(0x7f00000001c0), &(0x7f0000000200)) openat$zero(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:17:26 executing program 0: syz_clone3(&(0x7f00000023c0)={0x20000400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:17:26 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, 0x0) 00:17:26 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x53d502, 0x0) 00:17:27 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001a80), 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000001cc0)) 00:17:27 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000000), 0x0) 00:17:27 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 00:17:27 executing program 1: socket(0x18, 0x0, 0xe5e) 00:17:27 executing program 0: openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) [ 1047.658612][ T29] audit: type=1400 audit(1047.610:336): avc: denied { create } for pid=13266 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 00:17:27 executing program 0: socket(0x1, 0x0, 0x5) 00:17:27 executing program 1: mkdirat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2\x00', 0x1ff) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) openat$cgroup_freezer_state(r0, &(0x7f00000003c0), 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x20000, 0x0) 00:17:28 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) 00:17:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x99b3, 0x40}, {}, {0x0, 0x0, 0x24}]}) 00:17:28 executing program 1: syz_emit_ethernet(0x16, &(0x7f0000000040)={@dev, @dev, @void, {@llc_tr={0x11, {@snap={0x0, 0x0, "a4", "4424e7"}}}}}, 0x0) 00:17:28 executing program 1: syz_genetlink_get_family_id$smc(&(0x7f0000000480), 0xffffffffffffffff) 00:17:28 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0045878, 0x0) 00:17:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) [ 1048.811452][T13286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13286 comm=syz-executor.1 00:17:28 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x8080) 00:17:28 executing program 0: openat$drirender128(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) 00:17:29 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x8080) 00:17:29 executing program 0: memfd_create(&(0x7f00000001c0)='sit0\x00', 0x0) 00:17:29 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x8080) 00:17:29 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x8080) 00:17:29 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:17:29 executing program 1: syz_open_dev$dri(0x0, 0x0, 0x8080) 00:17:29 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:17:30 executing program 1: syz_open_dev$dri(0x0, 0x0, 0x8080) 00:17:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000002000)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 00:17:30 executing program 1: syz_open_dev$dri(0x0, 0x0, 0x8080) 00:17:30 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x40401, 0x0) [ 1050.411905][T13312] random: crng reseeded on system resumption 00:17:30 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) 00:17:30 executing program 0: syz_io_uring_setup(0x1a62, &(0x7f0000000140)={0x0, 0x0, 0x2}, &(0x7f00000001c0), &(0x7f0000000200)) 00:17:30 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) 00:17:30 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) 00:17:30 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_val], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:17:30 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0189436, &(0x7f0000000080)={0x0, 0x0}) 00:17:30 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0x0}) 00:17:31 executing program 1: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) openat$mice(0xffffffffffffff9c, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x1, 0x84) 00:17:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) 00:17:31 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001040)=@o_path={&(0x7f0000001000)='./file0\x00', 0x0, 0x4010}, 0x18) 00:17:31 executing program 0: ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000001080)={0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000001a80), 0x101800, 0x0) 00:17:31 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@rand_addr=' \x01\x00', @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, 0xe8) 00:17:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003f80)={0x11, 0x3, &(0x7f0000003e00)=@framed, &(0x7f0000003e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003e80), 0x8, 0x10, 0x0}, 0x90) 00:17:31 executing program 1: quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000000)) 00:17:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001180), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_SET(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f00000011c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x44}}, 0x0) 00:17:31 executing program 1: quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000140)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x64}) 00:17:31 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)='l', 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000001280), 0x56) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002300)=""/4098, 0x1002}, 0x0) 00:17:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/protocols\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000012c0)={r0, 0x0, 0x0}, 0x10) 00:17:32 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, 0x0, 0x0) 00:17:32 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000e40)='net/rt_acct\x00') 00:17:32 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000600), 0xffffffffffffffff) 00:17:32 executing program 0: syz_io_uring_setup(0x1570, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2e1}, &(0x7f0000000180), &(0x7f00000001c0)) 00:17:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000b00)='net/tcp\x00') sendmsg$IPCTNL_MSG_CT_GET(r0, 0x0, 0x0) 00:17:34 executing program 0: socketpair(0x28, 0x0, 0x0, &(0x7f0000000dc0)) 00:17:35 executing program 1: r0 = openat$iommufd(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, 0x0) 00:17:35 executing program 0: syz_io_uring_setup(0x1570, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000180), &(0x7f00000001c0)) 00:17:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x18, 0x1, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 00:17:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x10000, &(0x7f00000001c0)=ANY=[@ANYBLOB='inode_readahead_blks=0x0000000000000000,nogrpid,debug_want_extra_isize=0x0000000000000066,dioread_nolock,max_batch_time=0x0000000000000008,resgid=', @ANYRESHEX=0x0, @ANYBLOB="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"], 0x0, 0x450, &(0x7f0000000dc0)="$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") setxattr$incfs_metadata(&(0x7f0000000000)='./file1\x00', &(0x7f0000000100), &(0x7f0000001700)="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", 0x401, 0x0) 00:17:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000700)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000100), 0xb) [ 1055.612593][T13371] loop1: detected capacity change from 0 to 512 [ 1055.642356][T13371] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 1055.882300][T13371] EXT4-fs (loop1): 1 truncate cleaned up [ 1055.882920][T13371] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 00:17:35 executing program 0: socketpair(0x28, 0x0, 0x3ff, &(0x7f0000000dc0)) [ 1055.923814][ T29] audit: type=1400 audit(1055.880:337): avc: denied { setattr } for pid=13370 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 00:17:35 executing program 1: io_setup(0x2, &(0x7f0000000000)=0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000001680)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f00000000c0)="63c06333076544", 0x7}]) [ 1055.976020][ T2991] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:17:36 executing program 0: r0 = openat$iommufd(0xffffff9c, &(0x7f0000000700), 0x622500, 0x0) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r0, 0x3b82, 0x0) 00:17:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) 00:17:36 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$setstatus(r0, 0x3, 0x0) 00:17:36 executing program 1: socketpair(0x0, 0x3, 0x5, &(0x7f0000001140)) 00:17:36 executing program 0: openat$cgroup_root(0xffffff9c, &(0x7f0000001200)='./cgroup/syz0\x00', 0x200002, 0x0) 00:17:36 executing program 0: syz_io_uring_setup(0x5a22, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffff9c, &(0x7f0000001200)='./cgroup/syz0\x00', 0x200002, 0x0) 00:17:36 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 00:17:36 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x3}, 0xc) 00:17:36 executing program 0: syz_clone(0x96000007, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) 00:17:36 executing program 1: openat$iommufd(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000e40)='net/rt_acct\x00') syz_io_uring_submit(0x0, 0x0, 0x0) 00:17:36 executing program 1: ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f0000000000)={0xc}) ioctl$IOMMU_VFIO_IOAS$GET(0xffffffffffffffff, 0x3b88, 0x0) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f0000000140)={0xc}) ioctl$IOMMU_OPTION$IOMMU_OPTION_HUGE_PAGES(0xffffffffffffffff, 0x3b87, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000e40)='net/rt_acct\x00') 00:17:36 executing program 1: r0 = socket$inet6(0x18, 0x1, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) dup2(r1, r0) fsync(r0) 00:17:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x89, 0x0) pwritev(r0, &(0x7f0000000200)=[{0x0}], 0x1, 0x0, 0x0) 00:17:38 executing program 1: setitimer(0x0, &(0x7f0000000000)={{0x0, 0x200}, {0x0, 0x2}}, 0x0) 00:17:38 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000002ec0), 0x0, 0x0) r2 = dup2(r0, r1) poll(&(0x7f0000000000)=[{r2}], 0x1, 0x0) 00:17:38 executing program 1: pipe(&(0x7f0000000800)={0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 00:17:38 executing program 0: r0 = socket$inet6(0x18, 0x2, 0x0) close(r0) recvmmsg(r0, &(0x7f0000001400), 0x10, 0x0, 0x0) 00:17:38 executing program 1: socketpair(0x2, 0x3, 0xf7, 0x0) 00:17:38 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x1}, 0x8) 00:17:38 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000140), 0x8) 00:17:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fcntl$lock(r0, 0x7, 0x0) 00:17:38 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0x0) poll(&(0x7f0000000040)=[{r0, 0x40}], 0x1, 0x0) 00:17:38 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x4da22e34af48fe94, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) 00:17:38 executing program 1: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4) 00:17:39 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="a3", 0x1}], 0x1000000000000236, 0xffffffff, 0x0) 00:17:39 executing program 1: poll(0x0, 0x0, 0x6) 00:17:39 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x4da22e34af48fe94, 0x0) 00:17:39 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$unix(r1, 0x0, &(0x7f0000000140)) 00:17:39 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) fcntl$lock(r0, 0x9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000100000000}) 00:17:39 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x200, 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) 00:17:39 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 00:17:39 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000000)=@in6={0x18, 0x2}, 0xc) 00:17:39 executing program 0: r0 = socket$inet6(0x18, 0x2, 0x0) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 00:17:39 executing program 1: socket(0x11, 0x3, 0x40) 00:17:39 executing program 1: socket$inet6(0x18, 0x4003, 0x0) 00:17:39 executing program 1: pipe(&(0x7f0000000800)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 00:17:39 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)={0x10, 0x1a, 0x1}, 0x10}], 0x1}, 0x0) 00:17:39 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000005440)='ns/cgroup\x00') [ 1059.788155][T13462] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pid=13462 comm=syz-executor.0 00:17:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)={0x10, 0x1e, 0x1}, 0x10}], 0x1}, 0x0) 00:17:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)={0x14, 0x16, 0x1, 0x0, 0x0, "", [@generic="da"]}, 0x14}], 0x1}, 0x0) 00:17:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x0, 0x7, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0xb}, 0x48) 00:17:39 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map, 0xffffffffffffffff, 0x4, 0x2000, 0x0, @link_id}, 0x20) 00:17:39 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x6, 0x136, [], 0x0, 0x0, &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x0, 0x0, 'veth1_macvtap\x00', 'bridge_slave_0\x00', 'ip6tnl0\x00', 'geneve1\x00', @broadcast, [], @multicast, [], 0x6e, 0x6e, 0xa6, [], [], @snat={'snat\x00', 0x10, {{@link_local}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x4}]}, 0x17e) 00:17:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wg1\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x2}, {}]}}) 00:17:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000640)={0x1ec4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x10e9, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x91, 0x0, 0x0, 0x0, @binary="dfb022286b7aa16dcba200f3a939f694cdd8a986ae27641089380c097425dd53dcb0dc5ec69eb7a29ff6510e8845d49fe838e1f3cdbbd73d2104ec1937a9f7c5a841286a6db9ea58c3a86c465a8343d7fc0bd4218117318309ea839bd3e92d740daac2af64481e550e6cc8023ad219ba6cf1b302307cdadb7583f925a375d5a205691b40b94ef8a90d72cbd227"}, @generic="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", @generic="22b92e17e0f2a25e4bcde6d4a0abe436839e481b6ebe24b2fc18366de5803ed92c925c305e37925785d3e00ffee02c9abfd7d2a489d90e6a845325749c2dfc6891884cfd148216d7d9"]}, @generic="91ff0c76b2ac520edf3007f2434d4c1ef176a2694cfc6a9432e868506b45461a1fd8c21662b7", @generic="f21129327d0af385961be39a3c1de69643cd1061171303d21151603265387c8872b92edda4a84dac7e6a448267ccefdda6a39050aaac3f43dd5fd1ff9f7b16355f4769a110fe2b1950f35d6dff9cda215ac339da4cd5ea1e267207b26b4f0a672fc62295aebc7d85a8681ccf04c7f7f092faf91a3042aaccc08389a34deb798f317913bab319405bf6ce0cd09c5b4b51d2525f4e3b10def9bd29d582d63c1157cf1d737ba77f89", @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @nested={0xced, 0x0, 0x0, 0x1, [@typed={0xe1, 0x0, 0x0, 0x0, @binary="0953bdb27eadbe36a543352a2f73b02b50aab1badc0e263911ac4bb45b6b5f763cde320b0df4e395e527e149d3b137f40e9dd64b8078c407c0672bc41515596296b0ef868331b6ed455caac62c61a8769a22b5fd328cdc0526ad3361975898012411d43da4a33b6d914190b905121ff625224f2d1815a2b2a92b4c09915d26d7ee21007aa889ba2df828d95340d65d0e39a63c046b129e550b3e700ae9bba2b28365c0e4a54fbbd5a27eb568d9529c322e0d3812a0d03b167f0c09c98419e4715d8d54b6553c31a3bdd5700ee4536ddad1f7521867c1ca48214cb981f7"}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="5d60542ec383d64cbebe09eb7b7d439a28433d217c7c1071b97199386b9da4210b09038c17d5d614aa33ca98c6207800c022524719303599458c08990f9043a04c6868c536e029004cf6cbe04160248fe2485be5dbc7f1127deaeae2ae030899099079b8f929d652f2a78311d4624f416b0d0c19f181aeb5490ea48e5ed1a738d523d5e2acd6002031f8b83b84071043bf95c4d35dc91485e2bdf3d1bc3c988f20fdfa0989f06743a96e6099d8a13de89b110e391c14b23667211cc7e728b0952c617932cf5f1419957991000cd78db7059b5ee8ad19c7af333564bbfa5453305d8c67f6b0bce3cf72934cd8a9be677228f90e44e1683e75a4070ec74aef627005ba64ec1c7d3818f2c3a4f3b46bdc90cc8fda68e8779c16a7b48c16bb18d88eebfa969d6fb78def6b769a6fba42dab678db267707bf555fabbc269ee591b2152dd99fa1989c7686495a07b7a32d8f7774745161442bbb3dccdb8a5a7c23d82a3cb3e3e587b73740f2863ea7952db1c6cfaed3aee2289d877e425135cbb070767b7cba57ce4ded0e2b86edd6996cc68bcdbb4ab72b8088371440968f86057fd44a7ffcef9773de6ee7786de2583f6e4e7c6559a4d0b6520fba449015960b2d1aedc1be429ab46d4a388c33f1058bcbec02bea209ecd472340fbb9be12d24ec306aafc6aaf23f77ee8721576535a3de0d5d56b4404af09341deab3988dd14d006c734387e4ecb23e127286ccfabef3e1d45a8391954f6cfd54b21d0dc05553c18a74c9be4316c9181870541e0cc11540a32a9d006ac540bfac93c6ded872103a4fe9a27e0f9ffdeb5055637113a5ea7da7f1fdbed9706c278a6b36b25a7ba6bedd8c8a314e51b777afbd6c606d7bfbd006e7ad45f629829f0b28bbfa9453a4ebccfd33beb84b83c47ba48db185544b13199cdc4d48803e7329a341ffc67dc0d12f3368081975580d42ee020d7efab95621da565d7b789855c58d25b1be660d978dff51d53cea60844b63d556577e64d9927f9dbb0c44869b759dc1a91c2adc4a10fd8a04fdfecf5a42dc8f620e83e67acc52e82247406c459ab7af313a2cd33fe0b585f3e31b2343daf3e44122a1afc6c17d66d559301028a0243f054f75c856b7fbedb0879690f654fdd21dcb3920c41b3053449fef91cc4b7ecc03c341f42b29699a080c28f237d8e161517acef932c9e0cde0948377483bc141d81009ccead95e30bf86bd01eb53b4aa72091844b387cb2308b8b81311f2e88ec811fb04ea9fb04174417f08794674dfa79eb1ff0c797f64a42abd918e804e1e7c0a9085ade0a386f5c70fe89318da1ebc32af65481874498c5ac52934db0b83a9dfbc8d6d116008bec8fefca77e3967af1489727a826b3a4007b6c2d868708732015e85cc816e151a9fdb156953e46b3b4fe8838915c5a8fccd067240ae4c3577d266712b22bc21e1a975275acd2195d4c53101caf6365fd30f483c1ef813f54db1e5834e92dd6190709014c3a173634f6dfc348882a22c8c8ddeb9d1f20ebbe4e01a0c277f17ab0268875e8a4e60e52f5e0122da0084bdaeb7156d10129c79ff22b7df65b60d68b2cd56c189bac29e4c8713fba1455cefd60ee3ba66ad60c27ac75cd9cf284179762f81c03b9247068b99373ba8153cb0bc39823eb51d0d53b829befc4ee61bfd64442898f1e3e3bf2211f50e2d9fde6260663337730e5f9c7937e95e42c492a587de023cd8f2376bf115cb8c9444bea60ee84b8e07c03a240c02b9754f77b629e28b9b8b4e8cf6221c865c619f596dbb5daace4e4f1c95e431a910b9b2bc8dcdb2722513c52ea059a4729bbca3058909ad6a41cafcd7e2e3444ac2c88fba580b8ccd7fdc8782dd6a4cbc16cf25ce30886dd5073b8a51732c7f7a3a4645760cb71a8b5d38fcbe7170ba78c694d88a5739e242d4dcf941eda22f4c3131039f8688a0c9da69380406edac90d27e90d32cd2b1e2ed7f71bde9c7ddc25f7aa39d331d677c9fea1f547f7e8db3e820f50f8b860955c15e1baa6e4ac9dd9d525511bf44cce53bca17967e5ece7722f1c62fb3fc91f7bb60d4b335bbdf3bdeefe78bd09de91d781e8b37b8c195917cacd60df7ab6e4fe1242fb170ff8dec2aa62c449632f78df0c4c48cafe1c2bdf1b5eebedc6a44902d1a1b8cab623cad0bfa5242e053726d936157192b5226e11e58c226f60a2887ab59eec0b24a2960fff8de031e37d29c56e949264f91f7cdbd4d4afae4981343805844f81a0f7bab41e35093e35b1848ea608f6eccae6c680db35c0b2f098420fd9dd748e3f95320e9f1b784bc38e3577a2faa1ad7c267504dfc3749ff6987e8f5f9514c0944af822411116e44bd5351f7a120e5113925d9f6d7fd45b9bf9b462671dc2e00546ea7b01f900caa8dee90a44b9c7c9f8da8db006752e9df5dfbe2424bdca4106d81864688a7c39876c9e8b9451b97517242e3278025346bb6acdcd7eecbebfa2388f27b4bd517776ddaf0002cb676b80c98b527c2cb5905526c79bca5d1d1e0580b71ba40ac0abc40ae6d391f0dff3bdd7421bb399a30a550c9a595067fa6a5a48a103f512d64cc8dd83ab4745c163cb36fe4fd944d8cb91d202e1a6eb9735a4b94a1430cb50114d713aedeced53b1a2685c81ce14cbe4f40f5e687397d25530e578d11b07fe9d8e17ba934c2cc7792987beeed9d07309e59a3251266f79cfe2c0d3a28dda68f457c26f7b57d7c2ea65600c64159ef51f6b2925a8d8202940190b360103c5e0a0cd43ae87f23204d9ecacd353c98a9f7468cc0c37d9d9d8a1ebec9da1c0406e9627017d64b7a5fe391bd0e5404d76bd4a65a59b7682b03055f3f34a26dcb1d5841d3234cb6e7333b6a87d77123604b50ad80b39c4e1bd724c181da26178ce47a9dd237a833c43c4020aecf2e63707050074e3869de0dd233bb0b09530192b57ade9e7e41c4203e28683b3606bd156f15002acdc95ee425cd15ba9f8a9b19d8e3bfa0ab10e2eeeb59551d09965721cb817b697740c8ea4b80ad46d381c26f242d01c1be8957ee42a87779ef75e5e3d775e3f169170323938ec1bbf96be7bb90157860f5fa0e6b8d472ef5f9ca7763c89b1768cfb75ffa75962e21f142a9a1edd2ad1efb8ccb1cf0df426df8b1237c377d1380f53886467c0446f1fbb726f41d563039d43ae317b8654c761f17c6434df642fa591dcf9cc65928314f32651645a081f9ac51688900244e85192b7a5b10d717ed2959be8305438fc92f9780b37ce5ee8c2167e7ea9866a26a6cda8d6a66b3c899b479f410785cbda23515a71b3408c6c136f1bef99533a60dfe20d336d721217b7b4620801c384be13db142823cd682eb2adde6155aedc9be7fb75d5672ee362c2a57c6b4b0cba1608eb3d6f33c77c219c6a06fc6e9775e11788ebb5c9fd97dcb77439fc784f85d018a1ed70348a3f3bc2c1d9b5f39c03231a0e6f025484932a89f1068c7dee782b3973cc72c74ed623b07ae7625358fbca3ea1e23e6503d13930572b6383243dd99fb1a619356005e9f2a3a0b42ce0eacb2e0d9543e34abbfd35ef6a1eaa4b69159b037e57cc2937279f21e9b4bbb6caf28f7908c54684c53245429d36b2d11b501f53967d8552dab42c5987ceed0a41e5cfe6c203abac372bf5f9f057574a7157c4478ee8453d923e07fffe443f40a09cbf639ed12efea632088af1cb20ef462daa05bfbf09f290444b8222d63cb76b0236251118de2da67367768e9bd3a1c7fa3d4873441c110b06dd46e2c0304e17a708ef224475333c60a83a4be31fa948257747a2170d76e77ec0d4b73ddeffd3383084734362858dec1757b01b12c5f8ac1cc4c00d91907e9ddc971ff441133f48c59fe6e82bde046e98bc088b1b5d2d68035bc7d581361fec22c5d5108e0b9bdbd1fd0fe49193a01c7b63d5d9ec19fca962ec894e443bd1ca5dd6d623f21d3ac8b1427abbe17e9fc3221421900d1d98ea07ba1326a27155b4ea11f36d44a6f8fbdb318a5af4568aea08b4beee8f327a61a1425504d90eafd56fa32a6bdeac12d24941acc3c8a96d38cfe4f8caaad2c4b58fe6b5032b371e40f81e1282cd64d897c061ab70cc7a7062d9e76b532b75b3fefbaf3149e73d16688ae5f537223ec86ec8e61f1aaf599aa64d7c87e945fc293af86360d68502a050cfc329e43659092807857a10891f8e9e3223ddb80063bee61444ac9611cab33f99f6b906caef61dfa8929a273b74f2404358036b01fc294833020f19b0a700a1d89eb97623903f44f1ee1191d21912d7615bc14e5f13dbb47dbe6d446fd0cf62de5418c975ef3c17b8d2efddd2d8655bbb636353116a49"]}]}, 0x1ec4}], 0x1}, 0x0) 00:17:40 executing program 0: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={0x0}, 0x18) 00:17:40 executing program 1: syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "103ff2", 0x14, 0x2b, 0x0, @empty, @local, {[], {{0x3, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) 00:17:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x80000001, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r0) 00:17:40 executing program 0: r0 = socket(0x840000000002, 0x3, 0xff) sendmmsg$inet(r0, &(0x7f0000004040)=[{{&(0x7f0000001740)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001940)=[{&(0x7f0000001780)="0b1a6fd55c7ebf173a906106be4b457a20e6e704ba3a78afcc663ba45a941a89f19e33aa28aeeb9ed1da4077a595e557123ce1a4", 0x34}], 0x1}}, {{&(0x7f00000019c0)={0x2, 0x0, @private}, 0x10, 0x0, 0x0, &(0x7f0000006400)=ANY=[@ANYBLOB="10000000000000000000000007000000cc000000000000000000000007000000444c"], 0xe0}}], 0x2, 0x0) 00:17:40 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x21c802, 0x0) 00:17:40 executing program 1: r0 = socket(0x22, 0x2, 0x2) getsockname$netlink(r0, 0x0, 0x0) [ 1060.593639][ T29] audit: type=1400 audit(1060.550:338): avc: denied { create } for pid=13488 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 00:17:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000740)=[{{&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x20}}], 0x1, 0x0) 00:17:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, "", [@generic="da"]}, 0x33fe0}], 0x1}, 0x0) 00:17:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}}, 0x0) 00:17:40 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x20040, 0x0) 00:17:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)={0x14, 0x16, 0x1, 0x0, 0x0, "", [@generic="da668d"]}, 0x14}], 0x1}, 0x0) 00:17:40 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:17:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc) 00:17:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) [ 1061.113409][ T29] audit: type=1400 audit(1061.070:339): avc: denied { bind } for pid=13505 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 00:17:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890b, &(0x7f0000000580)={@private2, @loopback, @ipv4={'\x00', '\xff\xff', @multicast2=0xe0000003}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x184180046, r2}) 00:17:41 executing program 0: r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000540)={0x2, 0x0, @dev}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:17:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x3}, 0x48) 00:17:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}}) 00:17:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x1) syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @random="4ba8f2b9c2de", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x1c, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}]}}}}}}}}, 0x0) 00:17:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000055c0)=""/4118, 0x1016}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:41 executing program 0: r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000540)={0x2, 0x0, @dev}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00']}, 0x178) 00:17:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a0, 0x0, 0x9403, 0x0, 0x0, 0x2c0, 0x3d0, 0x3d8, 0x3d8, 0x3d0, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x2d2, 0x1, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev, [], [], 'batadv_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) 00:17:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000036c0)={0x0, 0x0, &(0x7f0000003500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 00:17:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5}]}, 0x1c}}, 0x0) 00:17:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000055c0)=""/4118, 0x1016}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000004bc0)=ANY=[], 0x22e4}], 0x1}, 0x0) 00:17:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}]}, 0x28}}, 0x0) 00:17:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x141b}, 0x48) 00:17:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000055c0)=""/4118, 0x1016}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:46 executing program 0: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 00:17:46 executing program 0: bpf$BPF_PROG_QUERY(0xe, &(0x7f0000000100)={@ifindex, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:17:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@btf_id], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:17:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000055c0)=""/4118, 0x1016}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)={0x10, 0x16, 0x1}, 0x10}], 0x1}, 0x0) 00:17:49 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) chown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 00:17:49 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000001, &(0x7f0000001ec0)={0x0, 0x3938700}) 00:17:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:51 executing program 0: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000040)=ANY=[], 0x1008, 0x2, 0x1800) 00:17:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:52 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000019c0), 0x0, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0xffffffffffffff6a) 00:17:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:52 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002000, &(0x7f0000001ec0)={0x0, 0x3938700}) 00:17:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x10004) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/30, 0x1e}], 0x1) 00:17:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002800), 0x0, 0x0) readv(r0, &(0x7f00000031c0)=[{&(0x7f00000029c0)=""/249, 0xf9}, {&(0x7f0000002ac0)=""/252, 0xfc}], 0x2) 00:17:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000002940), 0x0, 0x0) fcntl$getflags(r0, 0x1) 00:17:55 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 0: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') renameat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 00:17:55 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) fcntl$lock(r0, 0x7, 0x0) 00:17:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) [ 1075.785606][ T29] audit: type=1400 audit(1075.740:340): avc: denied { lock } for pid=13604 comm="syz-executor.0" path="socket:[30064]" dev="sockfs" ino=30064 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 00:17:55 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x9, &(0x7f0000000040)) 00:17:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 00:17:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:55 executing program 0: mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) 00:17:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read(r0, &(0x7f0000000040)=""/138, 0x8a) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000240), 0x10, 0x0) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: pipe(&(0x7f0000000000)) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) 00:17:56 executing program 0: r0 = socket$inet(0x2, 0x4003, 0x0) recvmmsg(r0, &(0x7f0000000280), 0x10, 0x0, 0x0) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000002940), 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: msgget(0x0, 0x616) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: fcntl$lock(0xffffffffffffffff, 0x9, 0x0) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:56 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0xc3ad8d91f150e14e, &(0x7f0000000780)}, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x20, 0x0) open$dir(0x0, 0x0, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f40)=[{0x0}], 0x1, &(0x7f0000000f80)=""/43, 0x2b}, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 0: accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) clock_gettime(0x2, &(0x7f0000000140)) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f", 0x12) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f", 