executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000003b75000000024518ac1e0001e0000001"]}) 08:05:10 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'security\x00', 0x0, [0x1, 0x2, 0x8, 0xf458, 0x40]}, &(0x7f0000000200)=0x54) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl0\x00', r1, 0x4, 0x80, 0x9, 0x1, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x80, 0x9, 0x2}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', r1, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000480)={'vxcan1\x00'}) 08:05:10 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 2: socket(0x11, 0xa, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 08:05:10 executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000003b75000000024518ac1e0001e0000001"]}) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 2: socket(0x11, 0xa, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 1: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 08:05:10 executing program 2: socket(0x11, 0xa, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000003b75000000024518ac1e0001e0000001"]}) 08:05:10 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'security\x00', 0x0, [0x1, 0x2, 0x8, 0xf458, 0x40]}, &(0x7f0000000200)=0x54) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl0\x00', r1, 0x4, 0x80, 0x9, 0x1, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x80, 0x9, 0x2}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', r1, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 1: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000003b75000000024518ac1e0001e0000001"]}) 08:05:10 executing program 2: socket(0x11, 0xa, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'security\x00', 0x0, [0x1, 0x2, 0x8, 0xf458, 0x40]}, &(0x7f0000000200)=0x54) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', r1, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 1: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 08:05:10 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'security\x00', 0x0, [0x1, 0x2, 0x8, 0xf458, 0x40]}, &(0x7f0000000200)=0x54) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000003b75000000024518ac1e0001e0000001"]}) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 0: socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 08:05:10 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 1: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000003b75000000024518ac1e0001e0000001"]}) 08:05:10 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 0: socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 1: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 0: socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 08:05:10 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 1: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:10 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) socket(0x11, 0xa, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:10 executing program 1: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:10 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 1: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:10 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 1: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:10 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:10 executing program 1: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:10 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:10 executing program 1: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:10 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:10 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0]}) 08:05:10 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 1: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x8000, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:10 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:10 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:10 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev}}, 0x1e) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00']}) 08:05:10 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:10 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:10 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000d00)=ANY=[]}) 08:05:10 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) socket(0x11, 0xa, 0x0) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:10 executing program 2: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:10 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:11 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) 08:05:11 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:11 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) 08:05:11 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:11 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x7, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:11 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:11 executing program 3: r0 = socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:11 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) bind$can_raw(0xffffffffffffffff, &(0x7f0000000100), 0x10) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:11 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 2: bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:11 executing program 3: r0 = socket(0x0, 0x2, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:11 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) bind$can_raw(0xffffffffffffffff, &(0x7f0000000100), 0x10) 08:05:11 executing program 2: bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x40, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:11 executing program 3: r0 = socket(0x0, 0x2, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:11 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) bind$can_raw(0xffffffffffffffff, &(0x7f0000000100), 0x10) 08:05:11 executing program 2: bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x1ff, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 3: r0 = socket(0x0, 0x2, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:11 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x29, 0x2, 0x0) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:11 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', 0x0}) 08:05:11 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = socket(0x29, 0x2, 0x0) bind$can_raw(r1, &(0x7f0000000100), 0x10) 08:05:11 executing program 3: r0 = socket(0x29, 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:11 