0x12) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000001000)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x8) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f", 0x12) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 0: r0 = socket(0x11, 0x3, 0x0) getsockopt(r0, 0x0, 0x0, &(0x7f00000007c0)=""/246, &(0x7f0000000740)=0xf6) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389", 0x15) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) getpeername(r0, 0x0, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53", 0x17) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53", 0x17) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53", 0x17) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:58 executing program 0: r0 = socket$inet(0x2, 0x4003, 0x0) ioctl$FIONREAD(r0, 0x4004667f, &(0x7f0000000000)) 00:17:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:58 executing program 0: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{}, {0x0, 0x8000000000000001}}, 0x0) 00:17:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) accept$alg(r0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:58 executing program 0: r0 = socket$inet(0x2, 0x4003, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x0, 0x100000001}, 0x10) 00:17:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) accept$alg(r0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:58 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file1\x00'}, 0xa) 00:17:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) accept$alg(r0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="c6928ed272d8c2c4a95a7324ae04a2173b194ba653ec80567c8134b7b2b3419e3829909a7cc6b9b2d233a4fd9b1179e1d84b8b437fc376d1e8834bdd4f8b99d18c1e9fef2b208186cbd81c025570416e2e4810c36b2ebe2f81e93b7d3decf7a8884560894fffc20cae0a4f2f895b03c31732e847ca7a", 0x76}, {&(0x7f0000000200)="693cf13aee86cca60a83c741073b2d5657948c3ecf918d11893e", 0x1a}, {&(0x7f0000000440)="3cf3a4ae544535c55fbea2f6e13e9e99719884e9871ece8941c2de50269e4f815f5fad756c0f14badcc77039a13bd94dc00bdfe086ff3221814920acedc27ceec3a83aa1ea12dc146f6f3842c149a43396390a57f35f389052048f2df665fd6ab0d4a7770419b7a0b47531308d08e4aa2abb2964f933461cf582561d41e7867c9cddd1afd418eae9f2fe4f16eb1defd3", 0x90}], 0x3}}], 0x1, 0x0) 00:17:58 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$inet(r0, &(0x7f0000000300), &(0x7f0000000340)=0xc) 00:17:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8db4c6d3916872c4d26e8e39f30e9ce9ab2f204389cf53c6", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$inet(r1, 0x0, 0x0, 0x0) 00:17:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, &(0x7f0000001f00), &(0x7f0000002140)=0x206) 00:17:58 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) 00:17:58 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003780)={0x0, 0x7fffffff}) 00:17:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@cred], 0x20}, 0x0) 00:17:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 00:17:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200, 0x0) 00:17:58 executing program 0: fchmod(0xffffffffffffffff, 0x8ae0aca0a00c85fb) 00:17:58 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) shmdt(0x0) 00:17:58 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000001000)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f00000004c0)='./file0\x00', r0, &(0x7f0000000500)='./file0\x00') 00:17:58 executing program 0: socketpair(0x6, 0x0, 0x7, 0x0) 00:17:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)=[{0x0}, {&(0x7f0000001080)="95", 0x1}], 0x2}, 0x0) 00:17:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 00:17:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) rmdir(&(0x7f0000000040)='./file1\x00') 00:17:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 00:17:59 executing program 1: r0 = getpgrp(0x0) setpgid(0x0, r0) 00:17:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="95", 0x1}], 0x2}, 0x0) 00:17:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000000080)="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", 0x801}], 0x1}, 0x0) 00:17:59 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 00:17:59 executing program 1: shmget(0x1, 0x2000, 0x280, &(0x7f0000ffc000/0x2000)=nil) 00:17:59 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', 0x0) 00:17:59 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x189041, 0x0) 00:17:59 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="bf", 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000000b80), 0x50, 0x0) 00:17:59 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x20) 00:17:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000180)={0x2a, 0x6, 0x0, {0x0, 0x0, 0x1, 0x0, '%'}}, 0x2a) 00:17:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x2}, 0x8) [ 1079.680353][T13772] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=13772 comm=syz-executor.0 00:17:59 executing program 1: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000040)='./file0\x00', 0x268442, 0x7) 00:17:59 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x0, 0x91) 00:17:59 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x8c1, 0x176) [ 1079.808376][ T29] audit: type=1804 audit(1079.760:341): pid=13777 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir1867395172/syzkaller.DFBzc6/2026/file0/.log" dev="vda" ino=693 res=1 errno=0 00:17:59 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x80a41, 0x2c) 00:17:59 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) write$FUSE_NOTIFY_DELETE(r1, 0x0, 0x0) 00:17:59 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) openat$incfs(r0, &(0x7f0000000d80)='.log\x00', 0x500, 0x81) 00:17:59 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x4140, 0x66) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x200, 0x1) [ 1080.115991][ T29] audit: type=1804 audit(1080.070:342): pid=13787 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir1867395172/syzkaller.DFBzc6/2028/file0/.log" dev="vda" ino=692 res=1 errno=0 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x2000, 0xb0) [ 1080.241558][ T29] audit: type=1804 audit(1080.190:343): pid=13793 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir2912992488/syzkaller.LDCB8n/2040/file0/.log" dev="vda" ino=702 res=1 errno=0 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x0) 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x40, 0x0) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000002180)='./file0\x00', 0x200, 0x103) 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000180)='./file0\x00', 0x4, 0x0) 00:18:00 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/devices/virtual', 0x0, 0x0) faccessat(r0, &(0x7f0000000300)='.\x00', 0x2) 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x1) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0xa8a40, 0xc1) 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0xee01, 0x1000) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1000, 0x103) 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x204802, 0x29) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0) 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000002180)='./file0\x00', 0x0, 0x103) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:18:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_STORE(r0, 0x0, 0xfffffcc2) 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000000)='./file0\x00', 0xee01, 0xee01, 0x0) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000180)='./file0\x00', 0x4, 0x300) 00:18:00 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[], 0x2b) read$FUSE(r1, 0x0, 0x0) 00:18:00 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0xee00, 0x0) 00:18:00 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000000)='./file0\x00', 0xee01, 0x0, 0x0) 00:18:01 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x8cd41, 0x84) 00:18:01 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0xa8a40, 0x1b8) 00:18:01 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000080)='./file0\x00', 0x6, 0x1300) 00:18:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 00:18:01 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x84841, 0x2c) 00:18:01 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x80841, 0x2c) 00:18:01 executing program 1: syz_open_dev$hidraw(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$hidraw(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x3a, &(0x7f0000000240)) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$HIDIOCGRAWNAME(0xffffffffffffffff, 0x80404804, 0x0) write$hidraw(r0, &(0x7f0000000000), 0x0) r4 = memfd_create(&(0x7f0000000480)='\xb9\xecm1\xc1\xf8\xa6\x8d\xc1\xe2zMN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r4, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000800)=ANY=[@ANYBLOB=',\x00\x00\x00\a'], 0x2c) sendfile(r4, r4, &(0x7f0000001000), 0xffff) 00:18:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 00:18:01 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0xa0a40, 0x110) 00:18:01 executing program 0: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x100098, &(0x7f0000000200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 00:18:03 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) openat$incfs(r0, &(0x7f0000000100)='.log\x00', 0x2001, 0x188) 00:18:03 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x101201, 0xa1) 00:18:03 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000080)='./file0\x00', 0x6, 0x1100) 00:18:03 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) openat$incfs(r0, &(0x7f0000000d80)='.log\x00', 0x0, 0x81) [ 1084.091219][ T29] audit: type=1804 audit(1084.040:344): pid=13860 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir2912992488/syzkaller.LDCB8n/2056/file0/.log" dev="vda" ino=701 res=1 errno=0 00:18:04 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000180)='./file0\x00', 0x4, 0x100) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x842, 0xc1c77ba1a994f692) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0xee01, 0x1000) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x6, 0x300) 00:18:04 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000002180)='./file0\x00', 0x0, 0x103) renameat2(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x88841, 0x0) openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x40200, 0x118) 00:18:04 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) faccessat2(r0, &(0x7f0000001580)='./file0\x00', 0x2, 0x200) [ 1084.446577][ T29] audit: type=1804 audit(1084.400:345): pid=13873 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir2912992488/syzkaller.LDCB8n/2060/file0/.log" dev="vda" ino=690 res=1 errno=0 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000003400)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) 00:18:04 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/class/power_supply', 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0xffffffffffffff22) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000001c0)='.log\x00', 0x88a41, 0x8e) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x10d143, 0x86) 00:18:04 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000200)='.log\x00', 0xac242, 0x1ba) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x1) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) faccessat2(r1, &(0x7f0000000000)='./file0\x00', 0x2, 0x100) 00:18:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000340)=ANY=[], 0xfffffcc2) 00:18:04 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x1a9940, 0xa0) 00:18:04 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000002140)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0xc8841, 0x0) 00:18:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) 00:18:04 executing program 0: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe72) 00:18:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:18:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, 0x0, 0xffffffffffffffc8) 00:18:05 executing program 1: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 00:18:05 executing program 0: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x90, 0x0, 0x0) 00:18:05 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000003400)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0xc000, 0x0) open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 00:18:05 executing program 0: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x4, 0x0, 0x0) 00:18:05 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x5451, 0x0) 00:18:05 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom1\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00', 0x0, 0x0) 00:18:05 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000100c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x840000c0) 00:18:05 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) 00:18:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'netdevsim0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='%']}) [ 1085.564331][ T29] audit: type=1326 audit(1085.520:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13918 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:05 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 00:18:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x30}]}) 00:18:08 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x4) 00:18:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x60, 0x0, 0x0, 0x7f}]}) 00:18:08 executing program 0: syz_emit_ethernet(0x256, &(0x7f0000000680)=ANY=[@ANYBLOB="bb"], 0x0) 00:18:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0xa, 0x0, 0x0, 0x0, 0x4}, 0x48) 00:18:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6c}, {0x6}]}) 00:18:08 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x5450, 0x0) [ 1088.562552][ T29] audit: type=1326 audit(1088.510:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13935 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 [ 1088.802756][ T29] audit: type=1326 audit(1088.740:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:09 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082104, 0x0) [ 1089.581591][ T29] audit: type=1326 audit(1089.520:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13939 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x64}]}) 00:18:11 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x81) 00:18:11 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={0x0, 0x3, r1}) [ 1091.613847][ T29] audit: type=1326 audit(1091.570:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13947 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x8, 0x0) 00:18:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'netdevsim0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="01"]}) 00:18:12 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x5450, 0x0) [ 1093.300353][ T29] audit: type=1326 audit(1093.250:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13954 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'netdevsim0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='/']}) 00:18:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x1d}]}) 00:18:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") mount(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x1020, 0x0) [ 1094.882586][T13963] loop1: detected capacity change from 0 to 128 [ 1094.929416][T13963] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 1094.973827][ T2991] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. 00:18:15 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40049409, 0x0) 00:18:15 executing program 1: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e1d113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) io_submit(r0, 0x1, &(0x7f0000000ac0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000140)="04", 0xdf}]) sendmsg$nl_route(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r4, 0x5609, 0x0) [ 1096.148220][ T29] audit: type=1326 audit(1096.100:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13969 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x19400, 0x0) 00:18:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x16}, {0x6}]}) 00:18:18 executing program 1: syz_clone3(&(0x7f0000000380)={0x20000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1098.827497][ T29] audit: type=1326 audit(1098.780:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:18 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) [ 1099.034330][ T29] audit: type=1326 audit(1098.990:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13984 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6}, {0x6}]}) [ 1099.531561][ T29] audit: type=1326 audit(1099.470:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13989 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:19 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x2, 0x0) [ 1100.255329][ T29] audit: type=1326 audit(1100.210:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13994 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'netdevsim0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="1e"]}) 00:18:21 executing program 1: syz_emit_ethernet(0x36, &(0x7f00000001c0)={@broadcast, @local, @val, {@ipv6}}, 0x0) 00:18:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001180)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f00000010c0)=[{&(0x7f0000000040)='o', 0x1}], 0x1, &(0x7f00000011c0)=ANY=[@ANYBLOB="1c000000840000000a00000057a199681c2a879fb9640b7d2f84d84214000000840000000700000003000000ff07000014000000840000000700000002"], 0x44}, 0x0) 00:18:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$unix(r2, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@rights, @rights], 0x18}, 0x0) 00:18:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000700)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000700)={0x10, 0x2}, 0x10) 00:18:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001780)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0), 0x98) 00:18:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x2, 0x0) getpid() getpid() sendmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)=[@cred, @cred], 0x40}, 0x0) 00:18:23 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 00:18:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000180), 0x8c) 00:18:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), 0x69) 00:18:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x80) 00:18:23 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) 00:18:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), 0xff7c) [ 1103.887138][ T29] audit: type=1326 audit(1103.840:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14023 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x80000000, 0x0, 0x49}, 0x98) 00:18:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f0000001640)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000001580)=[@prinfo={0x14, 0x84, 0x7, {0xf}}, @sndrcv={0x2c}], 0x40}, 0x0) 00:18:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = signalfd4(r0, &(0x7f00000002c0), 0x8, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10842, 0x0) pwrite64(r2, &(0x7f0000000080)='=', 0x1, 0x800b5eb) sendfile(r1, r2, 0x0, 0x1000000000006) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r1, 0xc099}], 0x1, 0x0, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f00000000c0)=""/52, 0x59) 00:18:26 executing program 1: syz_emit_ethernet(0x5e, &(0x7f0000000100)={@local, @remote, @val, {@ipv6}}, 0x0) 00:18:26 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) fchdir(r0) [ 1106.751346][ T29] audit: type=1800 audit(1106.700:358): pid=14037 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=700 res=0 errno=0 00:18:27 executing program 1: timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x301, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') sendfile(r0, r1, 0x0, 0x8001) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f0000000740)=0x205, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r2, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) listen(r2, 0xc2) 00:18:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x41}, 0x98) 00:18:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) ioctl$KDGKBLED(r2, 0x5450, 0x0) 00:18:29 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000001e80), &(0x7f0000001ec0)={'fscrypt:', @desc4}, &(0x7f0000000700)={0x0, "8a3329dfabdcfc96b8de34afa184a7ff66d679d8a1e600763e91f02e91e15fe42a8b6623d1835b3df81d22b7c0f6161ab7dc343e1530e10f0e275f0f97a820fc"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) 00:18:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) ioctl$KDGKBLED(r2, 0x5450, 0x0) 00:18:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3, 0xff, 0x9, 0x1}, {0x7, 0x8, 0x7f, 0x100}, {0x6, 0x0, 0x0, 0x4}]}) 00:18:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) ioctl$KDGKBLED(r2, 0x5450, 0x0) 00:18:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) ioctl$KDGKBLED(r2, 0x5450, 0x0) [ 1109.928167][ T29] audit: type=1326 audit(1109.880:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14056 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:18:30 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0) 00:18:30 executing program 0: socketpair(0x18, 0x0, 0x75, &(0x7f00000000c0)) 00:18:30 executing program 1: keyctl$describe(0x15, 0x0, 0x0, 0x0) 00:18:30 executing program 1: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000001e80), &(0x7f0000000000), &(0x7f0000001f00)={0x0, "8a3329dfabdcfc96b8de34afa184a7ff66d679d8a1e600763e91f02e91e15fe42a8b6623d1835b3df81d22b7c0f6161ab7dc343e1530e10f0e275f0f97a820fc"}, 0x48, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r1, 0xffffffffffffffff, 0x0) 00:18:30 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x4, &(0x7f0000000300)=@lang_id={0x4}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x445}}, {0x0, 0x0}]}) 00:18:30 executing program 0: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000180)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}, 0x0, 0x0, 0x0) [ 1110.983963][T14076] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 00:18:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 00:18:31 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @auto=[0x39, 0x31]}, &(0x7f00000004c0)={0x0, "c2a7ba0bc8aaaeab3396562e087c3b03cf4b5aef9c86c6f49ef972f97637ace8f6d8587120a5a245115cf725cea6058868a4fc8fed9f36f66bd7b0f0352b429e"}, 0x48, 0xfffffffffffffffc) keyctl$describe(0x6, r0, &(0x7f0000000e40)=""/4096, 0x1000) [ 1111.211441][T14057] usb 2-1: new high-speed USB device number 59 using dummy_hcd [ 1111.512767][T14057] usb 2-1: Using ep0 maxpacket: 32 [ 1111.644450][T14057] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1112.002649][T14057] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1112.004079][T14057] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1112.004600][T14057] usb 2-1: Manufacturer: х [ 1112.005840][T14057] usb 2-1: SerialNumber: syz [ 1112.095483][T14057] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 1112.393613][T14057] usb 2-1: USB disconnect, device number 59 00:18:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000001e80), &(0x7f0000000000), &(0x7f0000001f00)={0x0, "8a3329dfabdcfc96b8de34afa184a7ff66d679d8a1e600763e91f02e91e15fe42a8b6623d1835b3df81d22b7c0f6161ab7dc343e1530e10f0e275f0f97a820fc"}, 0x48, r0) keyctl$describe(0x6, r1, 0x0, 0x0) 00:18:33 executing program 0: timer_create(0x2, &(0x7f0000000100)={0x0, 0xd, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000140)) 00:18:34 executing program 1: r0 = socket(0x11, 0x2, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 00:18:34 executing program 0: timer_create(0x0, &(0x7f0000000200)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000180)) 00:18:34 executing program 1: add_key$user(&(0x7f0000000e00), 0x0, 0x0, 0x4800, 0x0) 00:18:34 executing program 0: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000180)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@blksize}, {}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfshat={'smackfshat', 0x3d, '&@-'}}, {@subj_type={'subj_type', 0x3d, '}'}}]}}, 0x0, 0x0, 0x0) 00:18:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000001e80), &(0x7f0000000000), &(0x7f0000001f00)={0x0, "8a3329dfabdcfc96b8de34afa184a7ff66d679d8a1e600763e91f02e91e15fe42a8b6623d1835b3df81d22b7c0f6161ab7dc343e1530e10f0e275f0f97a820fc"}, 0x48, r0) [ 1114.789290][T14103] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 00:18:34 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x4, &(0x7f00000002c0)=@lang_id={0x4}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x407}}, {0x0, 0x0}]}) 00:18:34 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000000), &(0x7f0000000040)=ANY=[@ANYBLOB='e'], 0x0, 0x0) 00:18:35 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f00000002c0)=@lang_id={0x4}}, {0x10, &(0x7f0000000380)=@string={0x10, 0x3, "39d6c853e9286e7485e306b431d9"}}]}) [ 1115.332001][T14004] usb 2-1: new high-speed USB device number 60 using dummy_hcd [ 1115.542349][T13981] usb 1-1: new high-speed USB device number 63 using dummy_hcd [ 1115.601633][T14004] usb 2-1: Using ep0 maxpacket: 32 [ 1115.731746][T14004] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1115.781461][T13981] usb 1-1: Using ep0 maxpacket: 32 [ 1115.911669][T13981] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1116.111879][T13981] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1116.112417][T13981] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1116.112631][T13981] usb 1-1: Product: syz [ 1116.112760][T13981] usb 1-1: Manufacturer: 혹又⣩瑮됆 [ 1116.112923][T13981] usb 1-1: SerialNumber: syz [ 1116.142107][T14004] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1116.142497][T14004] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1116.142698][T14004] usb 2-1: Manufacturer: Ї [ 1116.142824][T14004] usb 2-1: SerialNumber: syz [ 1116.163955][T13981] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 1116.193325][T14004] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 1116.373456][T13981] usb 1-1: USB disconnect, device number 63 [ 1116.397009][T14004] usb 2-1: USB disconnect, device number 60 00:18:38 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)) 00:18:38 executing program 0: socket(0x2, 0x0, 0xb000000) 00:18:38 executing program 1: syz_clone(0x10200100, 0x0, 0x0, 0x0, 0x0, 0x0) 00:18:38 executing program 0: socket(0xa, 0x0, 0x100) 00:18:38 executing program 1: keyctl$describe(0x7, 0x0, 0x0, 0x0) 00:18:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') fchownat(r0, &(0x7f0000001580)='.\x00', 0xee00, 0x0, 0x0) 00:18:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') fchownat(r0, &(0x7f0000001580)='.\x00', 0xee00, 0xee01, 0x1000) [ 1118.844172][ T29] audit: type=1400 audit(1118.800:360): avc: denied { setattr } for pid=14148 comm="syz-executor.1" name="fdinfo" dev="proc" ino=31939 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 00:18:38 executing program 1: fchownat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0xffffffffffffffff, 0xee01, 0x1000) 00:18:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000013c0)) 00:18:39 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x5c) 00:18:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') fchownat(r0, &(0x7f0000001580)='.\x00', 0x0, 0x0, 0x1000) 00:18:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 00:18:39 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "35f4d116e6e6d08d", "58087ac7021edf1cef239465db9bb61c", "53a954a2", "5ad73901db4e8401"}, 0x28) 00:18:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0xffffffffffffff03) 00:18:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001c40), 0x0, 0x80) 00:18:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x0, 0x1, '\v'}, 0x9) 00:18:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002080)) epoll_pwait2(r1, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) [ 1119.946896][ T29] audit: type=1400 audit(1119.900:361): avc: denied { create } for pid=14168 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1119.982501][ T29] audit: type=1400 audit(1119.940:362): avc: denied { setopt } for pid=14168 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:18:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@empty, @multicast1}, 0xc) 00:18:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 00:18:40 executing program 0: timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) splice(r2, 0x0, r0, 0x0, 0x20000000000100, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'bond0\x00', 0x1}) preadv2(r3, 0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ATTR(r2, &(0x7f0000000040)={0x78, 0xacbc42d9649674c2, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) 00:18:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000080)="165dcccb", 0x4) 00:18:40 executing program 1: r0 = epoll_create1(0x0) read$char_usb(r0, 0x0, 0x0) 00:18:40 executing program 1: r0 = socket$inet(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) [ 1121.639848][T14184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29890 sclass=netlink_route_socket pid=14184 comm=syz-executor.0 00:18:41 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, @thr={0x0, 0x0}}, 0x0) 00:18:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x63, 0x0, 0x0) 00:18:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100), &(0x7f0000000080)=0x10) 00:18:41 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x24040, 0x0) 00:18:41 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002080)) epoll_pwait2(r1, &(0x7f0000000080)=[{}], 0x1, &(0x7f0000000140), 0x0, 0x0) 00:18:41 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002080)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 00:18:41 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) 00:18:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@dev, @multicast1}, 0x8) 00:18:41 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket(0x0, 0x0, 0x5) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$hidraw(&(0x7f0000000b00), 0x0, 0x341081) ioctl$HIDIOCGRAWINFO(0xffffffffffffffff, 0x80084803, &(0x7f0000000bc0)=""/254) ioctl$SYNC_IOC_FILE_INFO(0xffffffffffffffff, 0xc0383e04, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000980), 0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000540)="b17b78844efd715e728a57426c04e88271531187226738a0bfb3ef0adfd82cc34b1e7d65fcbfd9a84bcea23ac013897b42dd4acba7d2b5bd133435ef1f79a4540e86f057f5adb9c55a240220dc511e03bad329ead25f36f12b0293cdfcc6d9d840f615c96b24da29f197571497e866f636ba2867134b32ab21b96c485bae5f8e77fb58481d1f114addbd3dbd6a4a8fc3d392737b1f7c145e18dbdf6a72307fa7b9e600ce9a49c41c2a511b5957f3c8acddd1569242001e9469588a6d541170200db3b56fdad6045a", 0xc8, &(0x7f0000000640), &(0x7f0000000680), &(0x7f0000000740)="d4588f8b9216518c58b6aab39a94a86abd1fc94d9120fa2f70e86ecf7ef4acf98c04cf662b9f8901223079739f427738d4a91f686914672a") 00:18:41 executing program 0: pipe2(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000e80), r0) 00:18:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x0) 00:18:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x20) 00:18:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f00000016c0)={{}, {}, [{0x2, 0x0, 0xee01}], {}, [{}]}, 0x34, 0x0) 00:18:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x771, &(0x7f0000000840)="$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") 00:18:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f00000016c0)={{}, {}, [{0x2, 0x0, 0xee01}], {}, [{}]}, 0x34, 0x0) 00:18:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f00000016c0)={{}, {}, [{0x2, 0x0, 0xee01}], {}, [{}]}, 0x34, 0x0) 00:18:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f00000016c0)={{}, {}, [{0x2, 0x0, 0xee01}], {}, [{}]}, 0x34, 0x0) [ 1122.519110][T14213] loop1: detected capacity change from 0 to 2048 [ 1122.538717][T14213] EXT4-fs (loop1): bad geometry: block count 1074266112 exceeds size of device (512 blocks) 00:18:42 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) 00:18:42 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x40087602, 0x0) 00:18:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, 0x0) 00:18:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)) 00:18:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)) 00:18:42 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:18:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bind$vsock_stream(r0, 0x0, 0x0) 00:18:42 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) 00:18:43 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) pipe2(&(0x7f0000000c40), 0x80800) 00:18:43 executing program 0: bpf$ITER_CREATE(0x21, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), 0xffffffffffffffff) 00:18:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf}, 0x48) 00:18:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f00000016c0)={{}, {}, [{0x2, 0x0, 0xee01}], {}, [{}]}, 0x34, 0x2) 00:18:43 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) 00:18:43 executing program 1: getgroups(0x1, &(0x7f0000000500)=[0x0]) 00:18:43 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfd14) r1 = open(&(0x7f0000000080)='./bus\x00', 0x40002, 0x0) fallocate(r1, 0x3, 0x0, 0x4010000bffe) 00:18:43 executing program 1: userfaultfd(0x801) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo/3\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/64, 0x40}], 0x1, 0x0, 0x0) [ 1123.470623][ T29] audit: type=1400 audit(1123.420:363): avc: denied { create } for pid=14258 comm="syz-executor.1" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 00:18:43 executing program 0: syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, 0x0, 0x0) 00:18:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 00:18:43 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket(0x0, 0x0, 0x5) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f00000001c0)='\x00_\xf6`[\xd7\xe2C\x8c\xed\x98\x0e\xde_\xbe\xa4\tl\x11m{h\xc9\xee 4\xe0\xae\xbc?\xbc\xb1\xc3\xda\xb4\xf2\x02\xc9\x88\xff\xe0l\x1ac\x01\xaf\xeag\xbb\xee~\xc3\x1b:\xa7\xd8\xbaY4\x1e\x8f\xd3\xf4\xaa\x9c3\x91\xfe>\\\xedE\xf1f\xca\xaf\xc4`\xc4\xb8\xfb$gL\xdd', 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) syz_open_dev$hidraw(&(0x7f0000000b00), 0xcd6, 0x341081) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000980), 0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000540)="b17b78844efd715e728a57426c04e88271531187226738a0bfb3ef0adfd82cc34b1e7d65fcbfd9a84bcea23ac013897b42dd4acba7d2b5bd133435ef1f79a4540e86f057f5adb9c55a240220dc511e03bad329ead25f36f12b0293cdfcc6d9d840f615c96b24da29f197571497e866f636ba2867134b32ab21b96c485bae5f8e77fb58481d1f114addbd3dbd6a4a8fc3d392737b1f7c145e18dbdf6a72307fa7b9e600ce9a49c41c2a511b5957f3c8acddd1569242001e9469588a6d541170200db3b56fdad6045aeaea2aed6f317be1bda47be95bab870da6efba7b5e", 0xdd, &(0x7f0000000640), &(0x7f0000000680), &(0x7f0000000740)="d4588f8b9216518c58b6aab39a94a86abd1fc94d9120fa2f70e86ecf7ef4acf98c04cf662b9f8901223079739f427738d4a91f686914672a46bc6cde718ba587a6edcd862ca88cc326f0958b0c3b2abaab1cbc6f") bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, @val=@uprobe_multi={&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=[0x3, 0x0, 0x4, 0x52b3, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0xffffffffffffffff, 0x6], 0x0, 0xc34f, 0xa, 0x1}}, 0x40) 00:18:43 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) 00:18:43 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8941, 0x0) 00:18:43 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) fsopen(&(0x7f0000001080)='btrfs\x00', 0x0) 00:18:43 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@map=0x1, 0xffffffffffffffff, 0x0, 0x10, 0x0, @link_id}, 0x20) 00:18:44 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x41a401, 0x0) 00:18:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000b80)={'virt_wifi0\x00'}) 00:18:44 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000b40)) 00:18:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a80), r0) 00:18:44 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) pipe2(0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), 0xffffffffffffffff) 00:18:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x8, 0x0, &(0x7f0000000140)) 00:18:44 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f00000016c0)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 00:18:44 executing program 0: syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x40) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x410) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r2, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40c4}, 0x10) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r3, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x70, r4, 0x1, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x5, 0x28}}}}, [@NL80211_ATTR_QOS_MAP={0x24, 0xc7, {[{0x8, 0x3}, {0x0, 0x1}, {0x2}, {0x3f, 0x1}, {}, {0x4e, 0x5}, {0x1, 0x2}, {0x2}, {0x5, 0x5}, {0x40, 0x2}, {0x40, 0x7}, {0x6, 0x5}], "e109728e63ff20b2"}}, @NL80211_ATTR_QOS_MAP={0x24, 0xc7, {[{0x3, 0x3}, {0x40, 0x7}, {0x2}, {0x0, 0x3}, {0x0, 0x4}, {0xb8, 0x2}, {0x6}, {0xfe, 0x1}, {0x1f, 0x7}, {0x3, 0x1}, {0xe, 0x2}, {0x2}], "6f77015a0867dd60"}}]}, 0x70}, 0x1, 0x0, 0x0, 0x24048001}, 0x20048081) sendmsg$NL80211_CMD_LEAVE_OCB(r3, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x1c, r4, 0x626, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x4004) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000a00)={r3}, 0x8) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r6, 0x0, 0x8000) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x2c, r4, 0x1, 0x0, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x6, 0x68}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r6, 0x6628) pipe2(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r6) sendmsg$NL80211_CMD_TESTMODE(r7, &(0x7f0000000e80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000d40)={0xd8, r9, 0x100, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xfffffff9, 0x45}}}}, [@NL80211_ATTR_TESTDATA={0x6c, 0x45, "4aa87f4625b77a801dec491c70210ad66b7059fd0c8b0850a93870dcc598894f87d050419ef845851d1e88764a1f9b9b3c980aa09628d049418b69a4253b1603c3d07ee6f8f22b71577846562461db42835c8ec6394ab5c6a458532b58fa4a8d6ac7d1d2f22f9cf5"}, @NL80211_ATTR_TESTDATA={0x44, 0x45, "faba4a27f8e23bd7ffac3df998263893efbc0047c5e7148ed363cf85409d12c3bae821eeea26a43aa77689b67fc414334a75cae37b26680cfaf147042283cb36"}]}, 0xd8}}, 0x20004001) sendmsg$NL80211_CMD_GET_COALESCE(r8, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x20, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void, @val={0xc, 0x99, {0x4bdba88f, 0x80}}}}, ["", "", ""]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_STOP_NAN(r3, &(0x7f0000001080)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001040)={&(0x7f0000001000)={0x28, r9, 0x400, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x40, 0x2e}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14000000}, 0x0) ioctl$HIDIOCGRAWNAME(0xffffffffffffffff, 0x80404804, &(0x7f00000010c0)) ioctl$SYNC_IOC_FILE_INFO(r6, 0xc0383e04, &(0x7f0000001200)={""/32, 0x0, 0x0, 0x3, 0x0, &(0x7f0000001100)=[{}, {}, {}]}) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f0000001400)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000013c0)={&(0x7f0000001280)={0x128, r4, 0x2, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_BSS_BASIC_RATES={0x1a, 0x24, [{0x12}, {0x24}, {0x30, 0x1}, {0x30}, {0x6c}, {0x4}, {0x24}, {0x4}, {0x24, 0x1}, {0x12, 0x1}, {0x24, 0x1}, {0xb, 0x1}, {0x2}, {0x6, 0x1}, {0x18}, {0x2, 0x1}, {0x12}, {0x9, 0x1}, {0x36, 0x1}, {0x3f, 0x1}, {0x0, 0x1}, {0x18}]}, @NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_KEYS={0x78, 0x51, 0x0, 0x1, [{0x4}, {0x28, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "253255cb54"}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "3d00715412"}, @NL80211_KEY_IDX={0x5, 0x2, 0x3}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_KEY_IDX={0x5}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}, @NL80211_KEY_SEQ={0xb, 0x4, "263e29a7110a1c"}, @NL80211_KEY_SEQ={0x5, 0x4, "1d"}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "d5608acc2ab3e1885b25a7d158"}, @NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}]}, @NL80211_ATTR_IE={0x64, 0x2a, [@mesh_id={0x72, 0x6}, @rann={0x7e, 0x15, {{0x1, 0x5}, 0xff, 0x8, @device_a, 0xdf2f, 0x304c8b6e, 0x80}}, @link_id={0x65, 0x12, {@initial, @device_b, @device_b}}, @ibss={0x6, 0x2, 0x7}, @rann={0x7e, 0x15, {{0x0, 0x44}, 0x5, 0x5, @device_b, 0x5, 0xfff, 0x4f8}}, @mic={0x8c, 0x10, {0xe41, "50eb043ee195", @short="f500ab328ec3830d"}}]}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x128}, 0x1, 0x0, 0x0, 0x80}, 0x1) 00:18:44 executing program 1: pipe2(&(0x7f0000000c40), 0x0) 00:18:44 executing program 1: sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) 00:18:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) 00:18:45 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x143142, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) creat(&(0x7f0000000040)='./bus\x00', 0x0) 00:18:45 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x36}}}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x14, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_SEQ={0xd, 0xa, "c6b4491f902811002b"}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4001}, 0x40) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x410) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, 0x0, 0xc000) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), 0xffffffffffffffff) 00:18:45 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0) 00:18:45 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x80108907, 0x0) 00:18:45 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) 00:18:45 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001780)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) 00:18:45 executing program 1: sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x0) 00:18:45 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$NL80211_CMD_SET_REG(r0, 0x0, 0x0) 00:18:45 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={@ifindex, 0xffffffffffffffff, 0x1e, 0x0, 0x0, @link_id}, 0x20) 00:18:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 00:18:45 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) 00:18:45 executing program 0: socket$inet(0x2, 0x5, 0xfffffeff) 00:18:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 00:18:46 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x40) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xeb}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x410) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'wlan1\x00'}) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0x78, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x23}}}}, [@NL80211_ATTR_KEY={0x4}, @NL80211_ATTR_KEY_SEQ={0x5, 0xa, "85"}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_SEQ={0x4}, @NL80211_KEY_SEQ={0xe, 0x4, "2eb6609b365451e19f4a"}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "cef77b8b33"}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0x78}}, 0x40000) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), 0xffffffffffffffff) ioctl$SYNC_IOC_FILE_INFO(0xffffffffffffffff, 0xc0383e04, 0x0) 00:18:46 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000009c0)='/dev/full\x00', 0x0, r0) 00:18:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x90) 00:18:46 executing program 0: socketpair(0x28, 0x0, 0x0, &(0x7f0000001980)) 00:18:46 executing program 1: fsopen(&(0x7f0000001080)='btrfs\x00', 0x0) 00:18:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 00:18:46 executing program 0: setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@dev, @multicast2}, 0xffffffffffffff62) 00:18:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'macsec0\x00', @multicast}) 00:18:46 executing program 0: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB=',']) 00:18:46 executing program 1: syz_emit_ethernet(0x26, &(0x7f0000000100)={@local, @empty, @val, {@ipv4}}, 0x0) 00:18:46 executing program 0: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='perf_event,cpuset,u']) 00:18:46 executing program 1: bpf$MAP_CREATE(0x1c, &(0x7f0000000380), 0x48) [ 1127.037103][T14362] cgroup: Unknown subsys name 'u' 00:18:47 executing program 0: syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5092, &(0x7f0000000180), &(0x7f0000000480), &(0x7f0000000240)) 00:18:47 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, 0x0) [ 1127.194491][ T29] audit: type=1400 audit(1127.150:364): avc: denied { map } for pid=14365 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=32273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1127.198459][ T29] audit: type=1400 audit(1127.150:365): avc: denied { read write } for pid=14365 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=32273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 00:18:47 executing program 0: bpf$MAP_CREATE(0x12, &(0x7f0000000380), 0x48) 00:18:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1d}, 0x48) 00:18:47 executing program 0: syz_open_dev$mouse(0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(0x0, r0) syz_genetlink_get_family_id$gtp(&(0x7f0000000540), 0xffffffffffffffff) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:18:47 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 00:18:47 executing program 0: io_uring_setup(0x235d, &(0x7f0000000180)) 00:18:47 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0x0, 0x0, 0x18}, 0xc) 00:18:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002c80)={&(0x7f0000001bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 00:18:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 00:18:47 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000a80), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x1a, 0x8, 0x91, 0x1, 0x0, '\x00', 0x0, r0, 0x5, 0x1}, 0x48) 00:18:47 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:18:47 executing program 0: bpf$MAP_CREATE(0x16, &(0x7f0000000380), 0x48) 00:18:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz1\x00'}, 0x45c) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000004c0)='syz1\x00') 00:18:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x3, 0x1a, 0x8, 0x0, 0x1}, 0x48) 00:18:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0xa, [@union={0x3, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @array]}, {0x0, [0x0, 0x0, 0x30, 0x17, 0x5f, 0x30, 0x30, 0x5f]}}, &(0x7f00000000c0)=""/135, 0x6a, 0x87, 0x1}, 0x20) 00:18:48 executing program 0: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x4) 00:18:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x6) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) 00:18:48 executing program 0: syz_io_uring_setup(0x17cc, &(0x7f0000000000)={0x0, 0xdcc3, 0x2, 0xfffffffd, 0xd2}, &(0x7f0000000080), &(0x7f00000000c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40a00, 0x0) syz_open_dev$mouse(&(0x7f0000000a80), 0x0, 0x0) syz_io_uring_setup(0x3e1a, 0x0, &(0x7f0000000300), 0x0) 00:18:48 executing program 1: socketpair(0x28, 0x0, 0x6, &(0x7f0000001980)) 00:18:48 executing program 1: r0 = socket(0x200000100000011, 0x803, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendto$packet(r0, &(0x7f00000000c0)="4dcdc7d96a7600004b6c800402000000000000004bc65852fa102b1f7f46fc27d44a00e60212ca06c561ccf8aa697ecc729896763b947eca", 0x38, 0x0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) 00:18:48 executing program 0: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000100)=ANY=[@ANYBLOB="120100004f92b90857152077ebb7000000010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000840)={0x2c, &(0x7f0000000600)={0x0, 0x0, 0x1, 'M'}, 0x0, 0x0, 0x0, 0x0}) 00:18:48 executing program 1: syz_clone3(&(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0x0], 0x1}, 0x58) 00:18:48 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001500), 0x6000, 0x0) 00:18:48 executing program 1: socket$unix(0x1, 0xacddacda8ef2343a, 0x0) [ 1128.981417][T13956] usb 1-1: new high-speed USB device number 64 using dummy_hcd [ 1129.272780][T13956] usb 1-1: Using ep0 maxpacket: 8 [ 1129.441647][T13956] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 1129.442018][T13956] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1129.445216][T13956] usb 1-1: config 0 descriptor?? [ 1129.741932][T13956] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -61 [ 1129.742620][T13956] asix: probe of 1-1:0.0 failed with error -61 [ 1129.963339][T13956] usb 1-1: USB disconnect, device number 64 00:18:51 executing program 1: r0 = socket(0x200000100000011, 0x803, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendto$packet(r0, &(0x7f00000000c0)="4dcdc7d96a7600004b06800402000000000000004bc65852fa102b1f7f46fc27d44a00e60212ca06c561ccf8aa697ecc729896763b947eca", 0x38, 0x0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) 00:18:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x18, {"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", 0x89b}}, 0x1006) 00:18:51 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000100)=ANY=[@ANYBLOB="120100004f92b90857152077ebb7000000010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000040)={0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x40, 0x13, 0x6, @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, &(0x7f0000001280)={0x1c, &(0x7f0000001140)={0x0, 0x0, 0x1, "bf"}, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) 00:18:51 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000640)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0x0], 0x1}, 0x58) 00:18:51 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000002500), 0x82, 0x0) 00:18:51 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000340), 0x2, 0x0) [ 1131.972117][T14033] usb 2-1: new high-speed USB device number 61 using dummy_hcd [ 1132.211620][T14033] usb 2-1: Using ep0 maxpacket: 8 [ 1132.331726][T14033] usb 2-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 1132.332082][T14033] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1132.334403][T14033] usb 2-1: config 0 descriptor?? [ 1132.821921][T14033] asix 2-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -32 [ 1132.822503][T14033] asix 2-1:0.0 (unnamed net_device) (uninitialized): Error reading PHY_ID register: ffffffe0 [ 1132.823097][T14033] asix: probe of 2-1:0.0 failed with error -32 [ 1142.822089][T13956] usb 2-1: USB disconnect, device number 61 00:19:02 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000001400)) 00:19:02 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) 00:19:02 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) faccessat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) 00:19:03 executing program 0: io_uring_setup(0x3278, &(0x7f0000000040)) 00:19:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001140), 0x2, 0x0) 00:19:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189436, &(0x7f0000000280)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:19:03 executing program 1: syz_open_procfs$userns(0x0, &(0x7f0000000180)) 00:19:03 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000180)) r1 = io_uring_setup(0x3278, &(0x7f0000000040)={0x0, 0x0, 0x1000}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0, r2], 0x3) 00:19:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x1}) epoll_pwait(r1, &(0x7f0000000180)=[{}], 0x1, 0x0, 0x0, 0x0) 00:19:03 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000043c0), 0x0, 0x0) 00:19:03 executing program 0: statx(0xffffffffffffff9c, 0x0, 0x60, 0x0, 0x0) 00:19:03 executing program 1: r0 = syz_io_uring_setup(0x200a, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 00:19:03 executing program 0: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x68080, 0x0) 00:19:03 executing program 1: syz_io_uring_setup(0x45f6, &(0x7f0000000000)={0x0, 0x0, 0x1000}, &(0x7f0000000080), &(0x7f00000000c0)) 00:19:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:19:03 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6000, 0x0, 0x0) 00:19:04 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$dsp(r0, &(0x7f0000000040)=""/126, 0x7e) 00:19:04 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x14ba82, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x1, 0x10000) 00:19:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 00:19:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 00:19:04 executing program 1: r0 = syz_io_uring_setup(0x200a, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff], 0x1) 00:19:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 00:19:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 00:19:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") epoll_pwait2(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) [ 1145.036058][T14502] loop1: detected capacity change from 0 to 128 [ 1145.054551][T14502] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. 00:19:05 executing program 0: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) 00:19:05 executing program 1: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='./binderfs/binder-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) [ 1145.135207][ T2991] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. 00:19:05 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x14ba82, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000000c0)=0xb3a, 0x12) sendfile(r0, r0, 0x0, 0x10000) 00:19:05 executing program 0: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) 00:19:05 executing program 0: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) 00:19:05 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 00:19:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 00:19:05 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x9a) 00:19:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 00:19:05 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000180)) r1 = io_uring_setup(0x3278, &(0x7f0000000040)={0x0, 0x0, 0x1000}) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) 00:19:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 00:19:05 executing program 1: fspick(0xffffffffffffffff, 0x0, 0xf9d16aaf93f4e05c) 00:19:06 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) 00:19:06 executing program 1: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0xa592}, 0x0, &(0x7f0000000140), 0x0) 00:19:06 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) 00:19:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000400)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) 00:19:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x44, &(0x7f0000000300), 0x4) 00:19:06 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) 00:19:06 executing program 1: fspick(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 00:19:06 executing program 1: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x6}, 0x0, 0x0) 00:19:06 executing program 0: openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='./binderfs/binder-control\x00', 0x0, 0x0) 00:19:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x50000}, 0x10) 00:19:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f00000003c0), &(0x7f0000000400)=0x4) [ 1147.101485][ T29] audit: type=1400 audit(1147.040:366): avc: denied { getopt } for pid=14554 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:19:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) connect$inet(r2, &(0x7f0000000140)={0x10}, 0x10) 00:19:09 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, &(0x7f0000000000)='\t', 0x1, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) [ 1149.501450][ T29] audit: type=1400 audit(1149.450:367): avc: denied { connect } for pid=14557 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:19:09 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) 00:19:09 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000100)=ANY=[@ANYBLOB="120100004f92b90857152077ebb7000000010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000040)={0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x40, 0x13, 0x0, @random="616846fd584a"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:19:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@sndrcv={0x2c}, @dstaddrv4={0x10, 0x84, 0x9}, @sndinfo={0x1c}, @sndinfo={0x1c}, @sndinfo={0x1c}, @sndrcv={0x2c}], 0xbc}, 0x0) [ 1150.184075][ T29] audit: type=1400 audit(1150.140:368): avc: denied { write } for pid=14569 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1150.191718][ T94] usb 2-1: new high-speed USB device number 62 using dummy_hcd 00:19:10 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) getsockname$unix(r2, 0x0, &(0x7f0000000040)) [ 1150.441420][ T94] usb 2-1: Using ep0 maxpacket: 8 [ 1150.562282][ T94] usb 2-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 1150.562639][ T94] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1150.566878][ T94] usb 2-1: config 0 descriptor?? 