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 0: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = socket(0x29, 0x2, 0x0) bind$can_raw(r1, &(0x7f0000000100), 0x10) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', 0x0}) 08:05:11 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x1e) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0xa4f4, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 3: r0 = socket(0x29, 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', 0x0}) 08:05:11 executing program 0: socket(0x11, 0xa, 0x0) r0 = socket(0x29, 0x2, 0x0) bind$can_raw(r0, &(0x7f0000000100), 0x10) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:11 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1b, 0x4, 0x1, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 3: r0 = socket(0x29, 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:11 executing program 0: r0 = socket(0x29, 0x2, 0x0) bind$can_raw(r0, &(0x7f0000000100), 0x10) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x7, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1b, 0x4, 0x0, 0x1, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:11 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 0: r0 = socket(0x0, 0x2, 0x0) bind$can_raw(r0, &(0x7f0000000100), 0x10) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev}}, 0x1e) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1b, 0x4, 0x0, 0x0, 0x6c, 0x66, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x80, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: socket(0x29, 0x2, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:11 executing program 2: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) bind$can_raw(0xffffffffffffffff, &(0x7f0000000100), 0x10) 08:05:11 executing program 0: r0 = socket(0x0, 0x2, 0x0) bind$can_raw(r0, &(0x7f0000000100), 0x10) 08:05:11 executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x2e, 0x4, 0x2, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1b, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x5, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x2e, 0x4, 0x0, 0xb, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:11 executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1b, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x40, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 0: r0 = socket(0x0, 0x2, 0x0) bind$can_raw(r0, &(0x7f0000000100), 0x10) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x2e, 0x4, 0x0, 0x0, 0xb8, 0x64, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1b, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:05:11 executing program 0: r0 = socket(0x29, 0x0, 0x0) bind$can_raw(r0, &(0x7f0000000100), 0x10) 08:05:11 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:11 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x2e, 0x4, 0x0, 0x0, 0xb8, 0x0, 0x0, 0xc0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:11 executing program 3: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:11 executing program 2: bind$pptp(0xffffffffffffffff, 0x0, 0x0) 08:05:11 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1b, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:11 executing program 0: r0 = socket(0x29, 0x0, 0x0) bind$can_raw(r0, &(0x7f0000000100), 0x10) 08:05:12 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x2e, 0x4, 0x0, 0x0, 0xb8, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1b, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}, @ssrr={0x89, 0x2b, 0x4c, [@local, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x19}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}]}}}}}) 08:05:12 executing program 2: bind$pptp(0xffffffffffffffff, 0x0, 0x0) 08:05:12 executing program 3: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 0: r0 = socket(0x29, 0x0, 0x0) bind$can_raw(r0, &(0x7f0000000100), 0x10) 08:05:12 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', 0x0}) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x10, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}, @lsrr={0x83, 0x17, 0x33, [@rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}, @private=0xa010100, @local]}]}}}}}) 08:05:12 executing program 3: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev, {[@ssrr={0x89, 0x13, 0xdb, [@loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}]}}}}}) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x2e, 0x4, 0x0, 0x0, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:12 executing program 2: bind$pptp(0xffffffffffffffff, 0x0, 0x0) 08:05:12 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 0: socket(0x29, 0x2, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000100), 0x10) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x2e, 0x4, 0x0, 0x0, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}, @timestamp_addr={0x44, 0x3c, 0xe2, 0x1, 0x7, [{@broadcast, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1}, {@local, 0xdef}, {@loopback, 0x10000}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@remote, 0x5}]}]}}}}}) 08:05:12 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, 0x0, 0x0) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev}}}}) 08:05:12 executing program 0: socket(0x29, 0x2, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000100), 0x10) 08:05:12 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1f, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xf9, [@local, @loopback]}]}}}}}) 08:05:12 executing program 0: socket(0x29, 0x2, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000100), 0x10) 08:05:12 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, 0x0, 0x0) 08:05:12 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1d, 0x4, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @lsrr={0x83, 0x27, 0x28, [@multicast1, @multicast2, @rand_addr=0x64010101, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @rand_addr=0x64010101]}]}}}}}) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 0: r0 = socket(0x29, 0x2, 0x0) bind$can_raw(r0, 0x0, 0x0) 08:05:12 executing program 2: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, 0x0, 0x0) 08:05:12 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x13, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}, @rr={0x7, 0xf, 0xf7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}]}}}}}) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 0: socketpair(0x1, 0x1, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x2a4, {{0xa, 0x4e24, 0x0, @mcast1}}}, 0x88) r1 