00:19:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000000c0), &(0x7f0000000180)=0x98) [ 1150.843198][ T94] asix 2-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -61 [ 1150.843779][ T94] asix: probe of 2-1:0.0 failed with error -61 [ 1151.055606][T13956] usb 2-1: USB disconnect, device number 62 00:19:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000140), &(0x7f0000000200)=0x8) 00:19:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x181}, 0x98) 00:19:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:19:12 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000000100)='\'', 0x1, 0x0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)='$', 0x1, 0x20180, 0x0, 0x0) [ 1153.155289][ T29] audit: type=1400 audit(1153.110:369): avc: denied { bind } for pid=14590 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:19:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstaddrv6={0x1c, 0x84, 0xa, @rand_addr=' \x01\x00'}], 0x1c}, 0x0) 00:19:13 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000100)=0x6, 0x4) 00:19:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@sndinfo={0x1c}], 0x1c}, 0x0) 00:19:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f00000000c0), 0x1) 00:19:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={r3}, 0x8) 00:19:13 executing program 1: socket$inet_sctp(0x2, 0x0, 0x84) sendto(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x100, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001300), 0x4) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 00:19:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240), &(0x7f00000001c0)=0x98) 00:19:14 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x40081) 00:19:14 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x527541b81f1c5f4d, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:19:14 executing program 0: mkdir(0x0, 0x0) mkdir(0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000180)={0x8003}, 0x8) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20104, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x200}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:19:14 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x4, &(0x7f0000000040)=0x7a1a8960, 0x4) 00:19:15 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x108, &(0x7f0000000180), &(0x7f0000000240)=0x18) 00:19:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000500), &(0x7f0000000540)=0x4) 00:19:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:19:15 executing program 1: bind(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x105, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x4220, 0x0, 0xefffffff}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xe) 00:19:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={r4}, 0x8) 00:19:15 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000240), &(0x7f0000001700)=0x4) 00:19:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040), 0x8) 00:19:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x73}, 0x10) 00:19:16 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) shutdown(r0, 0x1) 00:19:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8}, 0x10) 00:19:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000500)={0x10, 0x2}, 0x10) 00:19:16 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = dup(r2) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x15, &(0x7f0000000040), 0x8) 00:19:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@sndrcv={0x2c}, @dstaddrv4={0x10, 0x84, 0x9}, @sndinfo={0x1c}, @sndinfo={0x1c}, @sndinfo={0x1c}, @dstaddrv4={0x10, 0x84, 0x9}, @sndrcv={0x2c}], 0xcc}, 0x0) 00:19:17 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) sendto(r0, &(0x7f0000001480)="1d", 0x1, 0x0, &(0x7f0000001280)=@in={0x10, 0x2}, 0x10) 00:19:17 executing program 0: mlock(&(0x7f0000fe6000/0x12000)=nil, 0x12000) mlock(&(0x7f0000fef000/0x4000)=nil, 0x4000) 00:19:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000080)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0x8) 00:19:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000080), &(0x7f0000000140)=0xb0) 00:19:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x10}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@prinfo={0x14}], 0x14}, 0x10d) 00:19:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x5a90, 0x0, 0xc, 0x0, 0x8d24}, 0x98) 00:19:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f00000001c0), &(0x7f00000025c0)=0x18) 00:19:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) [ 1158.323497][ T29] audit: type=1400 audit(1158.270:370): avc: denied { read } for pid=14671 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:19:18 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000000100), 0xfffffe2d, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 00:19:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:19:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000040), 0x8) 00:19:18 executing program 1: syz_emit_ethernet(0x52, &(0x7f0000002440)={@local, @remote, @val, {@ipv6}}, 0x0) 00:19:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000ff"], 0x1c}, 0x0) 00:19:18 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 00:19:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000700)={0x0, 0x4}, 0x8) 00:19:19 executing program 0: openat(0xffffffffffffff9c, 0x0, 0xc9b84857671768c5, 0x0) 00:19:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000140)={r3}, &(0x7f0000000200)=0x8) 00:19:19 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000000100)='\'', 0x1, 0x0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) 00:19:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000040)={0x0, 0x2, "a755"}, &(0x7f0000000080)=0xa) 00:19:19 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x51, 0x0, 0x0) 00:19:19 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000000)='{', 0x1, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 00:19:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x73, 0x50000}, 0x10) 00:19:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 00:19:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000080), &(0x7f0000000140)=0x8) 00:19:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@sndinfo={0x1c}], 0x1c}, 0x0) 00:19:20 executing program 0: mkdir(0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) mkdir(0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000180)={0x8003}, 0x8) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20104, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x200}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:19:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x10}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@prinfo={0x14}], 0x14}, 0x10d) 00:19:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000000), 0x20) 00:19:20 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 00:19:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x7, 0x1, "d6"}, 0x9) 00:19:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001740)={&(0x7f00000010c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000001700)=[@sndinfo={0x1c}], 0x1c}, 0x0) 00:19:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x23, &(0x7f0000000200), 0x90) 00:19:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000080), &(0x7f0000000040)=0x4) [ 1160.857941][T14731] sctp: [Deprecated]: syz-executor.0 (pid 14731) Use of int in max_burst socket option. [ 1160.857941][T14731] Use struct sctp_assoc_value instead 00:19:20 executing program 1: syz_emit_ethernet(0x22, &(0x7f00000018c0)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 00:19:20 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000100)='./file0\x00') 00:19:20 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000000100)='\'', 0x1, 0x0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) 00:19:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000100)={0x1}, 0x1) 00:19:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x7}, 0x8) 00:19:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20104, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x200}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:19:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x0, 0x290}, 0x98) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe) 00:19:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={r4}, 0x8) 00:19:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040), &(0x7f0000000080)=0x8) 00:19:21 executing program 1: mkdir(0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000180)={0x8003}, 0x8) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 00:19:21 executing program 0: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f00000004c0)=ANY=[@ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRES8, @ANYRESOCT, @ANYBLOB="77a96c72db2e0d9a9e3245f4585e51be9aeb24085f928958282cc85ea6e70f3448eed226bc468d75a2c804ae0d6f018da41cec0e63d19b6da8438ef404cef53d5532bca60d5759c0f2ee9f3def7848789f2890da91bc76c55d4f5a718018e8b265bded8ed1f9622894bde87805a08a0bc37ca015500a009111", @ANYBLOB="610d12830e332d9a69f056c719c9327baa03be4382c6554f070c47ea0d94efdc7d24b84b1838b9438707cae1b6ce58ab4a62d40b19c2fc948fb9ad2d5fb0048632cb90b7e99f460e460047beeee9410e7a3f2ef43c437b42f53e716b61378daf9b1c0a5cde5142116bdcf16e1394ab5d0bc7589f9c76a4a12791fbd4172508b90400f98bda75ceb00dfe3a283972ae6a635e1c4f3566479f285fc8a7cde2058685a5afaec3f6943e9e3f918e1ea916702562b192e61463205f0c31d13bfc54", @ANYRES16], 0x3, 0x435, &(0x7f0000000ac0)="$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") open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) socket$inet_tcp(0x2, 0x1, 0x0) 00:19:21 executing program 1: syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x2, 0x0, "", {{}, [{}]}}}]}}]}}, 0x0) [ 1162.015374][T14757] loop0: detected capacity change from 0 to 512 [ 1162.057311][T14757] EXT4-fs error (device loop0): __ext4_fill_super:5473: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 1162.068789][T14757] EXT4-fs (loop0): get root inode failed [ 1162.069086][T14757] EXT4-fs (loop0): mount failed [ 1162.131622][ T94] usb 2-1: new high-speed USB device number 63 using dummy_hcd [ 1162.381644][ T94] usb 2-1: Using ep0 maxpacket: 32 [ 1162.502394][ T94] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 00:19:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x9, &(0x7f0000000640), &(0x7f0000000680)=0x4) [ 1162.692002][ T94] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1162.692527][ T94] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1162.692864][ T94] usb 2-1: Product: syz [ 1162.693208][ T94] usb 2-1: Manufacturer: syz [ 1162.693368][ T94] usb 2-1: SerialNumber: syz 00:19:22 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000100), &(0x7f0000000140)=0x8) [ 1162.954552][ T94] usb 2-1: USB disconnect, device number 63 00:19:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 00:19:24 executing program 1: syz_io_uring_setup(0x1073, &(0x7f0000001c00), 0x0, &(0x7f0000001cc0)) 00:19:24 executing program 0: syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x0, "", {{}, [{}]}}}]}}]}}, 0x0) 00:19:24 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @dev}, 0x10) 00:19:24 executing program 1: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000140)=@lang_id={0x4}}, {0x2, &(0x7f0000000180)=@string={0x2}}]}) [ 1164.831337][ T94] usb 1-1: new high-speed USB device number 65 using dummy_hcd [ 1165.031959][T13956] usb 2-1: new high-speed USB device number 64 using dummy_hcd [ 1165.081777][ T94] usb 1-1: Using ep0 maxpacket: 32 [ 1165.201538][ T94] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1165.271706][T13956] usb 2-1: Using ep0 maxpacket: 32 [ 1165.361846][ T94] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1165.362315][ T94] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1165.362553][ T94] usb 1-1: Product: syz [ 1165.362700][ T94] usb 1-1: Manufacturer: syz [ 1165.362823][ T94] usb 1-1: SerialNumber: syz [ 1165.392211][T13956] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1165.571945][T13956] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1165.572311][T13956] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1165.573024][T13956] usb 2-1: Product: syz [ 1165.573308][T13956] usb 2-1: SerialNumber: syz [ 1165.617025][ T94] usb 1-1: USB disconnect, device number 65 [ 1165.835022][T13956] usb 2-1: USB disconnect, device number 64 00:19:27 executing program 0: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}) 00:19:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)=0xffffffe6) 00:19:27 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$tcp_congestion(r0, 0x0, 0xfffffffffffffd9b) 00:19:27 executing program 1: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1}}]}}]}}, 0x0) [ 1167.591928][ T9] usb 1-1: new high-speed USB device number 66 using dummy_hcd [ 1167.851377][ T9] usb 1-1: Using ep0 maxpacket: 32 [ 1167.921359][ T94] usb 2-1: new high-speed USB device number 65 using dummy_hcd [ 1168.041333][ T9] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1168.121510][ T9] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1168.163995][ T94] usb 2-1: Using ep0 maxpacket: 32 [ 1168.282104][ T94] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1168.282732][ T94] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 1168.311473][ T9] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1168.311797][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1168.312014][ T9] usb 1-1: Product: syz [ 1168.312164][ T9] usb 1-1: Manufacturer: syz [ 1168.312320][ T9] usb 1-1: SerialNumber: syz [ 1168.442256][ T94] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1168.443318][ T94] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1168.443554][ T94] usb 2-1: Product: syz [ 1168.443699][ T94] usb 2-1: Manufacturer: syz [ 1168.443848][ T94] usb 2-1: SerialNumber: syz [ 1168.578759][T13997] usb 1-1: USB disconnect, device number 66 [ 1168.695691][ T94] usb 2-1: USB disconnect, device number 65 00:19:30 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz0\x00'}) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xee) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_DEV_DESTROY(r0, 0x5502) 00:19:30 executing program 1: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x2}}]}}]}}, 0x0) [ 1170.271526][T14846] input: syz0 as /devices/virtual/input/input17 00:19:30 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) write$P9_RLERRORu(r0, 0x0, 0x0) 00:19:30 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 00:19:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) [ 1170.661990][T13956] usb 2-1: new high-speed USB device number 66 using dummy_hcd [ 1170.901503][T13956] usb 2-1: Using ep0 maxpacket: 32 [ 1171.031595][T13956] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1171.211817][T13956] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1171.212145][T13956] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1171.212291][T13956] usb 2-1: Product: syz [ 1171.212417][T13956] usb 2-1: Manufacturer: syz [ 1171.212499][T13956] usb 2-1: SerialNumber: syz [ 1171.467340][ T94] usb 2-1: USB disconnect, device number 66 00:19:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x4003, 0x0, 0x0) 00:19:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x20008885, 0x0, 0x16) 00:19:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 00:19:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="f1", 0x1}], 0x1, &(0x7f0000000a40)=[@ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x30}, 0x0) 00:19:33 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@ifindex, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:19:33 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x292300, 0x0) 00:19:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x20) 00:19:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@ip_tos_u8={{0x11}}], 0x18}, 0x0) 00:19:33 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000003b80), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="21f1334f5a1a077978f236182783c3ccf6030a6ebcee456f7bbbf8cbad250eca67e2744d9ed6578ad569ada726c1dfde384579eee580c8615eba") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0], 0x0, 0x8, &(0x7f00000004c0), 0x0, 0x10, &(0x7f0000000500), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid_for_children\x00') 00:19:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="f1", 0x1}], 0x1}, 0x0) 00:19:33 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@generic={&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x18) 00:19:33 executing program 1: bpf$MAP_LOOKUP_ELEM(0x18, 0x0, 0x0) 00:19:33 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) shutdown(r0, 0x0) 00:19:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018"], 0x0, 0x7a}, 0x20) 00:19:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001400)) 00:19:34 executing program 0: bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000700), 0x4) 00:19:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x30}, 0x0) 00:19:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={&(0x7f0000003c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:19:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e}, 0x20) 00:19:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xd, 0x1}]}, @func={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000940)=""/1, 0x3b, 0x1, 0x1}, 0x20) 00:19:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0, 0x7a}, 0x20) 00:19:34 executing program 1: bpf$MAP_LOOKUP_ELEM(0x4, 0x0, 0x0) 00:19:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 00:19:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:19:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000c00)=""/9, 0x26, 0x9, 0x1}, 0x20) 00:19:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}, @int]}}, 0x0, 0x42, 0x0, 0x1}, 0x20) 00:19:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0xa}]}}, &(0x7f0000000c00)=""/9, 0x26, 0x9, 0x1}, 0x20) 00:19:34 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000340)={r0}) 00:19:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={&(0x7f0000003c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0xb}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:19:35 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x400040, 0x0) 00:19:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x80000001}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:19:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, 0x0, 0x26}, 0x20) 00:19:35 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 00:19:35 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={@cgroup, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:19:35 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000180)='\x00'}, 0x18) 00:19:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x101) 00:19:37 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r0, 0x0) 00:19:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:38 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={0x0}, 0x18) 00:19:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@typedef={0x1}, @int]}, {0x0, [0x61]}}, 0x0, 0x37, 0x0, 0x1}, 0x20) 00:19:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={&(0x7f0000003c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:19:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:19:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="f12c7f4e7666641405a2566b5d10b2e80b1aaeae8d03c30ec2ac38600a78d9e5e1749769d72c1c", 0x27}], 0x1, &(0x7f0000000a40)=[@ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xec}}], 0x30}, 0x0) 00:19:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 00:19:38 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2}}]}}, 0x0, 0x32}, 0x20) 00:19:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={&(0x7f0000003c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 00:19:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={&(0x7f0000003c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0xb}]}}, &(0x7f0000003d40)=""/249, 0x26, 0xf9, 0x1}, 0x20) 00:19:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000006900)=@base={0x0, 0x0, 0x0, 0x0, 0xc0c}, 0x48) 00:19:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@typedef={0x1}, @int]}, {0x0, [0x61]}}, 0x0, 0x37}, 0x20) 00:19:38 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000005c0000005c00000006000000050000000100000f02"], 0x0, 0x7a, 0x0, 0x1}, 0x20) 00:19:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x2292c347dd75b9e5, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:39 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x0) 00:19:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0x1, &(0x7f0000000000)=@raw=[@func], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:39 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 00:19:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x20) 00:19:39 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000010c0)={0x0, 0x0, 0x18}, 0xc) 00:19:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2}}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 00:19:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x2cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}, @typedef={0x1}]}, {0x0, [0x61]}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) 00:19:40 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f00000001c0)=@framed={{}, [@func]}, &(0x7f0000000240)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:40 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005300)) 00:19:40 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 00:19:40 executing program 0: socketpair(0x1d, 0x0, 0x55f6, &(0x7f0000000000)) 00:19:41 executing program 1: bpf$MAP_LOOKUP_ELEM(0x12, &(0x7f0000001140)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:19:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000540)=@raw=[@kfunc], &(0x7f00000005c0)='syzkaller\x00', 0x7, 0x1c, &(0x7f0000000600)=""/28, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) 00:19:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=[@ip_retopts={{0x10}}], 0x10}, 0x0) 00:19:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001280)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x7}], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0]}}, 0x0, 0x33, 0x0, 0xf}, 0x20) 00:19:42 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000180)="86f276cf65f44fed218aa4321ddf3fb814406115c240e625c346ce9dbf448d3741824fe095b02560c58078c5") 00:19:42 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 00:19:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x7, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 00:19:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:19:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x0, 0x0, 0xaf3e}, 0x48) 00:19:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x1c, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) 00:19:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000029c0)={0x9, 0x3, &(0x7f0000001640)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x40000002}, {}]}]}}, 0x0, 0x36}, 0x20) 00:19:43 executing program 1: syz_clone(0x14102000, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 00:19:43 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)="1e", 0x1}], 0x1}, 0x0) 00:19:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3}, {0x0, [0x0]}}, 0x0, 0x27}, 0x20) 00:19:44 executing program 0: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000016c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:19:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580), 0x8) 00:19:44 executing program 0: syz_clone(0x14102000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) 00:19:44 executing program 1: bpf$PROG_LOAD_XDP(0x18, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000800)={0x18, r1, 0xb15, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 00:19:44 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/user\x00') ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) 00:19:45 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x2, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) 00:19:45 executing program 1: setresuid(0xee01, 0xee01, 0xee00) ioprio_set$uid(0x3, 0x0, 0x0) 00:19:45 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @empty}}}}) 00:19:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'gre0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @remote}}}}) 00:19:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}]}, 0x2c}}, 0x0) 00:19:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0xe000, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x0, 0x61, &(0x7f0000000100)=""/97, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:46 executing program 0: r0 = socket$inet(0x2, 0x3, 0x23) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x1d0, 0x1d0, 0x108, 0xffffffff, 0xffffffff, 0x2a0, 0x2a0, 0x2a0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ip={@rand_addr, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 00:19:46 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x40049409, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) 00:19:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x19, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:46 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x11, 0x0, 0x0, @link_id}, 0x20) 00:19:46 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8932, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) 00:19:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast2}}) 00:19:46 executing program 1: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x80108906, 0x0) 00:19:47 executing program 0: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000540)={@map, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:19:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x2, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x0, 0x9, 0x2}], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:19:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x7040}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}]}, 0x3c}}, 0x0) 00:19:47 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8947, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) 00:19:47 executing program 0: setresuid(0xee00, 0xee01, 0x0) r0 = geteuid() r1 = geteuid() setresuid(r0, 0xffffffffffffffff, r1) 00:19:47 executing program 1: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {r1, r2+10000000}}, 0x0) 00:19:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) 00:19:47 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891f, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) 00:19:48 executing program 1: syz_open_dev$ndb(&(0x7f0000000140), 0x0, 0x40883) 00:19:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003240)={0x0, 0x0, 0x0}, 0x0) 00:19:48 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) 00:19:48 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0xfff, 0x0) 00:19:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) sched_setscheduler(r0, 0x3, &(0x7f0000000100)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) creat(&(0x7f00000004c0)='./file0\x00', 0x28) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r6 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r6, &(0x7f00000007c0)=[{&(0x7f0000000040)="3f9ebe239545703482cbae9a17ba12fc50ab1b6e3e", 0x15}, {&(0x7f0000000700)="7fd895b7394a24909e3ef63c0ed6366f4a98c38f4c9843245642e011281e192428a3e6eff2974f0ef41dc5d3878b6bfca03ebf75b5c105407e91198c558f98cede4c46c336575976f8d11fb6d6cf51a0b271d87b39e14da839d0b1a51491311dc6b0e1c2c9f9c9e46bdeb56b6af6fc8d9c3a1202e27768b8aab1baac1532cc315708bc68e692ba2e95e472e0356c93e012a50890fb461de628e66c34e653a46e800845f24d24a3f3846a", 0xaa}], 0x2, 0x81806, 0x0) r7 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r7, 0xc0185879, &(0x7f0000000080)={0x0, 0x4000}) recvmsg$kcm(r7, &(0x7f00000006c0)={&(0x7f0000000580)=@nl, 0x80, &(0x7f0000000500)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, &(0x7f0000000600)=""/154, 0x9a}, 0x40002000) sendfile(r5, r6, 0x0, 0x100000000000042) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:19:49 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) 00:19:49 executing program 1: ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000000)='sit0\x00') syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000180), 0xc5d6ab7360f71210) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) socketpair(0x0, 0x80000, 0x800, 0x0) socket(0x0, 0x4, 0x7) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000009c0)={'vlan0\x00'}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000a80)={0x0}) 00:19:50 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x0) 00:20:15 executing program 0: syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x18002) 00:20:15 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) 00:20:15 executing program 1: pipe2$watch_queue(0x0, 0x80) getgroups(0x0, 0x0) 00:20:15 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80841, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 00:20:15 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x80841, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)=ANY=[], 0x8) 00:20:15 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x80841, 0x0) write$FUSE_OPEN(r0, 0x0, 0x0) 00:20:16 executing program 1: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 00:20:16 executing program 1: r0 = mq_open(&(0x7f0000000140)='.log\x00', 0x1, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 00:20:16 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x10040, 0x0) 00:20:16 executing program 1: mq_open(&(0x7f0000000140)='.log\x00', 0x1, 0x0, 0x0) r0 = eventfd2(0xc09, 0x80801) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001180)={{0x0, 0xfffffffeffffffff, 0x1, 0x8, 0xffffffffffffff7f, 0x9, 0x3f, 0x3f, 0xfffffff8, 0x30000, 0x2, 0x6, 0x8, 0x37e7be80, 0x6}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000180)={0x0, r1, "b99232df5192d7a3fa2baaf8bab3841e85eee1083d2b7544ec368a8f05691b7f4a72b1fdb6cc3dcb782b9fbdda283282959ee90f07c9e22cf3ac77258c9821a297b4143213decbaf396736df7adfe691956c99f13ebe24526b8dca1c590a74550a417a96759f351682b2045343c752969a508b83fad1395e2fb2ae30305b6b1eb2f0147677ebfa6ceb3f1e4fa0b98ac95e10a95880be4cda9a6962e54e01f8d67b1d82d175257cfa07a4a419b31e9b982a47355a2a4b99294fb74b1547bca87ec1772894f74d1c22e82ddcc9493e2168d847ecfd2ee8b8bfa93834ad615e44e9ff8588597513f44d03cf0a6bf8c6a76aac4d36533cb6f8c270cfdde4b31fde6e", "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"}) mq_open(&(0x7f0000000000)='${#\x00', 0x40, 0x50, &(0x7f0000000040)={0x1, 0xe000, 0x3, 0x3}) 00:20:16 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x2400, 0x0) 00:20:16 executing program 1: semget(0x3, 0x1, 0x200) 00:20:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001ac0)=@bloom_filter={0x1e, 0x0, 0x200, 0x200, 0x12}, 0x48) 00:20:16 executing program 1: mq_open(&(0x7f0000000140)='.log\x00\xd2:E\x91\xae*d\x86\x80:`(&`\xc6\x00\xa2r\x01M]h\a\x00\x00\x00\x00\x00\x00\x00\xc6\b\x90\xaf\x9f!