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="73797a746ea3da6bf6cbfe9aad310000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffac1414bb"]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x2, &(0x7f00000001c0)=@raw=[@exit, @call={0x85, 0x0, 0x0, 0xd}], &(0x7f0000000200)='syzkaller\x00', 0x81, 0xc2, &(0x7f0000000240)=""/194, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xa, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[0x1, 0x1, 0x1, 0x1]}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2200, 0x0) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000080)=0x7, 0x4) 08:05:12 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xf, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @lsrr={0x83, 0x13, 0xbc, [@multicast1, @empty, @remote, @remote]}]}}}}}) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}, @noop, @ssrr={0x89, 0xf, 0xd2, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}]}}}}}) 08:05:12 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 0: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}, @noop]}}}}}) 08:05:12 executing program 2: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) bind$can_raw(r2, &(0x7f0000000100), 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x3fa, 0x400, 0x70bd2a, 0x25dfdbfc, {0x1, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}]}}}}}) 08:05:12 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r7, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r8, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xe, &(0x7f0000000080)=@raw=[@generic={0x40, 0x2, 0x8, 0xd2, 0x1e}, @ldst={0x1, 0x1, 0x6, 0xa, 0x5, 0x80, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x1, 0x3, 0x9, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xff}], &(0x7f0000000100)='GPL\x00', 0xfffffffd, 0xce, &(0x7f0000000140)=""/206, 0x40f00, 0xf, '\x00', r1, 0x25, r4, 0x8, &(0x7f0000000240)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x0, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r5, r6, r7, r8, r9]}, 0x80) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, './file0'}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4c0d4) 08:05:12 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 08:05:12 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r7, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r8, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xe, &(0x7f0000000080)=@raw=[@generic={0x40, 0x2, 0x8, 0xd2, 0x1e}, @ldst={0x1, 0x1, 0x6, 0xa, 0x5, 0x80, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x1, 0x3, 0x9, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xff}], &(0x7f0000000100)='GPL\x00', 0xfffffffd, 0xce, &(0x7f0000000140)=""/206, 0x40f00, 0xf, '\x00', r1, 0x25, r4, 0x8, &(0x7f0000000240)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x0, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r5, r6, r7, r8, r9]}, 0x80) 08:05:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:12 executing program 1: socket(0x11, 0xa, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="73797a746e7193000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) 08:05:12 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:12 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r7, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r8, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xe, &(0x7f0000000080)=@raw=[@generic={0x40, 0x2, 0x8, 0xd2, 0x1e}, @ldst={0x1, 0x1, 0x6, 0xa, 0x5, 0x80, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x1, 0x3, 0x9, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xff}], &(0x7f0000000100)='GPL\x00', 0xfffffffd, 0xce, &(0x7f0000000140)=""/206, 0x40f00, 0xf, '\x00', r1, 0x25, r4, 0x8, &(0x7f0000000240)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x0, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r5, r6, r7, r8, r9]}, 0x80) 08:05:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:12 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="73797a746e7193000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:12 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r7, 0x0, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:12 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) socket(0x11, 0xa, 0x0) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="73797a746e7193000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:12 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) 08:05:12 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:12 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r7, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:12 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r7, 0x0, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:12 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) 08:05:12 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 08:05:12 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:13 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) 08:05:13 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) 08:05:13 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:13 executing program 5: socket(0x11, 0xa, 0x0) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) 08:05:13 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 5: socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:13 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) 08:05:13 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 5: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x6, 0x1000, 0x0, 0xffffffffffffffff, 0x3, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x5}, 0x48) 08:05:13 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x100, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 08:05:13 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/116, 0x74, 0x1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 3: socket(0x11, 0xa, 0x0) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:13 executing program 5: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 0: socket(0x11, 0xa, 0x0) socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 4: socket(0x11, 0xa, 0x0) r0 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:13 executing program 3: socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 0: socketpair(0x2, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 5: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 4: r0 = socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 3: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:13 executing program 0: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:13 executing