\'d\x93\xbc\x97q\xe2\xdd\xb1\xf9\xb2\x82\x04\x04\x82\x86[\x8b\xa2\xa4\xf7\xdd\xce\x19\x9du\x9c\x97\x8c\xcd\xf7.1\xa6\x01\x00\x00\x00u\xbfx%E\xba\x96\xba\xa2X\t\x9c\t(Z\xc05q\xc1\xb6\x04\x1dU\x03\x06)S\xfb\xa5\f\xe0\x90\x17X*\xdd(\x01Gy\x941@\x14|\x0e!B\xc0\xe8\x9c\xac\xbe\xd4\x95\x00\xc5\xdf\xb0\xeeV\xab<\xd7\xbe\xa9\xef-\x00\x1d0\xf7\xc6\xbf\xd1\x94\vcX\x92Y\x7f\xe8\x7fK\xf2\x9c\x00\x00,\xad\xc1\x99r\xef>\x0f\xb63\x88e6\xf9\x976\x17\x89\xef\x16+\xbb\xef\xe5z\xb4F\xf4\f\x87\xf7([\x96AgD\b\xf5Q\xd4\x01\x11\xda\x98\xc9\xcc\x88\x132\xaf\xa9\xa7.\x03B\xcb@\xf6\xab\xe1?,\xe8\x06\x9a^\x9b\x95\xcf\xa9\xfaP\x96\x92*\xce\x89\x87#\xa5T\xebU\x02\xd0\xed\xc7\xe2G\xeaUjT\xc7\xc3\x8d\xdar\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Z\xc96\x84\xc7\x00\xfe\trr\xab\xc9\x8a@\x11\xa9\x00j\xab\nZ\x02O\xb2\xb3t\xe5\xee\x18\x96\xde\xcc\r`H\x84\xd1\x86I\x1bV\xd7g%?\xa5,\xcc\bv\xbeG\xed~v \xe3\xdam\x8e\x81\x93\xf9\fE0X|j\x83\x01\xa3\xbeD\t\x04w\xa5e\xbfx\x9d\x00'/398, 0x1, 0x60, 0x0) 00:20:16 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x80841, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) 00:20:16 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x2) 00:20:16 executing program 1: mq_open(&(0x7f0000001280)='\t\x16\xb8p\x00]Y1\xdd\xf6\xca\xa2\xa6\x1ba\xea0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, 0x0, 0x1000) 00:20:18 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x88841, 0x80) 00:20:18 executing program 1: shmget(0x1, 0x10000, 0x200, &(0x7f0000fed000/0x10000)=nil) 00:20:18 executing program 0: semget(0x0, 0x2, 0x84) 00:20:18 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x80841, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 00:20:18 executing program 0: r0 = eventfd(0x3) read$FUSE(r0, &(0x7f0000002380)={0x2020}, 0x2020) 00:20:18 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000540)='./file0\x00', 0x3a1400, 0xc0) 00:20:18 executing program 1: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) faccessat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) 00:20:18 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x80841, 0x0) write$FUSE_POLL(r0, 0x0, 0x0) 00:20:18 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/class/power_supply', 0x0, 0x0) read$FUSE(r0, 0xffffffffffffffff, 0x0) 00:20:18 executing program 1: r0 = semget(0x0, 0x3, 0x68d) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000000)=""/210) mq_open(&(0x7f0000000140)='\t\x16\xb8p\x00]Y1\xdd\xf6\xca\xa2\xa6\x1ba\xea5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xa1\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5.):\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB\x85R\x7f\x82\x9eB\xfb\xec\x9cJZ', 0x80, 0x100, &(0x7f0000000000)) 00:20:19 executing program 1: mq_open(&(0x7f0000000000)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbb]Aw\xd8\xdaj\xfb\xa6\x97\xe1\xe6\x13\xea\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1<\xc6\x97!Nf\x84\xa07\xa23\xa1\x06\xf9\xef\x9d@\x03\xaa\xbfW\x97|\xb3\xb1\xa5\xbcJ\x95\xde\xff\xff\xff\xff\x00\x00\x00\x00\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB\xcb\x99\nj\xf9\xea\x9a\xc6o\xa5\xc8\xb8?\x8eu\xbe=\xe9H\x00}e\x82\xb4\xbcW\x05\x90\xe4\x1d\xb8\x13\x04\v^/\x13\xb1\xa2\xa0u\xbb\x87\xe7\x10\xc5\xae\xce3l\x15O\xbdd3\xd5\xfb\xc7d\x00', 0x80, 0x80, 0x0) 00:20:19 executing program 0: mq_open(&(0x7f0000000040)='$$\\--!+}&\x00', 0x40, 0x111, 0x0) 00:20:19 executing program 1: mq_open(&(0x7f0000000040)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x10, 0x0) 00:20:19 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x80841, 0x0) write$P9_RLINK(r0, 0x0, 0x0) 00:20:19 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xa1\x06\xf9\xef\x9d@\x03\xaa\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x01\x00\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbr\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x0, 0x4, 0x0) 00:20:19 executing program 1: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xa1\x06\xf9\xef\x9d@\x03\xaa\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x80, 0x0, &(0x7f0000000000)) 00:20:19 executing program 0: mq_open(&(0x7f0000000040)='$$\\--!+}&\x00', 0x40, 0x110, &(0x7f0000000080)) 00:20:19 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200000d1, &(0x7f0000000240)={0x2, 0x4e22, @local}, 0x10) 00:20:19 executing program 0: r0 = socket(0x2, 0x1, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 00:20:19 executing program 1: mq_open(&(0x7f0000000040)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x80, 0x81, 0x0) 00:20:20 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x3, &(0x7f0000000000)) 00:20:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 00:20:20 executing program 1: mq_open(&(0x7f0000000040)='$$\\--!+}&\x00', 0x40, 0x111, &(0x7f0000000080)) 00:20:20 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x3, &(0x7f0000000000)) 00:20:20 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x3, &(0x7f0000000000)) 00:20:20 executing program 1: rt_sigreturn() syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 00:20:20 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x3, &(0x7f0000000000)) 00:20:20 executing program 0: mq_open(0x0, 0x800, 0x3, &(0x7f0000000000)) 00:20:20 executing program 0: mq_open(0x0, 0x800, 0x3, &(0x7f0000000000)) 00:20:21 executing program 1: fcntl$getflags(0xffffffffffffffff, 0xa) 00:20:21 executing program 0: mq_open(0x0, 0x800, 0x3, &(0x7f0000000000)) 00:20:21 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x0, 0x3, &(0x7f0000000000)) 00:20:21 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x100c, &(0x7f0000000400), &(0x7f0000000440)=0x10) 00:20:22 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x0, 0x3, &(0x7f0000000000)) 00:20:22 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x0, 0x3, &(0x7f0000000000)) 00:20:22 executing program 1: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 00:20:22 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x0, &(0x7f0000000000)) 00:20:22 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') 00:20:22 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x0, &(0x7f0000000000)) 00:20:22 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) chroot(&(0x7f0000000100)='./file0\x00') 00:20:22 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x0, &(0x7f0000000000)) 00:20:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1}]}]}}, 0x0, 0x32, 0x0, 0x8}, 0x20) 00:20:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x120, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0xf0, 0x8, 0x0, 0x1, [{0x98, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x70, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}]}]}]}]}, 0x120}}, 0x0) 00:20:22 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x3, 0x0) 00:20:22 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x3, 0x0) 00:20:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x1}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x29}, 0x20) 00:20:23 executing program 0: mq_open(&(0x7f0000000100)='$$\\--!+}&\x00)\xd2\x02\x11\xbf+>5\x82\x9dk\x90\xf3\xb8z\x1e,e\"v\xe2-\xb0\x00\xd1\x1b\xc2\xa2k]\x02J\x05L\x88Z$\xb6\xb4\xca\xc44\xfc\f\xd9\xff\x92\xeb\xad\xfcE\xbf\x0f4;\x04=\x83\xcb\xbbUAw\xd8\xdaj\xfb\xa6\x97\x99\v\x14G\xd2\xe1e\xf1\xca2\xbc\xf6X\xc6:#\xf7\xe1&\xc6\x97!Nf\x84\xa07\xa23\xff\x0f\x00\x00\x00\x00\x00\x00\xbfW\x97)|\xb3\xb1\xa5\xbcJ\x95\xde\xad\xf12O\a\x9e\x1b\xe5\xec\x86:\x87\xd50\x04&\xfa\xe5 \x94c\x18\xcds@\xbbs\xba\xb3\xac\xbey\x8b\x15 \xfd\xc4\xcc\xc9mB', 0x800, 0x3, 0x0) 00:20:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000a00)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x202, 0x4) sendmsg$can_raw(r0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x1d, r1, 0x3}, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=@can={{}, 0x0, 0x0, 0x0, 0x0, "ef101afe43b3d951"}, 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12020, 0x0) 00:20:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x2, 0x0, 0x10}]}}, 0x0, 0x26}, 0x20) 00:20:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x2, 0x0, 0x0, 0x8}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x28}, 0x20) 00:20:23 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:20:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@fwd={0x2, 0x0, 0x0, 0x8}]}, {0x0, [0x0]}}, 0x0, 0x27}, 0x20) 00:20:23 executing program 1: r0 = syz_io_uring_setup(0x3bc9, 0x0, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x225, &(0x7f0000000140)={0x0, 0xa45d, 0x4c2, 0x2, 0x2c0, 0x0, r0}, &(0x7f00000001c0), &(0x7f0000000200)) syz_io_uring_setup(0x3a44, &(0x7f0000000240)={0x0, 0x6927, 0x40, 0x3, 0x18d, 0x0, r0}, &(0x7f00000002c0), &(0x7f0000000300)) 00:20:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000002c0), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x6}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}}, 0x0) 00:20:23 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x2}}, 0x0) 00:20:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[], 0xff2e) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='numa_maps\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) [ 1223.793614][ T29] audit: type=1400 audit(1223.750:373): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=10.0.2.2 src=36694 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 00:20:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{}, {0x2}]}) 00:20:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1}]}]}, {0x0, [0x2e]}}, 0x0, 0x33}, 0x20) [ 1224.071552][ T29] audit: type=1400 audit(1224.020:374): avc: denied { recv } for pid=2974 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=57592 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 00:20:24 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x22, &(0x7f0000000040)={0xf182}, 0x8) 00:20:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0xa}}) 00:20:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5609, &(0x7f00000000c0)) [ 1226.376224][ T29] audit: type=1400 audit(1226.330:375): avc: denied { read write } for pid=2989 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1226.392220][ T29] audit: type=1400 audit(1226.350:376): avc: denied { open } for pid=2989 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1226.393299][ T29] audit: type=1400 audit(1226.350:377): avc: denied { ioctl } for pid=2989 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=790 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 00:20:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 00:20:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000c00)={0x0, 0x2, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x7ffff000}, 0x5}, 0x0) 00:20:26 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x10}, 0x300}, 0x0) 00:20:26 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x3, &(0x7f0000000040)={0xf182}, 0x8) 00:20:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x0, 0x0, 0x10, 0x2}]}}, 0x0, 0x26}, 0x20) 00:20:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:20:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:26 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x10000, &(0x7f00000001c0)=ANY=[@ANYBLOB='inode_readahead_blks=0x0000000000000000,nogrpid,debug_want_extra_isize=0x0000000000000066,dioread_nolock,max_batch_time=0x0000000000000008,resgid=', @ANYRESHEX=0x0, @ANYBLOB="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"], 0x0, 0x450, &(0x7f0000000dc0)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0x208e24b) getdents64(r0, 0x0, 0x0) 00:20:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 1227.122525][T15343] loop1: detected capacity change from 0 to 512 [ 1227.142081][T15343] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 1227.159528][T15343] EXT4-fs (loop1): 1 truncate cleaned up [ 1227.159899][T15343] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 00:20:27 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x90000018) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x70) [ 1227.244646][ T2991] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:20:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000002c0), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}}, 0x0) 00:20:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:20:27 executing program 0: sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x2, 0x0, 0x0, 0x8}]}, {0x0, [0x0, 0x2e, 0x2e]}}, 0x0, 0x29}, 0x20) 00:20:27 executing program 0: sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:27 executing program 1: syz_io_uring_setup(0x43f6, &(0x7f00000000c0), &(0x7f0000000140), 0x0) syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) 00:20:27 executing program 0: sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:27 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:28 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="370d000000000000064100040000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:20:29 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:20:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, 0x0, 0x0) 00:20:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x8000000, 0x0, 0x1}, 0x48) 00:20:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x24}}, 0x0) 00:20:29 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x1402, 0x3001}, 0x140}}, 0x0) 00:20:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@empty, @in=@multicast2}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 1230.296769][ T29] audit: type=1400 audit(1230.250:378): avc: denied { module_request } for pid=15388 comm="syz-executor.0" kmod="crypto-authenc(digest_null,ecb(cipher_null))" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 00:20:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:20:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000002600)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) io_setup(0x2, &(0x7f0000000000)=0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000001680)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f00000000c0)="63c06333076544", 0x7}]) 00:20:31 executing program 1: syz_io_uring_setup(0x668e, &(0x7f0000000540), 0x0, 0x0) syz_clone3(&(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000940)=[0x0], 0x1}, 0x58) 00:20:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x2, 0x0, 0x0, 0x8}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28}, 0x20) 00:20:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[], 0xff2e) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[], 0xff2e) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[], 0xff2e) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='numa_maps\x00') preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) 00:20:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xd, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:20:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@fwd={0x2, 0x0, 0x0, 0x8}]}, {0x0, [0x0, 0x2e, 0x5f, 0x2e]}}, 0x0, 0x2a}, 0x20) 00:20:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 00:20:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x2}]}, {0x0, [0x0, 0x2e, 0x2e]}}, 0x0, 0x29}, 0x20) 00:20:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000340)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_FRAME_COUNTER={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x24}}, 0x0) 00:20:34 executing program 1: timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x3, @thr={0x0, 0x0}}, 0x0) 00:20:34 executing program 1: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x8) mlockall(0x2) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) 00:20:34 executing program 0: timer_settime(0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000440), 0x0, 0x0, 0x8) ptrace(0x10, r0) timer_create(0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x20000000, 0x0) 00:20:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000700)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe}, 0xb) 00:20:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000180)={@local, @random="4df7ea056718", @val, {@ipv6}}, 0x0) 00:20:45 executing program 1: bpf$OBJ_GET_PROG(0x9, 0x0, 0x0) 00:20:45 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0/file0\x00', 0x0, &(0x7f0000004e80)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@blksize}, {@blksize}, {@blksize}], [{@hash}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, 'blksize'}}, {@dont_appraise}]}}, 0x0, 0x0, 0x0) 00:20:45 executing program 1: syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='.\x00', 0x0, &(0x7f0000002ec0)=ANY=[@ANYBLOB=','], 0x0, 0x0, 0x0) [ 1245.736047][T15436] SELinux: security_context_str_to_sid (un) failed with errno=-22 00:20:45 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0/file0\x00', 0x0, &(0x7f0000004e80)={{}, 0x22}, 0x0, 0x0, 0x0) 00:20:45 executing program 1: bpf$OBJ_GET_PROG(0x3, &(0x7f0000000040)=@o_path={0x0}, 0x18) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) 00:20:45 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 1245.995728][T15441] fuse: Bad value for 'fd' 00:20:45 executing program 1: syz_clone(0x801000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)='8') 00:20:46 executing program 0: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[], [], 0x22}}, 0x0, 0x0, 0x0) 00:20:46 executing program 1: socketpair(0xa, 0x5, 0x3, &(0x7f0000000140)) [ 1246.185282][T15447] fuse: Bad value for 'fd' 00:20:46 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0/file0\x00', 0x0, &(0x7f0000004e80)={{'fd', 0x22}}, 0x0, 0x0, 0x0) [ 1246.336052][T15452] fuse: Unknown parameter 'fd"0xffffffffffffffff' 00:20:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, ',\x04{/]'}}]}}, 0x0, 0x0, 0x0) 00:20:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f000000ac40)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f000000ac00)={&(0x7f000000ab80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 1246.517159][T15456] fuse: Unknown parameter 'subj_role' 00:20:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2001, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000180)={0x18}, 0x18) 00:20:46 executing program 1: bpf$OBJ_GET_PROG(0x6, 0x0, 0x105) 00:20:46 executing program 1: bpf$OBJ_GET_PROG(0xc, 0x0, 0x0) 00:20:46 executing program 0: bpf$OBJ_GET_PROG(0xf, &(0x7f0000000340)=@o_path={0x0}, 0x18) 00:20:46 executing program 1: bpf$OBJ_GET_PROG(0x12, 0x0, 0x0) 00:20:46 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x5e, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x4c, 0x1, 0x1, 0x0, 0x10, 0x6, [{{0x9, 0x4, 0x0, 0x0, 0x3, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x0, 0x5, 0x3}, [@mbim_extended={0x8, 0x24, 0x1c, 0x400, 0x7f}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x0, 0x6}}], {{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x0, 0x4}}, {{0x9, 0x5, 0x3, 0x2, 0x10, 0x5, 0x9}}}}}]}}]}}, &(0x7f0000000600)={0xa, &(0x7f0000000180)={0xa, 0x6, 0x0, 0x0, 0x1f}, 0x5, &(0x7f00000001c0)={0x5, 0xf, 0x5}, 0x5, [{0x4, &(0x7f00000002c0)=@lang_id={0x4}}, {0x4, &(0x7f0000000300)=@lang_id={0x4}}, {0x0, 0x0}, {0xd, &(0x7f0000000380)=@string={0xd, 0x3, "39d6c853e9286e7485e306"}}, {0x0, 0x0}]}) 00:20:46 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0/file0\x00', 0x0, &(0x7f0000004e80)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_eq}]}}, 0x0, 0x0, 0x0) [ 1247.090913][T15474] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 00:20:47 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000001e80), &(0x7f0000001ec0), &(0x7f0000001f00)={0x0, "8a3329dfabdcfc96b8de34afa184a7ff66d679d8a1e600763e91f02e91e15fe42a8b6623d1835b3df81d22b7c0f6161ab7dc343e1530e10f0e275f0f97a820fc"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "b55830485018a8314b764d590b32b258c1446261975172d9ec3cc5e9e6a222ea5e0d51a858dbad8758f3d5c3a768b5b32256699809bbd03ce479cda724bb67b1"}, 0x48, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffb, r1, 0x0) [ 1247.251643][T13997] usb 2-1: new high-speed USB device number 67 using dummy_hcd 00:20:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x7fff, 0x0, 0x0, 0x3, 0x0, "5faa474a3345b4df"}) [ 1247.491807][T13997] usb 2-1: Using ep0 maxpacket: 32 [ 1247.621779][T13997] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1247.622216][T13997] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1247.622442][T13997] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1247.624652][T13997] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 16 [ 1247.991731][T13997] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1247.992079][T13997] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1247.992282][T13997] usb 2-1: SerialNumber: 혹又⣩瑮 [ 1248.022580][T15469] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1248.043310][T13997] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 1248.259880][ T9489] usb 2-1: USB disconnect, device number 67 00:20:49 executing program 1: syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='.\x00', 0x0, &(0x7f0000002ec0)=ANY=[@ANYBLOB=',context'], 0x0, 0x0, 0x0) 00:20:49 executing program 0: bpf$OBJ_GET_PROG(0xd, &(0x7f0000000340)=@o_path={0x0}, 0x18) 00:20:49 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000040)) [ 1249.964413][T15491] fuse: Bad value for 'context' 00:20:49 executing program 1: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x24, 0x0, 0x0, 0x70bd2a, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008800}, 0x0) [ 1250.075379][T15494] binder: 15492:15494 ioctl c018620c 20000040 returned -1 00:20:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$FUSE_WRITE(r0, 0x0, 0x0) 00:20:50 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000080)=@abs, 0x6e, 0x0}, 0x0) 00:20:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$FUSE_WRITE(r0, 0x0, 0x0) 00:20:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x801, 0x0, 0xffffffffffffff1b) 00:20:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 00:20:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$FUSE_WRITE(r0, 0x0, 0x0) 00:20:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "aaa1a26e8376b62272805780cae3a0deffe5e9"}) 00:20:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$FUSE_WRITE(r0, 0x0, 0x0) 00:20:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20}, 0x20) 00:20:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0xffffffffffffffd8) 00:20:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$FUSE_OPEN(r0, 0x0, 0x0) 00:20:50 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x8a02, 0x0) write$binfmt_script(r0, 0x0, 0x45) 00:20:50 executing program 1: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40010, 0x0) 00:20:50 executing program 0: r0 = getegid() fchownat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, r0, 0x1000) 00:20:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') write$FUSE_BMAP(r0, &(0x7f0000000380)={0x18}, 0x18) 00:20:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x240440c4, 0x0, 0x40) 00:20:51 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x8202, 0x0) write$binfmt_script(r0, 0x0, 0x3) 00:20:51 executing program 0: fchownat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) 00:20:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002f80)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000082c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, &(0x7f00000083c0)={0x0, 0x3938700}) 00:20:51 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') write$FUSE_POLL(r0, 0x0, 0x4b) 00:20:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 00:20:51 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x8202, 0x0) write$binfmt_script(r0, 0x0, 0x0) 00:20:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002f80)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1}}], 0x2, 0x0, &(0x7f00000083c0)={0x0, 0x3938700}) 00:20:51 executing program 0: r0 = epoll_create1(0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 00:20:51 executing program 0: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) semget(0x1, 0x0, 0x0) 00:20:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 00:20:54 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x8202, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 00:20:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$FUSE_OPEN(r0, 0x0, 0x56) 00:20:54 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000000)=0x5d) 00:20:54 executing program 0: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@local, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, 0xe8) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000140)=""/69) 00:20:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) 00:20:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000100)={@private, @remote}, 0xc) 00:20:54 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 00:20:54 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x140, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x771, &(0x7f0000000840)="$eJzs3U1rHGUcAPD/zG6SvmnS6sEKYkHUQDXpG7aKhxRbQfRQfKPgpSFJS+i2KUkEWwq2H0EQbx78Du1BvJRevXkREY9FKRRt8wEiM5ndrO1uXsxuBp3fD6b7PPPs9nkmy3//s/PMzgRQWQeyf9KI/RFxI4kYLtYnETGQl+oREyvPW3p4fSpbklhe/ujPJH/Oo4fXp6LtNZndxct2RMRPd5PYV3uy34Wr1y5ONhoz80V9fPHSlfGFq9den700eWHmwszlY0cPHT92/OiJN3q3refevL3vyJnTZ2/9/OELc7c//TWJidhTtLVvR68ciAOtv0m7ekSc6nVnJakV25O2rUvqJQ6ITUnb3sPnYjhqsfrmDcfdW6UODgDoi+VsAQAqJpH/AaBimscBHj28PtVcyj0iAWyXBycjn6h/VMztL7Xivx4T+eOO/DyAXUtJtE/rJs1zB7Yo+z/++uar17Il+jQPD3R242Y+8d8h/yd5/I/kZ/E8Gf+1iOLzYWse/wwR/7B9thL/Z3rQv/gHAAAAAACA3rlzMiJOdJr/S1vn/0SH+b+hiDjUg/7Xn/9L7/egG6CDBycj3m67ts9SW/wXRmpF7an8fICB5PxsYyaL/acjYjQGhrL64TX6+P2zZ/Z3a8vi/9T8twebS9Z/9rj6jPR+feifr5meXJzcyjYDKx7cjHi+3in+k1b+T7qc/3tug33c++HH97q1rR//QL8sfxfxSsf8v3rlumTN6/ON57sD482dgg7ePTv6W7f+xT+UJ8v/u9aO/5Gk/XqdC5vvY/b9ie+7tf3b/f/B5OP8qqKDxbovJhcX5w9HDCYfPLn+yObHDP9HzXhoxksW/6Mvdf7+v9b+/0BEXNlgn19+cvrlbm3N3//J/7D9svif3lT+33yh9s7wvW79t//+N1uy/pu/BV6R5f9jeU4fLdY4/gdr22iAlj1OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADopTQi9kSSjrXKaTo2FrE7Ip6NXWljbmHx4Pm5zy9PZ20RIzGQnp9tzByKiOGVepLVD+fl1fqRx+pHI2JvRHw9tDOvj03NNabL3ngAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKOzucv//zB9DZY8OAOibHWUPAADYdvI/AFSP/A8A1SP/A0D1yP8AUD3yPwAAAAAAAAAAAAAAAAAAAAAAAAD01d4X7/ySRMSNt3bmS2awaBsodWRAv6VlDwAoTa3sAQClqZc9AKA0vuMDyTrt3W8R4ggCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADV8ep+9/+HqnL3Pqgu9/+H6nL/f6gu3/EB9/8HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID1LVy9dnGy0ZiZV1BQUGgVyv5kAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgv+DvAAAA//+2OQrH") 00:20:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x80, 0x6, 0xf00, 0x0, 0x0, 0x0, 0x0}) 00:20:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x80, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:20:54 executing program 1: epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000100), 0x80246713c2c7fdaa) [ 1255.422543][T15565] loop0: detected capacity change from 0 to 2048 [ 1255.482462][T15565] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1255.503096][T15565] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:20:55 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0xffffffffffffffff}}) 00:20:55 executing program 1: statx(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) 00:20:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newqdisc={0x80, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x50, 0x2, {{}, [@TCA_NETEM_LOSS={0x34, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GI={0x18}]}]}}}]}, 0x80}}, 0x0) socket$packet(0x11, 0x0, 0x300) 00:20:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x80, 0x6, 0x302, 0x0, 0x0, 0x0, 0x0}) [ 1255.819784][T15579] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 00:20:55 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x80, 0x6, 0x303, 0x0, 0x0, 0x0, 0x0}) 00:20:55 executing program 0: socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x95) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=0x9, 0x4) ptrace$peek(0x1, r0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 00:20:56 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}, 0x0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=@ng, 0x2, 0x0) [ 1256.142341][T15588] fuse: Bad value for 'fd' [ 1256.403271][ T29] audit: type=1800 audit(1256.360:379): pid=15588 