program 5: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 4: r0 = socket(0x0, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:13 executing program 3: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:13 executing program 4: r0 = socket(0x0, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f00000000c0)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x94d, {{0xa, 0x4e22, 0x2, @private0, 0xfff}}}, 0x88) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:13 executing program 5: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 0: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 3: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:13 executing program 4: r0 = socket(0x0, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 3: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f00000000c0)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x94d, {{0xa, 0x4e22, 0x2, @private0, 0xfff}}}, 0x88) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:13 executing program 0: socketpair(0x0, 0xa, 0x5, &(0x7f0000000100)) 08:05:13 executing program 5: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 4: r0 = socket(0x29, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f00000000c0)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x94d, {{0xa, 0x4e22, 0x2, @private0, 0xfff}}}, 0x88) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:13 executing program 0: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 4: r0 = socket(0x29, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f00000000c0)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x94d, {{0xa, 0x4e22, 0x2, @private0, 0xfff}}}, 0x88) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:13 executing program 5: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:13 executing program 3: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 4: r0 = socket(0x29, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f00000000c0)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x94d, {{0xa, 0x4e22, 0x2, @private0, 0xfff}}}, 0x88) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:13 executing program 0: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 5: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:13 executing program 4: socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:13 executing program 3: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f00000000c0)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x94d, {{0xa, 0x4e22, 0x2, @private0, 0xfff}}}, 0x88) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:13 executing program 4: socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:13 executing program 5: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:13 executing program 0: socketpair(0x2, 0x0, 0x5, &(0x7f0000000100)) 08:05:13 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f00000000c0)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:13 executing program 4: socket(0x29, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) 08:05:13 executing program 5: socketpair(0x2, 0xa, 0x5, 0x0) 08:05:14 executing program 2: socket(0x11, 0xa, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:14 executing program 3: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 4: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:14 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:14 executing program 4: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 3: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 5: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:14 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 4: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 3: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 5: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:14 executing program 4: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 3: socketpair(0x2, 0xa, 0x5, 0x0) 08:05:14 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 0: socketpair(0x2, 0xa, 0x5, 0x0) 08:05:14 executing program 5: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 4: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 1: socket(0x11, 0xa, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 5: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, &(0x7f0000000040)) 08:05:14 executing program 4: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 08:05:14 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 08:05:14 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:14 executing program 5: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 08:05:14 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:14 executing program 5: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 0: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 2: r0 = socket(0x29, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:05:14 executing program 5: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:14 executing program 0: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:14 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:14 executing program 0: socketpair(0x0, 0xa, 0x0, &(0x7f0000000100)) 08:05:14 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:14 executing program 5: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:14 executing program 4: socketpair(0x2, 0xa, 0x0, 0x0) 08:05:14 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 5: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f00000001c0)={{0x3, @bcast}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 0: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:14 executing program 4: socketpair(0x2, 0xa, 0x0, 0x0) 08:05:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:14 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:14 executing program 5: socketpair(0x2, 0xa, 0x0, 0x0) 08:05:14 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:14 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:14 executing program 2: connect$netrom(0xffffffffffffffff, 0x0, 0x0) 08:05:14 executing program 0: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:14 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000088656a5117d6c7000000e25653f636d4bb17863ec0f804b7adf29786b06ed6df3d20db45544707e17a175bd42b5e3d1774a9996ad95b6f93350436", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000002000ff4d7d3d666de40e33f638b725e9425167f2eccc9a6fc97f74e613bce75e26b3a583dbf6fd603a7c4d72bac47edefaa445376ee177083c4294713abb40c284f9a01fd7e6274c066d0cdefd913fe8ace1892bed509a77e3b21d14d8f021d0a18879862b8f61b420f32ba8092d73e43790ae6bd0e8d65d979d6598a5432c2489f150f016a8573028c0d47bddc1104b303d4c47728312bd7f39e0282ae3c5cac96cd7dec9d5ee00000000000000"]}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:15 