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz-executor.1" name="/syzkaller-testdir2912992488/syzkaller.LDCB8n/2428/file0" dev="vda" ino=701 res=0 errno=0 00:20:56 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000080)=@usbdevfs_connect={0x3f}) 00:20:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x158, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x130, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private1}}]}, {0x38, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}]}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "537de61becd0fd70c0d75e804d0255e267b867df58d1a67fef0d28554c7d77ba"}, @WGPEER_A_FLAGS={0x8}]}, {0x4}]}]}, 0x158}}, 0x0) 00:20:56 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x77, 0x1) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f0000000000)={0x1da7, 0x1, [{0x1}]}) 00:20:56 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0xf9, 0x2b, 0x56, 0x10, 0x582, 0x7d, 0x2b6b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x40, 0x77, 0xe}}]}}]}}, 0x0) 00:20:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x4008005) [ 1257.301992][ T9489] usb 2-1: new high-speed USB device number 68 using dummy_hcd 00:20:57 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000580), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f00000005c0)) [ 1257.571698][ T9489] usb 2-1: Using ep0 maxpacket: 16 00:20:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) [ 1257.902010][ T9489] usb 2-1: New USB device found, idVendor=0582, idProduct=007d, bcdDevice=2b.6b [ 1257.902435][ T9489] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1257.902621][ T9489] usb 2-1: Product: syz [ 1257.902780][ T9489] usb 2-1: Manufacturer: syz [ 1257.902928][ T9489] usb 2-1: SerialNumber: syz [ 1257.954823][ T9489] usb 2-1: config 0 descriptor?? [ 1258.064675][ T9489] usb 2-1: interface 1 not found [ 1258.234427][ T9489] usb 2-1: USB disconnect, device number 68 00:20:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x30}, 0x0) 00:20:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000780)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) 00:21:00 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x9}, &(0x7f0000000180)={0x0, 0x989680}, 0x0) 00:21:00 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000580), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x80045301, &(0x7f00000005c0)) 00:21:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x8, 0x0, @private}}]}, 0x28}}, 0x0) 00:21:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x68, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x68}}, 0x0) 00:21:00 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000580), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0bc5310, &(0x7f00000005c0)={{0x7}}) 00:21:00 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000580), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x4b47, 0x0) 00:21:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x78, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x50, 0x8, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x24, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x4, 0x0, 0x0, 0x0}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x78}}, 0x0) 00:21:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x74, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x7, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x74}}, 0x0) 00:21:01 executing program 1: syz_emit_ethernet(0x0, 0xffffffffffffffff, 0x0) 00:21:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0xd, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8}, 0x10}}, 0x0) 00:21:01 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{0xe5}}) 00:21:01 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x10, 0x1, 0x2}}], 0x10}, 0x0) 00:21:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000800)="c8", 0x1}], 0x1, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) 00:21:04 executing program 0: syz_emit_ethernet(0x3a5, &(0x7f0000000080)=ANY=[@ANYBLOB="0180c2000001aaaaaaaaaa3c86dd69032426036f2f0100000000000000000000000000000001"], 0x0) 00:21:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0xd, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:21:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:21:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) getpid() r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x400000}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000001200)={r6, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x0, "7464fbe08eb369"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000005bec0)={0xfffffffffffffffd, [{}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x4, "9e71ca31aaa281"}) fcntl$getown(0xffffffffffffffff, 0x9) sched_setattr(0x0, 0x0, 0x0) creat(0x0, 0x58) r15 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r16 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/block/loop0', 0x181401, 0x18a) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r15, 0x89f0, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0x11, 0x6, 0x9, 0x40, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8000, 0x700, 0x0, 0x5d}}) sendmsg$nl_route(r16, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="078fd04c9386a89329bd70006460df2507dd000082032c449b94e12fd594603e0d71772fd78505a59985d4849b7ab9071e51b2608dd9be61fcaf631982f545808b4e2568deddc74a68c541b0e894c2914cda63b79523317ffb9894be6d6b4b09b45849cad59f236d4d4a69ca3eba6988de200ce09571f3ab68081acf9492fed7bb3fc80d3b183a774ef2f6a2ccc99ff531be554618cfe69e19c2bf43393dff317ab958a1a6dc2a19268472bd7215c90a92fff5ebc2db4fb79c5a047af2823943e461592405a5008de4e19b64eebbd35800000000", @ANYRES32=r17, @ANYBLOB="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"], 0x11c}}, 0x40000) fallocate(r15, 0x100000011, 0xd0000d0, 0x2811fdfe) 00:21:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz0\x00'}, 0x45c) 00:21:05 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) eventfd(0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000340), &(0x7f0000000380)={0x73}, 0x0, 0x0, 0x0) 00:21:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6}, 0x10}}, 0x0) 00:21:35 executing program 1: syz_clone(0x40000000, &(0x7f0000000140), 0x0, &(0x7f0000000000), 0x0, 0x0) 00:21:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) getpid() r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x400000}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000001200)={r6, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x0, "7464fbe08eb369"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000005bec0)={0xfffffffffffffffd, [{}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x4, "9e71ca31aaa281"}) fcntl$getown(0xffffffffffffffff, 0x9) sched_setattr(0x0, 0x0, 0x0) creat(0x0, 0x58) r15 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r16 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/block/loop0', 0x181401, 0x18a) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r15, 0x89f0, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0x11, 0x6, 0x9, 0x40, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8000, 0x700, 0x0, 0x5d}}) sendmsg$nl_route(r16, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="078fd04c9386a89329bd70006460df2507dd000082032c449b94e12fd594603e0d71772fd78505a59985d4849b7ab9071e51b2608dd9be61fcaf631982f545808b4e2568deddc74a68c541b0e894c2914cda63b79523317ffb9894be6d6b4b09b45849cad59f236d4d4a69ca3eba6988de200ce09571f3ab68081acf9492fed7bb3fc80d3b183a774ef2f6a2ccc99ff531be554618cfe69e19c2bf43393dff317ab958a1a6dc2a19268472bd7215c90a92fff5ebc2db4fb79c5a047af2823943e461592405a5008de4e19b64eebbd35800000000", @ANYRES32=r17, @ANYBLOB="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"], 0x11c}}, 0x40000) fallocate(r15, 0x100000011, 0xd0000d0, 0x2811fdfe) 00:21:36 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x80945, 0x0) syz_clone(0x40000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000240)="f5e2fc331aab74351ae4e372b4f783681ad9f644510e042895ca42c33595bf9e") r1 = gettid() syz_open_procfs$namespace(r1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x480a80, 0x0) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="39f453a74af9d47db63f76d2000c2d09b49bd26c6a0bbb44d2826c84ea5ca3a54ed2"], 0x20}, 0x1, 0x0, 0x0, 0xc000}, 0x10000000) 00:21:36 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000240)="f5e2fc331aab74351ae4e372b4f783681ad9f644510e042895ca42c33595bf9eacb14b418781a4e80e60e3") 00:21:36 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x80945, 0x0) syz_clone(0x40000000, &(0x7f0000000140)="d1fc98ffd6305d57e18e621e19f565b3aaffc0bf8df70411b02081a4d34e553da335e31052fe0242689a438304ed386f48b32030425ddd882c559326cd3ffa74ca880279c53a1f0ec7eda9409e428f2b82ab0e1b4b2cdae2180a3a7241db6adc399fc51644c41913059d8d5fbb6eddf873dc1fbdfcfafea532e63e5b24f3aa4a3ef4ddee167fbda87ed15a7446778c19e7ecaf41336880e394ffbc5867bf4654f0a565c7d38325d1b0e8fdb002baaf6a7905661cdc5a8d778e7b7de55ffb8812e1e17cae2b7b1434846953755b4c7602c1ba9fed8fc7fdfd0d6eb0c9070f886513c358fe79e58aba0c69e21c80b0c4e2", 0xf0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000240)="f5e2fc331aab74351ae4e372b4f783681ad9f644510e042895ca42c33595bf9eacb14b418781a4e80e60e3") r1 = gettid() syz_open_procfs$namespace(r1, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x480a80, 0x0) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="39f453a74af9d47db63f76d2000c2d09b49bd26c6a0bbb44d2826c84ea5ca3a54ed2552dddb134d1766ab94267479c98693179bd3313df000000001e836d59c377e159", @ANYRES16=0x0, @ANYBLOB="34062dbd7000fcdbdf25590000000c009900070000006c000000"], 0x20}, 0x1, 0x0, 0x0, 0xc000}, 0x10000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r2, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) 00:22:01 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000075c0)={&(0x7f0000007080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000007280)=[@dontfrag={{0x14}}, @hoplimit={{0x14}}], 0x30}, 0x0) 00:22:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) getpid() r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x400000}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000001200)={r6, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x0, "7464fbe08eb369"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000005bec0)={0xfffffffffffffffd, [{}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x4, "9e71ca31aaa281"}) fcntl$getown(0xffffffffffffffff, 0x9) sched_setattr(0x0, 0x0, 0x0) creat(0x0, 0x58) r15 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r16 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/block/loop0', 0x181401, 0x18a) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r15, 0x89f0, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0x11, 0x6, 0x9, 0x40, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8000, 0x700, 0x0, 0x5d}}) sendmsg$nl_route(r16, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="078fd04c9386a89329bd70006460df2507dd000082032c449b94e12fd594603e0d71772fd78505a59985d4849b7ab9071e51b2608dd9be61fcaf631982f545808b4e2568deddc74a68c541b0e894c2914cda63b79523317ffb9894be6d6b4b09b45849cad59f236d4d4a69ca3eba6988de200ce09571f3ab68081acf9492fed7bb3fc80d3b183a774ef2f6a2ccc99ff531be554618cfe69e19c2bf43393dff317ab958a1a6dc2a19268472bd7215c90a92fff5ebc2db4fb79c5a047af2823943e461592405a5008de4e19b64eebbd35800000000", @ANYRES32=r17, @ANYBLOB="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"], 0x11c}}, 0x40000) fallocate(r15, 0x100000011, 0xd0000d0, 0x2811fdfe) 00:22:01 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) [ 1322.102345][T15898] fuse: blksize only supported for fuseblk 00:22:02 executing program 1: mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2\x00', 0x1ff) mount$binderfs(0x0, &(0x7f0000000080)='./binderfs2\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@stats}]}) [ 1322.345912][ T29] audit: type=1400 audit(1322.300:380): avc: denied { mount } for pid=15899 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1322.414495][ T29] audit: type=1400 audit(1322.370:381): avc: denied { unmount } for pid=2991 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 00:22:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) getpid() r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x400000}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000001200)={r6, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x0, "7464fbe08eb369"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000005bec0)={0xfffffffffffffffd, [{}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x4, "9e71ca31aaa281"}) fcntl$getown(0xffffffffffffffff, 0x9) sched_setattr(0x0, 0x0, 0x0) creat(0x0, 0x58) r15 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r16 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/block/loop0', 0x181401, 0x18a) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r15, 0x89f0, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0x11, 0x6, 0x9, 0x40, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8000, 0x700, 0x0, 0x5d}}) sendmsg$nl_route(r16, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="078fd04c9386a89329bd70006460df2507dd000082032c449b94e12fd594603e0d71772fd78505a59985d4849b7ab9071e51b2608dd9be61fcaf631982f545808b4e2568deddc74a68c541b0e894c2914cda63b79523317ffb9894be6d6b4b09b45849cad59f236d4d4a69ca3eba6988de200ce09571f3ab68081acf9492fed7bb3fc80d3b183a774ef2f6a2ccc99ff531be554618cfe69e19c2bf43393dff317ab958a1a6dc2a19268472bd7215c90a92fff5ebc2db4fb79c5a047af2823943e461592405a5008de4e19b64eebbd35800000000", @ANYRES32=r17, @ANYBLOB="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"], 0x11c}}, 0x40000) fallocate(r15, 0x100000011, 0xd0000d0, 0x2811fdfe) 00:22:25 executing program 1: mknod(&(0x7f0000002340)='./file0\x00', 0x165d, 0x0) 00:22:25 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000001d80)) 00:22:26 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000280)='./file0\x00') 00:22:50 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000cc0)=@generic={&(0x7f0000000c80)='./file0\x00'}, 0x18) 00:22:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000940), r0) syz_genetlink_get_family_id$nl80211(&(0x7f00000009c0), 0xffffffffffffffff) 00:22:50 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000002040), 0x84400, 0x0) 00:22:50 executing program 0: symlink(&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000040)='./file0\x00') 00:22:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000003c0)={'ip6tnl0\x00', &(0x7f0000000340)={'ip6_vti0\x00', 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private0}}) 00:22:51 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x240, 0x88) 00:22:51 executing program 1: open$dir(&(0x7f0000003040)='./file0\x00', 0x80040, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000012c0)='./file0\x00', 0x82000410) 00:22:51 executing program 0: r0 = open$dir(&(0x7f0000003040)='./file0\x00', 0x80040, 0x0) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 00:22:51 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/class/power_supply', 0x0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, 0x0) 00:22:51 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000001380)='./file0\x00', 0x4000400) 00:22:51 executing program 0: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x8) rt_sigreturn() openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mlockall(0x3) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000007c0), 0x8, 0x0) read$watch_queue(r0, 0x0, 0x0) 00:22:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 00:22:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x60, 0x0, 0x0) 00:22:53 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x5450, 0x0) 00:22:54 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x5450, 0x0) 00:22:54 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x5450, 0x0) 00:22:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5421, &(0x7f0000000040)={0x6, 'ip6gre0\x00'}) 00:22:54 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x5450, 0x0) 00:22:54 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r0, 0x0, 0x0, 0x8084, 0x0, 0x14) 00:22:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5421, &(0x7f0000000040)={0x6, 'ip6gre0\x00'}) 00:22:54 executing program 0: shmget(0x1, 0x9000, 0x0, &(0x7f0000ff7000/0x9000)=nil) 00:22:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x20, 0x0, 0x0) 00:22:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5421, &(0x7f0000000040)={0x6, 'ip6gre0\x00'}) 00:22:55 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r0, 0x0, 0x0, 0x20000841, 0x0, 0x0) 00:22:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5421, &(0x7f0000000040)={0x6, 'ip6gre0\x00'}) 00:22:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) 00:22:55 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000002440)={0x10}, 0xffffffffffffff86) 00:22:55 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r0, 0x0, 0x0, 0x4884, 0x0, 0x61) 00:22:55 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) 00:22:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) 00:22:55 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000100)=""/226, &(0x7f0000000200)=0xe2) 00:22:56 executing program 0: r0 = socket(0x1, 0x3, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000040)) 00:22:56 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 00:22:56 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$inet(r0, 0x0, 0x0, 0x8011, 0x0, 0x59) 00:22:56 executing program 1: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) connect$packet(r0, 0x0, 0x0) 00:22:56 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000001380)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 00:22:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0xc, &(0x7f0000000080)=""/157, &(0x7f0000000000)=0x9d) 00:22:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x22, 0x0, 0x0) 00:22:56 executing program 1: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setregid(0xee01, r0) 00:22:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept$packet(r0, 0x0, 0x0) 00:22:56 executing program 1: r0 = socket(0x2, 0x2, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 00:22:57 executing program 0: bpf$MAP_LOOKUP_BATCH(0x1c, 0x0, 0x0) 00:22:57 executing program 1: syz_clone(0x48280000, &(0x7f0000000180)="0c6dea4e7f2a4988120f4709605f7f65f66da6173f1f8027", 0x18, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="6a45815abae0cf41c3aae344eb402b55545a4e9b3d9d102c003989b20a766776cd55fabfa889abe041ae850d3be0a2aaa4c78b2bce878f397b6179a1903e6803cf1dfd5882cb9a13e6bf4440959cae7424eb3bc77c8291231b8e89f830d262bbb99828231b05dfda8484b9d41657cda2aa54b4276b16cfbc2b7c352ac7cb6336cc0375a4842b74878402eefb4291113a53f2cfc83e37665bf48eba55e1a61e16d28056cb906bcd94f1c9aaf6650c72b4f4ba58d70184622e1fd4cc77") r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000140)) 00:22:57 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x3e4e974bb79d5c3}, 0x20) 00:22:57 executing program 0: write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x40800000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140), 0x0) 00:22:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000034c0)=@base={0xb, 0x0, 0x0, 0x80000000}, 0x48) 00:22:57 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x202080, 0x0) 00:22:57 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={0x0}, 0x18) 00:22:57 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001240)={@ifindex, 0xffffffffffffffff, 0x0, 0x2004, 0xffffffffffffffff, @prog_id}, 0x20) 00:22:58 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r0 = syz_clone(0x40800000, &(0x7f00000000c0)="264d80134cf8c8521fd2ff68acb219df85c4f0e5fbddef8063e5706dfa97e461409ba5b8b6ff3e93bf7ae026cf9c1f23b1b304a4d1ceb289f1f7291de685f684dbcb2aa6fe60a2a9cec28f1e9000d47c3f1df93c4f7841a9dbe4ddf2c6c6", 0x5e, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="e5fb8ab6c6eeda23e16c114aed19932b69c94cca99bcefb4253f77423c4105d52500596ee268fe28ee012f124688a8") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r0, 0x74) 00:22:58 executing program 0: write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) syz_clone(0x40800000, &(0x7f00000000c0)="264d80134cf8c8521fd2ff68acb219df85c4f0e5fbddef8063e5706dfa97e461409ba5b8b6ff3e93bf7ae026cf9c1f23b1b304a4d1ceb289f1f7291de685f684dbcb2aa6fe60a2a9cec28f1e9000d47c3f1df93c4f7841a9dbe4ddf2c6c6", 0x5e, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="e5fb8ab6c6eeda23e16c114aed19932b69c94cca99bcefb4253f77423c4105d52500596ee268fe28ee012f124688a8") 00:22:58 executing program 0: open$dir(&(0x7f0000000000)='.\x00', 0x500, 0x0) 00:22:58 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file2\x00') 00:22:58 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:22:58 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:22:59 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 00:22:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x1}, {}]}]}}, &(0x7f0000001400)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 00:22:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xc}]}]}}, 0x0, 0x2e}, 0x20) 00:22:59 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/wakeup_count', 0x40, 0x0) 00:22:59 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x8f) 00:22:59 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000000)=@abs, 0x8, 0x0}, 0x9) 00:22:59 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x2, &(0x7f0000000000)=@raw=[@exit, @generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x7, &(0x7f00000001c0)=""/7, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, &(0x7f0000000240), 0x10, 0x0, 0x0, 0x7, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}]}, 0xdd) 00:22:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:23:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 00:23:00 executing program 1: io_uring_setup(0x5928, &(0x7f0000000000)={0x0, 0x0, 0x47, 0xf7020000}) 00:23:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x500}, 0x0) 00:23:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x501}, 0x14}}, 0x0) 00:23:00 executing program 1: syz_clone3(&(0x7f0000000340)={0x42000000, &(0x7f0000000040), &(0x7f0000000080), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:23:00 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x1, &(0x7f0000000000)=@raw=[@exit={0x95, 0x0, 0x0, 0x2}], &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file2\x00', 0x2008052, &(0x7f0000000040)=ANY=[@ANYRES8=0x0], 0x1, 0x55d, &(0x7f0000000540)="$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") open(&(0x7f0000000480)='.\x00', 0x490902, 0x0) [ 1380.740745][T16144] loop0: detected capacity change from 0 to 512 [ 1380.747061][T16144] ======================================================= [ 1380.747061][T16144] WARNING: The mand mount option has been deprecated and [ 1380.747061][T16144] and is ignored by this kernel. Remove the mand [ 1380.747061][T16144] option from the mount to silence this warning. [ 1380.747061][T16144] ======================================================= [ 1380.852263][T16144] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 00:23:00 executing program 0: r0 = socket(0x2, 0x3, 0x6) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x11) [ 1380.973881][ T2989] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:23:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x1}]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:23:01 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='GPL\x00', 0x3, 0x5, &(0x7f00000001c0)=""/7, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:23:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x26}, 0x20) 00:23:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xe}, 0x48) 00:23:01 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 00:23:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}, 0x2}, 0x0) 00:23:01 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x3, 0x7, &(0x7f00000001c0)=""/7, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:01 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 00:23:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000003}}, &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:02 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/uevent_seqnum', 0x8200, 0x0) 00:23:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 00:23:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x2}]}, {0x0, [0x0, 0x5f, 0x61]}}, 0x0, 0x29}, 0x20) 00:23:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000080)=""/172, 0x26, 0xac, 0x1}, 0x20) 00:23:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x2}]}) 00:23:03 executing program 0: io_uring_setup(0x1cec, &(0x7f00000001c0)={0x0, 0x0, 0x19000}) 00:23:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 00:23:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000000400)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 00:23:03 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000400)=""/4096, 0x0, 0x1000}, 0x20) 00:23:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x32}, 0x20) 00:23:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000002c0), r0) setresuid(0xffffffffffffffff, 0xee01, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1}, 0x14}}, 0x0) 00:23:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:23:04 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/reserved_size', 0x2, 0x0) 00:23:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB='P'], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:05 executing program 0: r0 = eventfd(0x3) read$eventfd(r0, &(0x7f0000000000), 0x8) 00:23:05 executing program 1: r0 = getuid() fchownat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', r0, 0x0, 0x0) 00:23:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x8f) 00:23:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000001400)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 00:23:06 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0), r0) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14, 0x0, 0x1}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x1, 0x70bd2d, 0x25dfdbef, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040900}, 0x44010) 00:23:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 00:23:07 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) r1 = epoll_create(0x6) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x25, r1}, './file0\x00'}) 00:23:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='GPL\x00', 0x3, 0x6, &(0x7f00000001c0)=""/7, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:07 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0x5450, 0x0) 00:23:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x2}]}, {0x0, [0x0, 0x2e, 0x5f, 0x61, 0x61]}}, 0x0, 0x2b}, 0x20) 00:23:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 00:23:07 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = eventfd(0x10000) read$eventfd(r0, &(0x7f0000000040), 0x8) 00:23:08 executing program 1: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) 00:23:08 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/wakeup_count', 0x8041, 0x0) 00:23:08 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 00:23:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) 00:23:08 executing program 1: io_uring_setup(0x7106, &(0x7f0000000040)={0x0, 0x4364, 0x2f6d}) 00:23:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x1, &(0x7f0000000000)=@raw=[@exit={0x95, 0x2}], &(0x7f0000000180)='GPL\x00', 0x3, 0x7, &(0x7f00000001c0)=""/7, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:08 executing program 0: pselect6(0x77, &(0x7f00000020c0)={0x0, 0xfffffffffffffffc}, &(0x7f0000002800), 0x0, &(0x7f0000002880)={0x0, 0x3938700}, 0x0) 00:23:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000000400)=""/4096, 0x26, 0x1000, 0xa}, 0x20) 00:23:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:23:09 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0x4b47, 0x0) 00:23:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 00:23:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001240), r0) 00:23:09 executing program 0: setresuid(0xee01, 0xee00, 0xee01) 00:23:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000001400)=""/4096, 0x3e, 0x4, 0x1}, 0x20) 00:23:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:12 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0x80087601, 0x0) 00:23:12 executing program 0: signalfd(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) 00:23:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x9, 0x100000}]}}, 0x0, 0x26}, 0x20) 00:23:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000001400)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 00:23:12 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x500}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}}, 0x0) 00:23:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x1}]}}, 0x0, 0x26}, 0x20) 00:23:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2, 0x6}]}]}}, &(0x7f0000000040)=""/14, 0x32, 0xe, 0x1}, 0x20) 