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 2: connect$netrom(0xffffffffffffffff, 0x0, 0x0) 08:05:15 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 3: socket(0x11, 0xa, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:15 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 2: connect$netrom(0xffffffffffffffff, 0x0, 0x0) 08:05:15 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$can_raw(0x1d, 0x3, 0x1) 08:05:15 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:15 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 0: socketpair(0x2, 0x0, 0x0, &(0x7f0000000100)) 08:05:15 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$can_raw(0x1d, 0x3, 0x1) 08:05:15 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) 08:05:15 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) r2 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:15 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$can_raw(0x1d, 0x3, 0x1) 08:05:15 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) r2 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) r2 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:15 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:15 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) 08:05:15 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 0: socketpair(0x2, 0xa, 0x0, 0x0) 08:05:15 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) r2 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:15 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) r2 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:15 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) 08:05:15 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:15 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) r2 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r2, 0xab03) 08:05:15 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:15 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:15 executing program 1: socket(0x11, 0xa, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:15 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:15 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:15 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f00000001c0)={{0x3, @bcast}, [@bcast, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r1, 0xab03) 08:05:15 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 08:05:15 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:15 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r1, 0xab03) 08:05:15 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:15 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) r1 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r1, 0xab03) 08:05:15 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:05:15 executing program 5: socket(0x11, 0xa, 0x0) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) socket(0x11, 0xa, 0x0) 08:05:15 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:15 executing program 5: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 4: socket(0x11, 0xa, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:15 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x98}]}, 0x54}, 0x1, 0x0, 0x0, 0x40090}, 0x0) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:15 executing program 2: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xe6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4c}]}, 0x34}, 0x1, 0x0, 0x0, 0x40880}, 0x10000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:15 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0x843) 08:05:15 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:15 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:15 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:15 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0x843) 08:05:16 executing program 4: r0 = syz_open_dev$ndb(0x0, 0x0, 0x843) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:16 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00\x00\a\x00'/16, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:16 executing program 0: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0x843) 08:05:16 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 3: socket(0x11, 0xa, 0x0) syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:16 executing program 4: r0 = syz_open_dev$ndb(0x0, 0x0, 0x843) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:16 executing program 0: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 5: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) 08:05:16 executing program 3: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) 08:05:16 executing program 4: r0 = syz_open_dev$ndb(0x0, 0x0, 0x843) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:16 executing program 2: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 5: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) 08:05:16 executing program 0: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x843) 08:05:16 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:16 executing program 2: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 5: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) 08:05:16 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x843) 08:05:16 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:16 executing program 2: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x843) 08:05:16 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:16 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 3: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) 08:05:16 executing program 5: socket(0x11, 0xa, 0x0) socketpair(0x15, 0x5, 0x1e, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@empty, @in=@local}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) 08:05:16 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 4: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:16 executing program 1: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 3: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) 08:05:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, 0x0, 0x1) 08:05:16 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)) 08:05:16 executing program 4: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, 0x0, 0x1) 08:05:16 executing program 1: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 5: socket(0x11, 0xa, 0x0) socketpair(0x15, 0x5, 0x1e, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@empty, @in=@local}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) 08:05:16 executing program 3: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x0) 08:05:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, 0x0) 08:05:16 executing program 4: syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0x843) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 08:05:16 executing program 5: socket(0x11, 0xa, 0x0) socketpair(0x15, 0x5, 0x1e, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@empty, @in=@local}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) 08:05:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, 0x0, 0x1) 08:05:16 executing program 1: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0), 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, 0x0) 08:05:16 executing program 5: socket(0x11, 0xa, 0x0) socketpair(0x15, 0x5, 0x1e, &(0x7f0000000000)) 08:05:16 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, 0x0) 08:05:16 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 4: r0 = socket(0x11, 0x2, 0x1000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) connect$netrom(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) 08:05:16 executing program 5: socketpair(0x15, 0x5, 0x1e, &(0x7f0000000000)) 08:05:16 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0), 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 5: socketpair(0x0, 0x5, 0x1e, &(0x7f0000000000)) 08:05:16 executing program 4: r0 = socket(0x11, 0x2, 0x1000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) connect$netrom(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) 08:05:16 executing program 2: socketpair(0x15, 0x5, 0x1e, &(0x7f0000000000)) 08:05:16 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) 08:05:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 2: socketpair(0x15, 0x5, 0x1e, &(0x7f0000000000)) 08:05:16 executing program 4: r0 = socket(0x11, 0x2, 0x1000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) connect$netrom(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) 08:05:16 executing program 5: socketpair(0x0, 0x5, 0x1e, &(0x7f0000000000)) 08:05:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:16 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), 0x0) 08:05:16 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) 08:05:16 executing program 2: socketpair(0x15, 0x5, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 4: r0 = socket(0x11, 0x2, 0x1000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, 0x0) 08:05:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x1) 08:05:17 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) 08:05:17 executing program 5: socketpair(0x0, 0x5, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 2: socketpair(0x0, 0x5, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 4: r0 = socket(0x11, 0x2, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x1) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) r2 = socket(0x11, 0xa, 0x3ff) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_FLUSH(r2, 0x0, 0xd4, &(0x7f0000000000)=0xc, 0x4) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0xc014}, 0x20008000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 5: socketpair(0x15, 0x0, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 08:05:17 executing program 2: socketpair(0x0, 0x5, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) r2 = socket(0x11, 0xa, 0x3ff) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_FLUSH(r2, 0x0, 0xd4, &(0x7f0000000000)=0xc, 0x4) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0xc014}, 0x20008000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 4: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:17 executing program 5: socketpair(0x15, 0x0, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 08:05:17 executing program 2: socketpair(0x0, 0x5, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 4: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) r2 = socket(0x11, 0xa, 0x3ff) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_FLUSH(r2, 0x0, 0xd4, &(0x7f0000000000)=0xc, 0x4) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0xc014}, 0x20008000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 4: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 5: socketpair(0x15, 0x0, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) r2 = socket(0x11, 0xa, 0x3ff) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_FLUSH(r2, 0x0, 0xd4, &(0x7f0000000000)=0xc, 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 2: socketpair(0x15, 0x0, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:17 executing program 4: r0 = socket(0x0, 0x2, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 5: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:17 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:17 executing program 2: socketpair(0x15, 0x0, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 4: r0 = socket(0x0, 0x2, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 3: socket(0x11, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:17 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:17 executing program 5: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) r2 = socket(0x11, 0xa, 0x3ff) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 2: socketpair(0x15, 0x0, 0x1e, &(0x7f0000000000)) 08:05:17 executing program 4: r0 = socket(0x0, 0x2, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:17 executing program 5: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:17 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) socket(0x11, 0xa, 0x3ff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 2: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:17 executing program 4: r0 = socket(0x11, 0x0, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 2: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:17 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:17 executing program 5: socketpair(0x15, 0x5, 0x1e, 0x0) 08:05:17 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 08:05:17 executing program 4: r0 = socket(0x11, 0x0, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) socket(0x9, 0x6, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 2: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:17 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:17 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 08:05:17 executing program 