00:23:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {}]}]}}, &(0x7f0000001400)=""/4096, 0x36, 0x1000, 0xa}, 0x20) 00:23:12 executing program 1: syz_io_uring_setup(0x2983, &(0x7f0000000040), &(0x7f00000000c0), 0x0) syz_io_uring_setup(0x69fd, &(0x7f0000000140)={0x0, 0x0, 0x800}, &(0x7f00000001c0), &(0x7f0000000200)) 00:23:12 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x3, 0xee00, 0xee00, 0xee00, 0xee00}}) 00:23:13 executing program 1: r0 = socket(0xa, 0x3, 0x1) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 00:23:13 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 00:23:13 executing program 1: io_uring_setup(0x50001bdf, &(0x7f00000001c0)) 00:23:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, 0x0, 0x26}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 00:23:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 00:23:15 executing program 1: pselect6(0x77, &(0x7f00000020c0), &(0x7f0000002800)={0x7}, 0x0, &(0x7f0000002880)={0x0, 0x3938700}, 0x0) 00:23:15 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x0, 0x0}, 0x10) 00:23:15 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0x401c5820, 0x0) 00:23:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, 0x0, 0x36}, 0x20) 00:23:16 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0x2, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:23:16 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189436, 0x0) 00:23:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000001400)=""/4096, 0x2e, 0x1000, 0xa}, 0x20) 00:23:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_STATUS={0x8}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x7}]}, 0x24}}, 0x0) 00:23:16 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f00000017c0), 0x0, 0x0) 00:23:16 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@ipv6_deladdr={0x18, 0x15, 0x1}, 0x18}}, 0x0) 00:23:16 executing program 0: pipe2$watch_queue(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = add_key$keyring(&(0x7f0000000ac0), &(0x7f0000000b00)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r0, 0x0) 00:23:16 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = openat$audio1(0xffffff9c, &(0x7f0000005400), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x5) 00:23:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x3, &(0x7f00000007c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:23:16 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0x541b, 0x0) 00:23:17 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = openat$audio1(0xffffff9c, &(0x7f0000005400), 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f0000000000)) 00:23:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 00:23:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 00:23:17 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x402101) 00:23:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) connect$inet(r2, &(0x7f0000000140)={0x10, 0x2}, 0x10) 00:23:17 executing program 0: pipe2$watch_queue(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, 0x0, 0x0) 00:23:17 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), 0xffffffffffffffff) 00:23:17 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}]}}}]}, 0x3c}}, 0x0) 00:23:18 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="380000003a000b000000000013800c0048"], 0x38}}, 0x0) [ 1398.145265][T16349] (unnamed net_device) (uninitialized): option lacp_rate: mode dependency failed, not supported in mode balance-rr(0) 00:23:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) statx(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14}, 0x14}}, 0x0) 00:23:18 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = openat$dsp(0xffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000040)) 00:23:18 executing program 0: getresuid(&(0x7f0000000000), 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), 0x0) 00:23:18 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x77359400}}, &(0x7f0000000100)) 00:23:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) 00:23:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000ac0), &(0x7f0000000b00)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, 0xfffffffffffffffc) 00:23:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 00:23:18 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000000000000000000000000000000000000a3c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000f6070005404a90b692140000000c0a0000"], 0x78}}, 0x0) 00:23:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'vcan0\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) [ 1399.121992][T16367] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 00:23:19 executing program 0: openat$rtc(0xffffff9c, &(0x7f0000000240), 0x290400, 0x0) 00:23:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001200)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 00:23:19 executing program 1: socketpair(0x2, 0x3, 0x0, &(0x7f0000000f00)) 00:23:19 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x1, 0x2, 0x201}, 0x14}}, 0x0) 00:23:19 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x1007, 0x0) mount$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x24000, &(0x7f0000002380)) 00:23:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000ac0), &(0x7f0000000b00)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x0) 00:23:19 executing program 1: syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) r0 = openat$rtc(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 00:23:19 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x1007, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) 00:23:20 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/244) 00:23:20 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000a00)={'vcan0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x202, 0x4) sendmsg$can_raw(r0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x1d, r1, 0x3}, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=@can={{}, 0x0, 0x0, 0x0, 0x0, "ef101afe43b3d951"}, 0x10}}, 0x0) 00:23:20 executing program 1: syz_open_dev$rtc(&(0x7f0000000280), 0x0, 0x109300) 00:23:20 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)={0x2, 'wg0\x00'}) 00:23:20 executing program 1: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000480)='./file0\x00', 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0) 00:23:20 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) open(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) 00:23:20 executing program 0: socketpair(0x2, 0x2, 0x0, &(0x7f0000000f00)) 00:23:20 executing program 1: socketpair(0x2, 0xa, 0xffffffff, &(0x7f0000000f00)) 00:23:21 executing program 0: open$dir(0x0, 0x40a000, 0x0) 00:23:21 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) openat$audio1(0xffffff9c, &(0x7f0000005400), 0x5d00, 0x0) 00:23:21 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x1, 0x1, 0x101}, 0x14}}, 0x0) 00:23:21 executing program 0: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001200)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 00:23:21 executing program 1: socketpair(0x28, 0x0, 0x0, &(0x7f0000000f00)) 00:23:21 executing program 0: add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000ac0), &(0x7f0000000b00)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 00:23:21 executing program 1: socketpair(0x8, 0x0, 0x2, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000ac0), &(0x7f0000000b00)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 00:23:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x10}]}) 00:23:21 executing program 1: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:23:21 executing program 0: prctl$PR_SET_MM(0x41555856, 0xf7354000, &(0x7f0000ffa000/0x3000)=nil) fchownat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x400) 00:23:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 00:23:22 executing program 0: r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x1}) 00:23:22 executing program 0: r0 = epoll_create1(0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) 00:23:22 executing program 1: r0 = epoll_create1(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x2006}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:23:22 executing program 0: r0 = epoll_create1(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x20000011}) 00:23:22 executing program 1: r0 = epoll_create1(0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) 00:23:22 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x12d180, 0x0) [ 1402.787128][ T29] audit: type=1400 audit(1402.740:382): avc: denied { block_suspend } for pid=16432 comm="syz-executor.0" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 00:23:22 executing program 0: r0 = epoll_create1(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0xf000000d}) 00:23:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000900)={&(0x7f0000000000)=@proc, 0xc, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c"], 0x40}, 0x0) 00:23:23 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x6a4782, 0x0) 00:23:23 executing program 1: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) 00:23:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xa}, 0x48) 00:23:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000040), 0x4) 00:23:23 executing program 0: r0 = epoll_create1(0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) 00:23:23 executing program 1: r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000280)) 00:23:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000900)={&(0x7f0000000000)=@proc, 0xc, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000039"], 0x40}, 0x0) 00:23:23 executing program 0: socketpair$nbd(0x2d, 0x1, 0x0, &(0x7f0000001500)) 00:23:23 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.parent_freezing\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) 00:23:23 executing program 0: socketpair$nbd(0x10, 0x1, 0x0, &(0x7f0000001500)) 00:23:23 executing program 1: socketpair$nbd(0xa, 0x1, 0x0, &(0x7f0000001500)) 00:23:24 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) 00:23:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000004e40), 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 00:23:24 executing program 0: add_key$fscrypt_v1(&(0x7f0000001e80), &(0x7f0000001ec0), &(0x7f0000001f00)={0x0, "8a3329dfabdcfc96b8de34afa184a7ff66d679d8a1e600763e91f02e91e15fe42a8b6623d1835b3df81d22b7c0f6161ab7dc343e1530e10f0e275f0f97a820fc"}, 0x48, 0xfffffffffffffffb) 00:23:24 executing program 0: getresgid(&(0x7f0000006480), &(0x7f00000064c0), &(0x7f0000006500)) 00:23:24 executing program 1: getrusage(0x22f3270d411ddfde, 0x0) 00:23:24 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000500), 0x20840, 0x0) 00:23:24 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)) [ 1404.657327][ T29] audit: type=1400 audit(1404.610:383): avc: denied { write } for pid=16479 comm="syz-executor.0" name="task" dev="proc" ino=37809 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1404.658655][ T29] audit: type=1400 audit(1404.610:384): avc: denied { add_name } for pid=16479 comm="syz-executor.0" name="16481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1404.672471][ T29] audit: type=1400 audit(1404.610:385): avc: denied { create } for pid=16479 comm="syz-executor.0" name="16481" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 1404.677418][ T29] audit: type=1400 audit(1404.610:386): avc: denied { associate } for pid=16479 comm="syz-executor.0" name="16481" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 00:23:24 executing program 0: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='q', 0x1, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000000c0)={r0}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'hmac(sha256-avx2)\x00'}}, 0x0, 0x0) 00:23:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000005200010026bd7000f8dbdf250a"], 0x3c}}, 0x0) 00:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000019001101000000000000004a0a0000000002"], 0x28}}, 0x0) [ 1404.932847][T16488] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1404.947588][T16489] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 00:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000019001101000000000000004a0ac8"], 0x28}}, 0x0) 00:23:24 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) [ 1405.128894][T16493] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 00:23:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@ipv4_newnexthop={0x1c, 0x19, 0x111, 0x0, 0x0, {0xa, 0x2}, [@NHA_RES_GROUP={0x4}]}, 0x1c}}, 0x0) 00:23:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:23:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) 00:23:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@delnexthop={0x28, 0x66, 0x1, 0x0, 0x0, {}, [{0x8}, {0x8}]}, 0x28}}, 0x0) [ 1405.532219][T16500] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:23:25 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r0) 00:23:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x2e4}}, 0x0) 00:23:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0x2}}}, 0x24}}, 0x0) 00:23:25 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "4f9d43b48a9cb2c1f24f718739abbc32381d035b41c5219f152f0a5c9e74d705bdc3a3d7d55b0b8ce32f7f1b2e0f4946db4f92aca2bd262a2b58ff00143bea5a"}, 0x48, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r0) 00:23:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280), r0) 00:23:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 00:23:26 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000040)) 00:23:26 executing program 0: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000e00)={0x2020}, 0x2020) 00:23:26 executing program 0: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100), 0x0) syz_clone(0x40804200, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="eede4efe66da84283ab80083557462a8e32eef4ce7f8dc776471aa60836162d260498e4b0e99068af3ffcfe9abb9de25e7bb122ac88d091f48ce074f8196dd3b71902036710c5fa8dd57ec16dfed605a9a0d8d0b8b618c09f7274562b3549ea9f425f1b66b45b223488e1aa9d05724a3e90382d00c4956cc6d5ecf6f4bbd301e36a1fc2d669865d0d21c15a13863dbd6632f8fbb340b22281343092c521d2e6a5206b08c21a5294c0984e0959403b8d9b71d8b02c4a4f67cd9096e2fb58e79ccc1f93e06875202dd0a874aade966b5da20e6319f") 00:23:26 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:23:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001e0001e9"], 0x3c}}, 0x0) [ 1406.603976][T16544] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 00:23:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004e80)={0x2020}, 0x2020) 00:23:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_deladdr={0x34, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x15, 0x1, @private1}, @IFA_FLAGS={0x8}]}, 0x34}}, 0x0) 00:23:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00000052000102"], 0x3c}}, 0x0) [ 1408.186095][T16549] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:23:28 executing program 0: add_key$fscrypt_v1(&(0x7f0000001e80), 0x0, 0x0, 0x0, 0xfffffffffffffffb) 00:23:28 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000740)={0x3, &(0x7f0000000700)=[{}, {}, {0x9}]}) 00:23:28 executing program 1: bpf$OBJ_GET_PROG(0x16, &(0x7f0000000340)=@o_path={0x0}, 0x18) 00:23:28 executing program 0: getresgid(&(0x7f0000006480), &(0x7f00000064c0), 0x0) 00:23:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@delnexthop={0x20, 0x1e, 0x1, 0x0, 0x0, {}, [{0x8}]}, 0x20}}, 0x0) 00:23:28 executing program 0: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {}, {}, {@allow_other}, {@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x59, 0x34]}}}]}}, 0x0, 0x0, 0x0) 00:23:28 executing program 1: syz_mount_image$fuse(&(0x7f00000021c0), &(0x7f0000002200)='./file0\x00', 0x800089, &(0x7f0000002280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@allow_other}, {@allow_other}, {@default_permissions}], [{@smackfsroot={'smackfsroot', 0x3d, '&'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) [ 1408.855395][T16562] fuse: Bad value for 'fd' 00:23:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000002e0001"], 0x24}}, 0x0) [ 1409.070448][T16565] fuse: Bad value for 'fd' 00:23:29 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000240)='./file0\x00'}, 0x18) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0) 00:23:29 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0xc0e80, 0x0) 00:23:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') write$tcp_congestion(r0, 0x0, 0x0) 00:23:29 executing program 1: write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f00000021c0), &(0x7f0000002200)='./file0\x00', 0x0, &(0x7f0000002280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@allow_other}, {@allow_other}, {@default_permissions}], [{@smackfsroot={'smackfsroot', 0x3d, '&'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) 00:23:29 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)="81") [ 1409.975679][T16577] fuse: Bad value for 'fd' 00:23:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@ipv4_newnexthop={0x1c, 0x19, 0x111, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x300}, [@NHA_RES_GROUP={0x4}]}, 0x1c}}, 0x0) 00:23:30 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000640)=@encrypted_update={'update ', 'default', 0x20, 'user:', 'digest_null-generic\x00'}, 0x29, 0x0) 00:23:30 executing program 0: syz_clone(0x890400, 0x0, 0x0, 0x0, 0x0, 0x0) 00:23:30 executing program 1: getresgid(&(0x7f0000006480), 0x0, 0x0) 00:23:30 executing program 0: memfd_create(&(0x7f0000000680)='&[{\x90-\xad^]&{#$*$\xfc^\'&\x00', 0x4) 00:23:30 executing program 1: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x13) 00:23:30 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x4000100) 00:23:30 executing program 1: mount$fuseblk(0x0, 0x0, &(0x7f0000000c40), 0x0, &(0x7f0000000c80)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) 00:23:31 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[], [{@appraise}]}}, 0x0, 0x0, 0x0) 00:23:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@can_delroute={0x1c, 0x19, 0xb3b, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) [ 1411.513780][T16597] fuse: Bad value for 'fd' 00:23:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001a0001e9f9a3777324d301e4"], 0x3c}, 0x11}, 0x0) 00:23:31 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000001e80), &(0x7f0000001ec0), &(0x7f0000001f00)={0x0, "8a3329dfabdcfc96b8de34afa184a7ff66d679d8a1e600763e91f02e91e15fe42a8b6623d1835b3df81d22b7c0f6161ab7dc343e1530e10f0e275f0f97a820fc"}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080)={r0}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'streebog256-generic\x00'}}, 0x0, 0x0) 00:23:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000001780), 0xffffffffffffffff) 00:23:31 executing program 1: write$FUSE_STATFS(0xffffffffffffffff, &(0x7f00000020c0)={0x60}, 0x60) getresgid(&(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)) 00:23:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 00:23:32 executing program 1: syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) 00:23:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) getsockname$packet(r0, 0x0, 0x0) 00:23:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000002e0001"], 0x3c}}, 0x0) 00:23:32 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x18) [ 1412.703889][T16613] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 00:23:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@ipv4_newnexthop={0x1c, 0x19, 0x111, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x6000000}, [@NHA_RES_GROUP={0x4}]}, 0x1c}}, 0x0) 00:23:32 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, &(0x7f0000002280)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@allow_other}, {@allow_other}, {@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x9}}], [{@smackfsroot={'smackfsroot', 0x3d, '&'}}]}}, 0x0, 0x0, &(0x7f00000023c0)) 00:23:32 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) 00:23:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg2\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x7}}, 0x1c}}, 0x0) 00:23:33 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000100)) 00:23:33 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "ca7e5f8d2051a524bfe5d1584810c1c11a086ec5c0fc6fe1d042edf9380176477ceef12993920d77f4043045516b00ddf52d736acab55e20b317479c4c6af014"}, 0x48, 0xfffffffffffffffd) 00:23:33 executing program 1: sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x24f2ce34c28bcae5) 00:23:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}, 0x0, 0x0, 0x0) 00:23:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001e0001e91e01e6b3e6c9e9ecd6"], 0x3c}}, 0x0) 00:23:33 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20840, 0x141) [ 1414.204206][T16635] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 00:23:34 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmdt(r1) 00:23:34 executing program 0: mq_open(&(0x7f0000001340)='.:{)@):\\\x00', 0x41, 0xd0, &(0x7f0000001380)) 00:23:34 executing program 0: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 00:23:34 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x12b840, 0x0) execve(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) 00:23:34 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x2000) [ 1414.926931][T16644] process 'syz-executor.1' launched './file0/file0' with NULL argv: empty string added 00:23:34 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20840, 0x2a) 00:23:34 executing program 1: semget(0x1, 0x2, 0x2d5) 00:23:35 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600), &(0x7f0000001640), 0x0, 0x1) 00:23:35 executing program 1: r0 = inotify_init1(0x0) read$FUSE(r0, &(0x7f0000000400)={0x2020}, 0x2020) 00:23:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0x4) 00:23:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000040)=""/139, &(0x7f0000000100)=0x8b) 00:23:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000000)="1a", 0x1) 00:23:38 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x4bb40, 0x5) 00:23:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000003680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:23:38 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) 00:23:38 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 00:23:39 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/locks\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000ac0)=[{&(0x7f00000008c0)=""/47, 0x2f}], 0x1, 0x80000001, 0x0) 00:23:40 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/locks\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000ac0)=[{&(0x7f00000008c0)=""/47, 0x2f}], 0x1, 0x0, 0x0) 00:23:40 executing program 1: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffd, &(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000080)='.{+[\x00') [ 1420.950684][ T29] audit: type=1400 audit(1420.900:387): avc: denied { setattr } for pid=16670 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 00:23:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x54, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}]}]}, 0x54}}, 0x0) 00:23:40 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000006700), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000006740)) 00:23:41 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)={0x4c, 0x13, 0x1}, 0x4c}}, 0x0) 00:23:41 executing program 0: clock_getres(0x627c92b242b0df7, 0x0) 00:23:41 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xffffffffffffffff) 00:23:41 executing program 0: semget(0x3, 0x2, 0x214) 00:23:41 executing program 0: clock_adjtime(0x0, &(0x7f00000000c0)={0x7fe}) 00:23:41 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) 00:23:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x0, 0x0, 0x1}, 0x48) 00:23:41 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x1}, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0x200000000]}, 0x8}) 00:23:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:23:41 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3ea}, 0x10}}, 0x0) 00:23:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @private}}]}, 0x28}}, 0x0) 00:23:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) read$FUSE(r0, &(0x7f0000001740)={0x2020}, 0x2020) 00:23:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x30}}, 0x0) 00:23:42 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=@ng, 0x20000302, 0x0) 00:23:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$unix(r1, &(0x7f00000048c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="8d", 0x1}], 0x1}, 0x0) 00:23:44 executing program 1: bpf$MAP_CREATE(0x18, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:23:44 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x300}, 0x0) [ 1424.680600][T16742] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16742 comm=syz-executor.1 00:23:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x58, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x30, 0x8, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x4}]}]}]}, 0x58}}, 0x0) 00:23:44 executing program 0: clock_getres(0xc94965e0e8f92a58, 0x0) 00:23:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_FLAGS={0x8}]}]}]}, 0x5c}}, 0x0) 00:23:45 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x1000, 0x0) 00:23:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x80, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x58, 0x8, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x80}}, 0x0) 00:23:45 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000002680), 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, 0x0) 00:23:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0xd, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:23:45 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:23:45 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xfd97, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x0, 0x0, 0x0, "", [""]}, 0x10}, 0x300}, 0x0) [ 1425.926663][T16766] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16766 comm=syz-executor.1 00:23:45 executing program 1: keyctl$set_reqkey_keyring(0x18, 0x0) 00:23:47 executing program 0: keyctl$set_reqkey_keyring(0x2, 0x0) 00:23:47 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) 00:23:47 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000003240), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000021c0)='./file0\x00', 0x0, &(0x7f0000002380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x9000}}, 0x0, 0x0, 0x0) 00:23:47 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000040)={0x0, 0x0, 0x0}) 00:23:47 executing program 0: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) recvmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}], 0x300, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) [ 1427.967515][T16798] fuse: Invalid rootmode 00:23:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x80000) 00:23:49 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000001300)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(0x0, 0x2, 0x90) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000080)={0x0, 0x804a0200, &(0x7f0000000140)={&(0x7f0000000180)={0x14, 0x18, 0xa01, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) r6 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) setrlimit(0x3, &(0x7f0000000540)={0x9, 0x4cda}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x3c, 0x0, 0x8}, @map_fd, @exit]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xfdcb, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) getpid() getegid() 00:23:50 executing program 1: futex(&(0x7f000000cffc), 0xb, 0x0, 0x0, &(0x7f0000048000), 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) recvmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 00:23:51 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000002580)=""/253, &(0x7f00000022c0)=0xfd) [ 1432.112333][ T29] audit: type=1400 audit(1432.051:388): avc: denied { getopt } for pid=16841 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 00:23:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x2, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_key={0x1, 0x8}, @sadb_sa={0x2}, @sadb_key={0x1, 0xd00f04a195a41a36}]}, 0x38}}, 0x0) 00:23:52 executing program 0: pselect6(0x3a, &(0x7f0000000000), &(0x7f0000000040)={0x1}, 0x0, 0x0, 0x0) 00:23:53 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x3b8}]}) 00:23:53 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/ip_tables_targets\x00') 00:23:53 executing program 0: socketpair(0x28, 0x0, 0xbc8, &(0x7f0000000000)) 00:23:53 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x2, &(0x7f0000000880)=[{}, {}]}) 00:23:53 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x10, 0x0, &(0x7f0000000080)) 00:23:53 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0xa, 0x0, &(0x7f0000000080)) 00:23:53 executing program 1: prctl$PR_GET_NAME(0x10, &(0x7f0000000900)=""/4096) 00:23:53 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200100, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) 