5: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) r2 = socket(0x11, 0xa, 0x3ff) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_FLUSH(r2, 0x0, 0xd4, &(0x7f0000000000)=0xc, 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 4: r0 = socket(0x11, 0x0, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 2: socketpair(0x15, 0x5, 0x1e, 0x0) 08:05:17 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:17 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:17 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) 08:05:17 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 1: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) 08:05:17 executing program 1: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:17 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:17 executing program 2: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:17 executing program 4: socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:17 executing program 0: r0 = socket(0x11, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:17 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) 08:05:17 executing program 1: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 2: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:18 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:18 executing program 4: socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 0: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 08:05:18 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}}}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 1: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 2: socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) 08:05:18 executing program 5: socket(0x11, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:18 executing program 4: socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 0: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 08:05:18 executing program 3: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0x9, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) r2 = socket(0x11, 0xa, 0x3ff) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_FLUSH(r2, 0x0, 0xd4, &(0x7f0000000000)=0xc, 0x4) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0xc014}, 0x20008000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 2: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 08:05:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:18 executing program 1: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x4000) 08:05:18 executing program 3: r0 = socket(0x16, 0xa, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0xf, &(0x7f0000000040)={@initdev, 0x0}, &(0x7f0000000080)=0x14) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x4, @loopback, 0xee}, 0x1c) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_PIM(r2, 0x0, 0xcf, &(0x7f0000000400)=0x4, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="5002000025200002c3bd7000fcdbdf2500000000271ef1bf626f1850b46998873e89a1ae2b", @ANYRES32=r1, @ANYBLOB="f3fff2ff020000000c00050008000d000900000006000500010000000a00010063686f6b6500000010010200080003000900000004010200d18bbb4146585450edc7c5be99b1616b6fdbbf318eaf2a91056bdb40d7af2af15ac4a0d1307e891d418d4b89dca5cd19398c4bd4c73d49b34b13d60dbd4ebf7b44a870c711e30c6f5e247a52af18317bbcffcf781849c5533f10ef99e85c4b0d1fb9df2e303292a7436f8e78aaad2ff50c01debe7b0c697a72a53470e10cc6e1ded09be3f7958ea661cb144314c38122e31f4d625a7e1260e46c9a0d65cdcd08a1f3153ec46c41518eed01bcc418400bfb2b48e6e00eb38a9213225466cf9ba55bdc4ce5beb78a431eb52dafb30a4e8004805160868ae2162b2644bc4d3227567f719e702f5990aa7df00ae19351104765c25315dbf612a9c2c8afa7416de6de0600050078000000f80008801c00010008033f0008000000020000002000400003000000040000000c00020001000400000102001c000100058104000600000053a3a8d401040000c30000000a0000001800020040005d830000680eff0f0200c80a09500500de0b1c000100003f9a000100000001000000f8ffffffff030000090000001600020002000000040000040100ff01000283b2000000001c00010006090104d60200000000000002000000070000000a0000001800020004000100a1020700008007002100ffffff7f00081c0001009905ff0f50000000020000000600000003000000080000001400020058ff03000000050001000400070035ba"], 0x250}, 0x1, 0x0, 0x0, 0x800}, 0x40054) 08:05:18 executing program 2: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 08:05:18 executing program 0: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x4000) 08:05:18 executing program 1: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:05:18 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x4000) 08:05:18 executing program 0: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 5: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 08:05:18 executing program 2: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 08:05:18 executing program 1: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x80, 0x29, 0x200, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x0, 0x2}, {0xfff7, 0x4}, {0x2, 0x10}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x80}}, @TCA_RATE={0x6, 0x5, {0xff, 0x8}}, @tclass_kind_options=@c_prio={0x9}, @TCA_RATE={0x6, 0x5, {0x40, 0xd6}}, @tclass_kind_options=@c_drr={{0x8}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x5}}}, @TCA_RATE={0x6, 0x5, {0x5}}, @tclass_kind_options=@c_prio={0x9}, @TCA_RATE={0x6, 0x5, {0x0, 0xff}}, @TCA_RATE={0x6, 0x5, {0x20}}]}, 0x80}}, 0x20048000) ioctl$SIOCGETSGCNT_IN6(r2, 0x89e1, &(0x7f0000000000)={@mcast1, @dev={0xfe, 0x80, '\x00', 0x43}}) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 5: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 08:05:18 executing program 0: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 2: socketpair(0x15, 0x0, 0x0, &(0x7f0000000000)) 08:05:18 executing program 3: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 1: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 0: r0 = socket(0x0, 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 5: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 08:05:18 executing program 2: socketpair(0x15, 0x0, 0x0, &(0x7f0000000000)) 08:05:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 1: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 0: r0 = socket(0x0, 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) 08:05:18 executing program 2: socketpair(0x15, 0x0, 0x0, &(0x7f0000000000)) 08:05:18 executing program 1: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 0: r0 = socket(0x0, 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) 08:05:18 executing program 2: socketpair(0x15, 0x5, 0x0, 0x0) 08:05:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 