00:23:53 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{}]}) 00:23:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x2, &(0x7f0000000880)=[{0x5}, {0x2, 0x0, 0x0, 0x25a52652}]}) 00:23:53 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x11) 00:23:54 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 00:23:54 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x22, 0x0, &(0x7f0000000080)) 00:23:54 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x199cc2, 0x0) 00:23:54 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x28, 0x0, &(0x7f0000000080)) 00:23:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, 0x0) 00:23:54 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 00:23:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x2, &(0x7f0000000880)=[{0x2}]}) 00:23:54 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x5, 0x0, &(0x7f0000000080)) 00:23:54 executing program 0: add_key$user(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="84", 0x1, 0xfffffffffffffffc) 00:23:54 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x145d40, 0x0) 00:23:54 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x14, 0x0, &(0x7f0000000080)) 00:23:55 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xe01, 0x0) 00:23:55 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x37, 0x0, &(0x7f0000000080)) 00:23:55 executing program 0: r0 = fsopen(&(0x7f0000000040)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 1435.385132][ T29] audit: type=1400 audit(1435.331:389): avc: denied { mount } for pid=16895 comm="syz-executor.0" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 00:23:55 executing program 0: pselect6(0x40, &(0x7f00000006c0), 0x0, &(0x7f0000000740), &(0x7f0000000780)={0x0, 0x989680}, 0x0) 00:23:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1108000a}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:23:55 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x80945, 0x0) syz_clone(0x40000000, &(0x7f0000000140)="d1fc98ffd6305d57e18e621e19f565b3aaffc0bf8df70411b02081a4d34e553da335e31052fe0242689a438304ed386f48b32030425ddd882c559326cd3ffa74ca880279c53a1f0ec7eda9409e428f2b82ab0e1b4b2cdae2180a3a7241db6adc399fc51644c41913059d8d5fbb6eddf873dc1fbdfcfafea532e63e5b24f3aa4a3ef4ddee167fbda87ed15a7446778c19e7ecaf41336880e394ffbc5867bf4654f0a565c7d38325d1b0e8fdb002baaf6a7905661cdc5a8d778e7b7de55ffb8812e1e17cae2b7b1434846953755b4c7602c1ba9fed8fc7fdfd0d6eb0c9070f886513c358fe79e58aba0c69e21c80b0c4e2", 0xf0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000240)="f5e2fc331aab74351ae4e372b4f783681ad9f644510e042895ca42c33595bf9eacb14b418781a4e80e60e3") 00:23:55 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4001) 00:23:55 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 00:23:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x540f, 0x0) 00:23:55 executing program 1: syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12011001000000402505a8a44000010203010902240001017f80030904e8ff020701030609050102200000810609058202"], 0x0) 00:23:56 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5452, &(0x7f0000000000)) 00:23:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f0000000080)) 00:23:56 executing program 0: clock_gettime(0x2689f816fff3f783, 0x0) [ 1436.442367][ T94] usb 2-1: new high-speed USB device number 69 using dummy_hcd [ 1436.801655][ T94] usb 2-1: config 1 has an invalid interface number: 232 but max is 0 [ 1436.802025][ T94] usb 2-1: config 1 has no interface number 0 [ 1436.802234][ T94] usb 2-1: config 1 interface 232 altsetting 255 bulk endpoint 0x1 has invalid maxpacket 32 [ 1436.802453][ T94] usb 2-1: config 1 interface 232 altsetting 255 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1436.802663][ T94] usb 2-1: config 1 interface 232 altsetting 255 bulk endpoint 0x82 has invalid maxpacket 0 [ 1436.802892][ T94] usb 2-1: config 1 interface 232 has no altsetting 0 [ 1436.961497][ T94] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1436.962812][ T94] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1436.963987][ T94] usb 2-1: Product: syz [ 1436.964625][ T94] usb 2-1: Manufacturer: syz [ 1436.965643][ T94] usb 2-1: SerialNumber: syz [ 1437.012778][T16934] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1437.327271][ T94] usblp 2-1:1.232: usblp0: USB Bidirectional printer dev 69 if 232 alt 255 proto 3 vid 0x0525 pid 0xA4A8 [ 1437.337631][ T94] usb 2-1: USB disconnect, device number 69 [ 1437.347800][ T94] usblp0: removed 00:23:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x5}, {}]}) 00:23:58 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x2, &(0x7f0000000000)) 00:23:58 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x541d, 0x0) 00:23:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4020940d, 0x0) 00:23:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x2, 0x0) 00:23:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003bc0)={&(0x7f0000000080)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x8, 0x9, 0x0, 0x1, [{0x4}]}]}]}]}, 0x5c}}, 0x0) 00:23:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00'}) 00:23:59 executing program 0: syz_clone3(&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff], 0x1}, 0x58) sched_rr_get_interval(0x0, &(0x7f0000000240)) 00:23:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0xd0e, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) 00:23:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x560a, &(0x7f0000000000)) 00:23:59 executing program 1: capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000180)) 00:23:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x540c, 0x0) 00:23:59 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x240082, 0x0) syz_clone3(&(0x7f0000000280)={0x800100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x0], 0x1}, 0x58) 00:23:59 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) 00:24:00 executing program 0: syz_clone3(&(0x7f0000000500)={0x1040400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:24:00 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x2}, 0x0, 0x0, 0x0) 00:24:00 executing program 0: syz_clone(0x118b000, 0x0, 0xfffffc9f, 0x0, 0x0, 0x0) 00:24:00 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x7f, 0x7fdf, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000007c0)={r0, &(0x7f0000000740)="81", 0x0}, 0x20) 00:24:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5452, 0x0) 00:24:00 executing program 1: socket$inet_udplite(0x2, 0xa, 0x88) 00:24:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f0000000e00)=ANY=[], 0x1b8}}, 0x0) 00:24:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b69, 0x0) 00:24:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b4c, &(0x7f0000000000)) 00:24:00 executing program 1: r0 = getpgrp(0xffffffffffffffff) sched_setparam(r0, &(0x7f0000000000)=0x3ff) 00:24:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000900)) 00:24:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b45, 0x0) 00:24:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x540d, 0x0) 00:24:01 executing program 1: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x81) 00:24:01 executing program 0: socket$inet_udplite(0x6, 0x2, 0x88) 00:24:01 executing program 1: syz_clone3(&(0x7f0000000180)={0x2000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x0], 0x1}, 0x58) [ 1441.364509][ T29] audit: type=1400 audit(1441.301:390): avc: denied { create } for pid=17012 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 00:24:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5607, 0x0) 00:24:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5414, 0x0) 00:24:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5608, 0x0) 00:24:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b32, &(0x7f0000000000)) 00:24:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', 0x0}) 00:24:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r0) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x0, 0x6, [{{0x9, 0x4, 0x0, 0x95, 0x1, 0x7, 0x1, 0x3, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x10, 0x7f, 0x1, 0xdf}}, [{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x1, 0xff}}]}}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x200, 0xfd, 0x7f, 0x80, 0x8}, 0x5, &(0x7f0000000100)={0x5, 0xf, 0x5}, 0x6, [{0xc, &(0x7f0000000140)=@string={0xc, 0x3, "73a4b85bc8586abe3d5f"}}, {0x57, &(0x7f0000000180)=@string={0x57, 0x3, "f572a58c1262fd511526bcbd6e8f31ed52c9a245b38a657bbcfa504a5e879defa23bd4f7c352fd911de0e51c9e4f07e7ffe849053aee38ed3af5dfaed3f6f527fa64f8c47a9b809cd3f77a1fa82d6fae18dfa42c12"}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x44f}}, {0x4e, &(0x7f0000000240)=@string={0x4e, 0x3, "d2d7351b70c36acd63ea56227c5079f801ada2771d948af2bb1b6db52e3f6a3372face3731a06eafac27d8a6e7dae5d336f6bd17e6d2914df5bde7f316e52fb28eafb455fb071dac0753ff92"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4}}, {0xe3, &(0x7f0000000300)=ANY=[@ANYBLOB="e303cf906aa6694bbdb190843adb6ae8fb47d66717336434836e5641390c708fbd150f32811ab1d8546eabef5ff6b957130ca441ebb3bd599ad0033f8b64e4f82d7d06aae0ccf9914a5e4ce3141e34de6311ceb5b0baabbcc9a25413eb56a95e57b09e9890ae23e563e455881d3417125b65657ecbe5d8115e5d374b3a7c5d1c4cf835c13edc779b8c69d608b9ecc8a58a5f10b8430b7533348cb4a371f8d013ef1e9d47ff477e9021a84e"]}]}) 00:24:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5460, 0x0) 00:24:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5602, &(0x7f0000000000)) 00:24:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b3a, 0x0) [ 1442.661899][ T94] usb 1-1: new high-speed USB device number 67 using dummy_hcd [ 1442.901608][ T94] usb 1-1: Using ep0 maxpacket: 16 [ 1443.102023][ T94] usb 1-1: config 1 interface 0 altsetting 149 bulk endpoint 0x1 has invalid maxpacket 16 [ 1443.102492][ T94] usb 1-1: config 1 interface 0 altsetting 149 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 1443.102825][ T94] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1443.261497][ T94] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1443.261732][ T94] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1443.261858][ T94] usb 1-1: Product: я [ 1443.261936][ T94] usb 1-1: Manufacturer: 狵貥戒函☕붼轮쥒䖢誳筥謁䩐蝞㮢勃釽᳥侞Չ껟⟵擺쓸魺鲀ὺⶨ깯Ⲥ [ 1443.262166][ T94] usb 1-1: SerialNumber: ퟒᬵ썰쵪≖偼괁瞢鐝ᮻ땭㼮㍪全㟎ꀱ꽮➬ꛘ폥ួ틦䶑뷵눯꾎喴߻객匇鋿 [ 1443.283988][T17028] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1443.284440][T17028] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1443.574892][ T94] usb 1-1: USB disconnect, device number 67 00:24:05 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000400), 0x0, 0x8) clock_gettime(0x0, &(0x7f0000000280)) 00:24:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b49, &(0x7f0000000000)) 00:24:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b44, &(0x7f0000000000)) 00:24:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000700)={0x2, &(0x7f0000000680)=[{}, {0x8}]}) 00:24:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5451, 0x0) 00:24:05 executing program 1: mount$binderfs(&(0x7f0000000000), &(0x7f0000000040)='./binderfs\x00', 0x0, 0x2200024, &(0x7f00000000c0)={[{}]}) 00:24:05 executing program 0: syz_clone3(&(0x7f00000002c0)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000180), {}, &(0x7f00000000c0)=""/144, 0xfffffffffffffdaa, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) [ 1445.815261][ T29] audit: type=1400 audit(1445.761:391): avc: denied { remount } for pid=17059 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 00:24:05 executing program 1: mount$binderfs(&(0x7f0000000000), &(0x7f0000000040)='./binderfs\x00', 0x0, 0x2200024, &(0x7f00000000c0)={[{}]}) 00:24:05 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b3b, &(0x7f0000000000)) 00:24:06 executing program 1: mount$binderfs(&(0x7f0000000000), &(0x7f0000000040)='./binderfs\x00', 0x0, 0x2200024, &(0x7f00000000c0)={[{}]}) 00:24:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x0, 0x3ff}) 00:24:06 executing program 1: mount$binderfs(&(0x7f0000000000), &(0x7f0000000040)='./binderfs\x00', 0x0, 0x2200024, &(0x7f00000000c0)={[{}]}) 00:24:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 00:24:06 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000000c0)={0x2}) 00:24:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5427, 0x0) 00:24:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x0, 0x0, 0x8001, 0x0, 0x1}, 0x48) 00:24:06 executing program 0: syz_clone3(&(0x7f0000000380)={0x100000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:24:06 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5601, &(0x7f0000000000)) 00:24:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b36, 0x0) 00:24:07 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0xc0189436, &(0x7f0000000000)) 00:24:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5603, &(0x7f0000000000)) 00:24:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x540b, 0x0) 00:24:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x40087602, 0x0) 00:24:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="6772657461706b107d86000000000000", @ANYRESHEX, @ANYBLOB='x\x00\x00\a\x00\x00\x00\b']}) 00:24:07 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x2}, &(0x7f0000000180)={0x9}, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={[0x5]}, 0x8}) 00:24:07 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop0', 0x14b281, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000001c0)={0x0, 0x0, "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", "a35d34c27dbe99d90f910d84072010be1fa802ede5313b141869cfa04da0bf8d8872d97212764055f468a0e144a726713a341c6d199779fd61583008d1e4ed962e30fdff0dd8ad32d2715addf3a2c1539c88c201a85964ffefb693f71f1872d7755e7363d32b846ee9c8ca224e77db931d10382ac6aecb6740bc78c76b6f48e4f8609d974042c7369efed44c2ea8d049549f0ed3bd6fcd72dda18345a0211f939d867e616ac7c8d73e56d06a626d583eb375fdfa2bc67f41ae157210f7647218a63b1180cdbc526ce479989c35d0e030ff2a958f3de9e7798fb3a3590dbf9b59c8ae7277f9fb9436e2bb72e21cc3d3b3bb35d96665e6df4d2002d2ef35da1246cb0f112013f2debc07e59134341bcef3029c75f3d3ddee067a5b5371c8873120b25a8899e97c0c9ee4f9f8b1cc30200f29f0254a66426431c26d1825dc1f33cc280d0abd409bbd135a0280709ac92b088b8dd8bee875d8c7ec38a8152d549f674639fdcb994341d826eed11f77a38f20ce0d593aac8d85e2e82af8baa612379acd56330374847383cf408f029cb8f31f27c2e68447b14b7e7161b9a9659efd60eb655049f96e22470b63e2cca13188eb25ac0cee7dfe24edf6cade15da10e8dfb587fc3e13e4aa58231fb0adceead71806fbb1d33ce63b6dff10b3ecb48e7f3dedc69a5deaa3ea8ebf407eb7274e8f4fd1affcdf29e0ab9e28f920df4849079c3fb12ff347f9fa3567dcf44aa30e44c039a7ca96e31bc9512f45dbd6aecc1ffbc56276099c7d3cb3969edeeba967177c8d7b24ee3743939a3e34d90f0c338ffda41c525507fb9d0a83801d28c9ee300c72136a3966ac7517873317d019eba1cf66c050567c814fe859fabdb0353d13bf104926e3fcd4575a41f58e1ebf36311793a7806cb1ede3794a880b3d62cd8471cfe9c34c9bee81d4dcff4960e7894f224f25c1f45cf5e41eefcc3fac4c26f199e8ad67f9a25d6e11fe9e5a01e51409fe4a980fdf1a016d0eb5c0ec2d8db5a306efeeb1c3ecde4bea149be71b1d17ced079a492f115041dd96bd45de29484d7d4dcfc9958cdb815c82f43851ed847e12cd64f1167a6f1b8eaf5f964824ca188bb113dab5ab9c63ba94adaececae1627ebfb4a2898523588aecbc7e210a68efd1f255bf2b4f383f6cb6739f7ecaa44c1e02bfff31eeacb797656b117f6d2e0e74a337d82b83ce649be0d566f5303dc35fc1b83337e2c44697cfc18674cece8dfa36bdbb323346b88c943ac6b8538675ec61998e2106009723b533aa65b4ee0465a08b9f2e6ae151ea5e763ade75d969aac7ed9a704e85801dcd75c70e4291292dbb028e3a96a35bcd05698e16c01eb8e38d2e678003de4369400cfbed1a57435d70ca3d3bc6c9fe45538ae7b933fc450705c23f226475f621a2ba49e84d31036f6925f29daa361828f3b257ec28192e4c2392d4592c7efff212b120f2650613306d8e23e8e66cbdeaeb4d30f3e9335803e420e7bbf3f631f5ec8fb88bbd6862e2ee6ad1d657e8da287bf7eb3969f26cbeae5c0b8dc58dd12b60be5f01f3a3994929028de1cff956aa2707690603fda7c27fc6270cab2361bb19a02a01362489c6ea3e5191699f69698c2d8ef16190ce3a405e2e550a1701e1e67229814ec50e4eb413e861953f4a4b1702d49b38fdeddea775b0ff9e14b20a126058b77d68da20cbfe9130db15d70890fef2c8ad0cbe2f89b007f602bb91d16ca144917aa15aa9e81f9ca75d5953e78898fee7e08d68bc97f8c1084a94f192ede44ebdd60c4351f5a1f708d14c9343e1a7504850e2333861c545386cf877f725b7ad2cae9722bcd70a126e8f03501fec08514f53a59607d9fe7c15890d3d9936fa0009cf4363b702cf4d1679d8a4e34f9b016a5d2a556a8d3799f33699c670e5c1d61481b77faa8e77f1886946da642f99103c9671c656ae2a18f840eb77f5f9bd4f9dd02c8958e64a8bc2a91eddf668c87ee4f298a3398b9cb7e6b4b21a46160a4e996a4162b0900f796d8d3973c85575f0e4259ad300fea345c70e5cd6afa6288231c9477291068fa134bdf2a092df796598f540c89bd8ff3673f521ad96ca1773b1972af6e4dd44f24b4cbb48261c23599817f09dbc436640a2a7f48d092b230ea3d5e4e3094827172be9ac8f501918b2c4873fa70b4f8022358e516a60c9a8a5a2e98a0fee3affffdbdbc8c58d60b3de7d4b678abfeb4e9a264cc27ca02cd7e56b96970306d2172a32ef875291241ea33406044a798941e1a19c7ffa57ad89734eab6089ce907fd534295eb2ca234dae0e2da003a34d52c12df75948fd15409b7532a9a233e4c2030f650ec653433ab128c128306d89ce067fb8eb04ca8621442c5d558b81a46d730fdf9eea964e0143a88bc700111c9b9d4efb6e54e476b487f497cee40c138c9515c06506fdb70f3e963f6119e2572d9c4c681fbdca42f98aabbd7f17b2da3a9090035e9b29b45918d54255654742fb99fc524ead3ea835a4a86d163f41d02bd7e5d1f24f941c0fce4791b3b39a7ef916a5409ba6a1c061d0303d51506309d0c10d4b5559fb6fbc7152af97a9999e32e602977d9a223eb545492e960162cf87e5e77f90ba05491bcfc5f8ff439b0fa31f74d7e11a307572dc79404966402b804ab2fe3fc3ebff0dc1d420de98fb83d5b8423c9155e871d06a4ca5506ceaad5fc14021577924f5668fef2ac8b17c2250e79c1c92980d5d5344707c34ef333cc6e470586dce4455878b9156a2c008c93e50a9a9960fd0581425c55ffb619e890e13f695d5c2748d86e11e665e2582263c84e5f1386b00baf69d0eb2c8c9f03ce2f0455b36162682b1de7d3450b8a34f821155522da4a13402e27326b505f546bc692725d616f2a49929da4340273df525e2e632b8a1e5bcae41879f0454ca2a203dc4a7f13e862b25fad580f5fd39623044c62ef8fc2402d36e087da68c76ee808e22cddf93b655884d5d49bc5244d9102a9debfca9e53847cf95baec089bb216cef91157412359383753b8e754a5d05dc5d91458908d94a4a0ab5e30bcd3eb83b1940b022ec69c504db5a42010582937760e12adf7a60cead226862ddf83935c93d7136f23cc2bf0974a84c6be68751e7870f052b57bcdd8d62701e0716088ae727a086c50332e06225375539ebee14a2c1b5fdec2e7c5290c23c818820a54394be9e4c79bbe3b6c2f6e36e32643ce3352b9205ff09c47c6ee3bd2cfe25d00b291e0e44cc3f2b277ab7e4a36c62280d40b54957aba8da73c9db1a9274c3aba8a3ba34b49a658f4eb3480f8a8f6bbf7c66c95e465bb818fa5c1b85498a8c763f2d05814ba22b07d2bb8b05de2edcf72887cd0716b0e3bfc0a30ba7378fe2270a0f60c802b80b5e5069f51597e768784c8cc1f94c8090195396864b5095a5e76915b113e6e43f04a1607504307da5b16c1865901a5345d7bd1996c4bb592efd01f2ef5aedcb330b1ccb0db15d9b8df26a2c17bc83dafa93ef879d793fb06e9e8cfd166a0c43eb4799fad07059adbf53640e0af1b5e44d2039842c7a3d23e3c0eb29a5d62c903c85e451836fc8994b46b4bc5687c8cd4e9017fecab932616530aa2b3bb16fea45623d36834dea2c8bb9b616c3b86f42d1c16d84d0b79bbc54f20a4ca912a57ff4814985b040fdeb972773f603cebb64a614f91f9e749b2a9339ee80bc7dbfa8c3e436e2306090d3be85975583275c96b56b36faedf6563d8348bdbafa2b6886db2d515d483fa9aa6e348538738b522114d54268e2e65ae38a0a7b29d7410d35e2437900ee95aa232cc9ecb578a0a3a9256c3b81e74f6cf7eb8eb94f45428a55b89e5b92ee3289e0a6bfffabd0ae248b1eb8871626bb72e657af5f5abe2c3095108d1665c32cee8a0d737aea8e5bf3141c3692a4b0b47c26eb778f7d4ebb13a14d122414de6e7c43a677384c0bd0b5a6f00a3306b9e64cc1d28110f12d8d7a048f0e998ca7162518e9b717323b40ddc6a623efa0a6a155003515a0ddb64a7d7274b12393bb26f086ab6995cb01a7ffd4fb46110bc131c91e90dabb3194504776475cd7ef030da7ff67766f1912c27cc96d4052199f5c5eb6a4caaeb664c7f39bc2dce6eede9063b8669188730352d711614ff62d78dab46d5617d8406d2726b8b063898b786d76c5a2067045871d9dc54ddd9f94853820379a6cf6f137c342ceb1f728c687c67e49ef131587565bf36d157841673a25c16c07b1ce6074d3672fe96e227d2bbda3da5ea43c21530badc0af64239db013c1937277882bfd753f3218bd9607a8e03121d75890f40e680e58780b2cbbd99ac8aa40a86927a6f89be9b20dd640b81682dab33dad27aeb06774977e963705e6c693b776b52e9c4783c90e3f1ec010004f14549923abcf6c2ecb92ad36500ef94ad44796923aa22e373b59e097957a8aca1565449611b95c1d96065f5ba1a9356f0d3011a2aacb81acc22baa77d6678989e96f5ae0726ed30ac55d3060b7a57a4db7ab71dd3285a9d1cb92abd4a66d75c54c95ca0edb0e288bcccda98328ff139709ff91862cc246c661a983bfd0f4160cdfbc32c17a18945af73ae8f115bdde030292acce10b2bfe2ce9a66d689a7e3d030a08ce941ebc7f47c052cd7046485a12de4dacd136261408f04286412335b37ed5d5e2d00cca01f649f543f7e5615d81daf91a8d53798bec6f6d49e1aed637a6e6940543ad5cb83b9a23a23fcfc2afdd98a13976c54de467801aee45963f470d40631604489905ca000a0e4ce748c273b8ce3177266e20d7cddb7c115be8a3cf04c7fe39e0a57d528468ce7517bc74b9d967536c49e3461aca4a0eb02b8ce4d58c44843ddeba94853e51b4a1e78bc89beff0f3897bcec467e7781c31cdd9600f820403ddfd9857dcd11a4b696d83793562750fca32b569fd329a4988635a713fe806eab98ee3f1033a1fc9c5e2c53ccb0a96be825420c301dd421d6d0a620976a931a1fd16289d0431e90934e645c51274878cd5768117fa5df8fb84f71db4b4433551f553000268d6ca3bcea4b5392d259535064c40e6fd05bc71ac744d55fc731c518ff312a06d33f383cd840afcf811f37a0c80e3dfa6d28c4b74eba9f055b7dc635ea78029ff5dc254b946d2588e34b8e5d5ebac8c3745e96a78cafa6aeff941cd825da753b868709729aaf87347d99b5a68a96a54187361ccd9f68fea2ffda449de47506a8f82b3ad8f1e97f6105cf7976e0256e73569303db5b1ec8d0dd5722bb0704ebb7d82badd1d115276b478fb37adf0e11c0d6ada9393120a24cf99bbd62b5ff48eca632844642bba4b443102319771a9b013bde19d303e8b53d3c0b8ade56f94cd18d4d34d87c4af3d842db714da57b335463eef23701c42aa8e6f15654db80f4de4c4e62b7b76309e44ad5b9"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES16], 0x208e24b) sendfile(r0, r1, 0x0, 0x100000002) 00:24:07 executing program 0: syz_clone3(&(0x7f0000000280)={0x800100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:24:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b63, 0x0) 00:24:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x0, 0x8001, 0x0, 0x1}, 0x48) 00:24:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x540b, &(0x7f0000000000)) 00:24:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b31, &(0x7f0000000000)) 00:24:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5423, 0x0) 00:24:10 executing program 1: syz_clone3(&(0x7f0000000580)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:24:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0xc0189436, &(0x7f0000000000)) 00:24:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4bfa, &(0x7f0000000000)) 00:24:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffb) 00:24:10 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b44, &(0x7f0000000000)) 00:24:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b67, &(0x7f0000000000)) 00:24:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x541e, 0x0) 00:24:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) 00:24:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000080)) 00:24:11 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={0x0, 0x0, 0x14}, 0x18) 00:24:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4020940d, &(0x7f0000000000)) 00:24:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {0x6, 0x0, 0x0, 0x2}]}) 00:24:11 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) 00:24:11 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) [ 1451.672551][ T29] audit: type=1326 audit(1451.611:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17140 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x509e0 code=0x0 00:24:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x80045432, 0x0) 00:24:12 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) 00:24:12 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) 00:24:12 executing program 0: mount$binderfs(0x0, &(0x7f0000000040)='./binderfs\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@stats}], [{@flag='silent'}]}) 00:24:12 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/consoles\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5421, &(0x7f0000000000)) [ 1453.182901][T17153] binder: Unknown parameter 'silent' 00:24:13 executing program 0: socket(0x1e, 0x0, 0x55) 00:24:13 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0xa) 00:24:13 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b30, 0x0) 00:24:13 executing program 1: mount$binderfs(0x0, &(0x7f0000000040)='./binderfs\x00', 0x0, 0x2200024, 0x0) 00:24:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0xfff9}) 00:24:14 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b41, 0x0) 00:24:14 executing program 0: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x5}, 0x0, &(0x7f00000001c0)={0x0, r0+60000000}, 0x0) 00:24:14 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b65, 0x0) 00:24:15 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b49, 0x0) 00:24:15 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x80086601, 0x0) 00:24:15 executing program 1: syz_clone(0x5008000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:24:16 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) 00:24:16 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) unlink(0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000980)={@ifindex, 0xffffffffffffffff, 0x0, 0x24, 0x0, @link_id}, 0x20) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000a00)='./file0\x00', 0x3) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000c00)={'team0\x00', 0x1}) 00:24:16 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop0', 0x14b281, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES16=r2], 0x208e24b) sendfile(r0, r1, 0x0, 0x100000002) 00:24:17 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b35, 0x0) 00:24:17 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5601, &(0x7f0000000000)) 00:24:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 00:24:19 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x1ff) 00:24:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000c00)={'team0\x00', 0x1}) 00:24:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000002140), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'bond_slave_1\x00'}) 00:24:20 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:24:20 executing program 1: syz_io_uring_setup(0x0, &(0x7f00000037c0)={0x0, 0x0, 0xd9f7d832eeb03205}, 0x0, 0x0) 00:24:20 executing program 0: r0 = syz_io_uring_setup(0x7293, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 00:24:20 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)={0x0, 0x989680}, 0x0) 00:24:20 executing program 1: r0 = syz_io_uring_setup(0x800, &(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_IOWQ_AFF(r0, 0x8, &(0x7f00000005c0), 0x0) 00:24:20 executing program 0: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) fsopen(&(0x7f0000000040)='ncpfs\x00', 0x0) 00:24:20 executing program 1: r0 = io_uring_setup(0x54e6, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000740)={&(0x7f0000003000)={[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}]}, 0x5}, 0x1) 00:24:20 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002100)={0x100006}, 0x20) 00:24:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x248, &(0x7f0000000180), 0xfd, 0x463, &(0x7f0000000dc0)="$eJzs3M1vG0UbAPBn10779jN5S/loKVAoiIqPpEkL9MABkJA4gIQEh3IMSVqVug1qgkSriAZUlQsSVOKOkLgg8Rdw4oSAExLXckeVKtQLhZPRxmvXcezUiR07xb+f5HrHXnueZ3fHOzvTTQAD62D2TxKxMyKuRcRwRKSNK2yrPN26uTD1982FqSTK5bf+TLKPxV83F6aqqyb5845KoZh9UXo5iZea1Dt34eKZyVJp5nxeHps/+/7Y3IWLz54+O3lq5tTMuYnjx48dHX/h+YnnupLn/7NY9380e2Dfa+9cfWPqxNV3f/4uqQu6Po/uGIqIhdo2afREdyvru111y0mxj4GwJlsjopgfrddiOAqXd9feG45XP+lrcMCGKpfL5YnWby+Wgf+wJPodAdAf1RN9dv1bffSo67Ep3Hi5cgGU5X0rf1TeKdbGQYYarm+76WBEnFj856vsERsyDgEAsNwPWf/nmWb9vzTuq1tvdz43NJLPpeyJiHsiYm9E3BuxtO79EfHAGus/2FBe2f9Jr68rsTZl/b8X87mt5f2/2izYSCEv7VrKfyg5ebo0cyTfJodjaGtWHm/67UnEYvb82+et6q/v/2WPrP5qXzCP43px6/LPTE/OT3aceO7GxxH7i83yT6J4O4vYFxH711nH6ae+PbD8lUJt6c75r6IL80zlryOerOz/xWjIvypZfX5y7H9RmjkyVj0qVvrl1ytvtqq/o/y7INv/25se/7X8R5L6+dq5FV+x5U51XPn905bXNOs9/rckby+r/MPJ+fnz4xFbktdXvl43wF0tV9fP8j98qHn73xO3t8SDEZEdxA9FxMMR8Uge+6MR8VhEHFol/59eefy99ee/sbL8p9e0/9e+UDjz4/et6m9v/x+rFpaCauf3r90AO9l2AAAAcLdII2JnJOlobTlNR0cr/4d/b2xPS7Nz80+fnP3g3HTlHoGRGEqrI13DdeOh4/nYcLU8kZcv5eWj+bjxl4VtS+XRqdnSdL+ThwG3o0X7z/xR6Hd0wIZzvxYMLu0fBtf6279fDrjb3aEVp72KA+g9Z3EYXM3a/6U+xAH0nvM/DK5a+/+ijZXrbvdqvHkTuPs4/8Pg0v5hIHVyX/+mWIhvIlZfJ9ksoa5p4bNOPl7sQYSRbo4N1cOFiUJEH8MotvtXLeJC+VLHlfb7lwkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA7/g0AAP//DKPkGg==") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000100)=""/47, 0x2f) getdents(r0, 0x0, 0x58) 00:24:21 executing program 0: r0 = io_uring_setup(0x120d, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f000000b040)={&(0x7f000000c000)={[{0x0}]}, 0x1}, 0x1) [ 1461.270666][T17225] loop1: detected capacity change from 0 to 512 [ 1461.319927][T17225] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2263: inode #17: comm syz-executor.1: corrupted in-inode xattr: overlapping e_value [ 1461.321471][T17225] EXT4-fs error (device loop1): ext4_orphan_get:1397: comm syz-executor.1: couldn't read orphan inode 17 (err -117) [ 1461.322227][T17225] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1461.328464][T17225] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2859: Unable to expand inode 12. Delete some EAs or run e2fsck. 00:24:21 executing program 0: r0 = io_uring_setup(0x120d, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f000000b040)={&(0x7f000000c000)={[{0x0}]}, 0x1}, 0x1) [ 1461.342164][ T25] 8<--- cut here ---