1: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) 08:05:18 executing program 0: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x10) 08:05:18 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 1: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:18 executing program 5: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x10) 08:05:18 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 0: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:18 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:18 executing program 5: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 08:05:18 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:18 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x10) 08:05:19 executing program 0: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:19 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:19 executing program 3: r0 = socket(0x0, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x4000) 08:05:19 executing program 2: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 08:05:19 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:19 executing program 5: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 08:05:19 executing program 3: r0 = socket(0x0, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 08:05:19 executing program 0: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:19 executing program 2: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 08:05:19 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 5: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:19 executing program 3: r0 = socket(0x0, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 0: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:19 executing program 2: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 08:05:19 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 3: r0 = socket(0x11, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 0: r0 = socket(0x0, 0xa, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 08:05:19 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:19 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x1ad8a137], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:19 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 3: r0 = socket(0x11, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 4: r0 = socket(0x11, 0xa, 0x0) r1 = socket(0xa, 0x2, 0x40) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x428, 0x3f4, 0x300, 0x70bd28, 0x25dfdbff, {0x2, 0x2, 0x10, [0x32cd, 0x4, 0x10a8, 0x2, 0x1ff, 0xffff, 0x0, 0x1, 0x7, 0x2, 0x1ff, 0x18f5, 0x85d1, 0x9, 0x8, 0x0, 0xfff, 0x788e, 0xfa, 0x0, 0x4, 0x3, 0x0, 0x4, 0x3, 0xbcc, 0x5, 0x800, 0x0, 0x8, 0x5f7a, 0x40, 0x10001, 0x5, 0x0, 0x602a5e81, 0xbd9, 0xff, 0x8, 0x5, 0x2, 0xd20f, 0x0, 0x339, 0x7, 0x20, 0x4, 0x4, 0x2, 0x55, 0x7f, 0x5437, 0x46e9, 0xcb69, 0xad5, 0x498, 0x100, 0x8, 0x1ff, 0x1, 0x7ff, 0x6, 0x80, 0x9], [0x101, 0x1, 0x9, 0xd110, 0x9, 0x1f, 0x9, 0x6, 0x8000, 0x0, 0x1, 0x9, 0x3, 0x7f, 0x382, 0xfffffffe, 0x76c, 0x2, 0x20, 0x2, 0xffff7cb8, 0x100, 0xc1e, 0x5, 0x6, 0x6, 0x40, 0x3, 0x4, 0x3, 0x4, 0x4, 0x100, 0x5, 0x88000000, 0x58, 0x8, 0x800, 0x9, 0x7, 0xfffffc01, 0x6, 0x0, 0x66a, 0x4, 0x4, 0x6262658, 0x10001, 0x6, 0x5, 0x8, 0x5, 0x3, 0x7, 0x7, 0x4be5, 0x80000001, 0xfff, 0x7f, 0x2, 0x6, 0x7fff, 0x4, 0x3], [0x7, 0x80000000, 0x9, 0x4, 0x3, 0xfffff801, 0x7, 0x9, 0xeb44, 0x4, 0x200, 0x5, 0xffffffff, 0x2eca, 0x0, 0xe262, 0xff, 0x5, 0xffffffff, 0x7, 0xffffffff, 0x6afe, 0x6, 0x0, 0x9, 0x8, 0x8, 0xafe, 0xdcf2, 0x34, 0x5, 0x8, 0x8001, 0x3, 0x200, 0x3ff, 0x493ea8b1, 0xffffffc1, 0xfffffffb, 0x9c83, 0x7fff, 0x0, 0x5, 0xf8, 0x0, 0x5, 0x3f, 0x6, 0x3, 0x210, 0x5, 0xffff, 0x0, 0x10000, 0x7, 0x2, 0x80000000, 0x80, 0x1000, 0x6, 0x4, 0xff, 0x7, 0x5], [0x12b, 0x401, 0xfffffc00, 0x7fff, 0x3, 0x9, 0x4, 0x3f, 0x0, 0x1, 0x20, 0xc5, 0x0, 0x6, 0x1, 0x2, 0x0, 0x2, 0x2, 0xfffffff8, 0x3, 0x5, 0x3f, 0x3, 0x0, 0x81, 0x6, 0x7, 0xffffffff, 0x1f, 0x1, 0xfffffffe, 0x81, 0xffff8001, 0x3ff, 0x5, 0x3800, 0x5, 0xfffffffa, 0x2, 0x4c6, 0x0, 0x470d, 0x7d, 0x1d8, 0x7ff, 0xffffffff, 0x7, 0x3, 0x1ff, 0x3, 0xffffffff, 0xdcf5, 0x1000, 0x40, 0x8000, 0x980, 0x8000, 0x40, 0xfffffffa, 0x1, 0x7f, 0x93, 0x7], 0x8, ['ip_vti0\x00']}, ["", "", "", "", "", "", ""]}, 0x428}, 0x1, 0x0, 0x0, 0x20000040}, 0x800) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="73797a746e6c31ff0000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:19 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x1ad8a137, 0x1ff, 0x3, 0x2, 0x9, 0x8, 0x1, 0x4, 0xd973, 0x9, 0xfff, 0x649d, 0x3, 0x9, 0x400, 0x7ff, 0x2], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:19 executing program 0: socket(0x0, 0xa, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 08:05:19 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}, @end]}}}}}) 08:05:19 executing program 3: r0 = socket(0x11, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x1ad8a137, 0x1ff, 0x3, 0x2, 0x9, 0x8, 0x1, 0x4, 0xd973, 0x9, 0xfff, 0x649d, 0x3, 0x9, 0x400, 0x7ff, 0x2, 0x4], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:19 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x13, 0x24, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}]}}}}}) 08:05:19 executing program 0: socket(0x0, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 08:05:19 executing program 4: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f00000001c0)=""/250, 0xfa, 0x40012020, &(0x7f00000002c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @bcast]}, 0x48) sendto$netrom(r0, &(0x7f0000000040)="1faedda596369243a05cf0e7aefa44c56fa364b057849add19a67d1d277c78caa772d276f11dca8d9d33557faf654da9a103", 0x32, 0x8000, &(0x7f0000000080)={{0x3, @null}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @null]}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={0xffffffffffffffff, r1}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:19 executing program 3: socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:19 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x1ad8a137, 0x1ff, 0x3, 0x2, 0x9, 0x8, 0x1, 0x4, 0xd973, 0x9, 0xfff, 0x649d, 0x3, 0x9, 0x400, 0x7ff, 0x2, 0x4, 0x7191, 0x7ff, 0xb2, 0xda3, 0x1ff], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:19 executing program 3: socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 4: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f00000001c0)=""/250, 0xfa, 0x40012020, &(0x7f00000002c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @bcast]}, 0x48) sendto$netrom(r0, &(0x7f0000000040)="1faedda596369243a05cf0e7aefa44c56fa364b057849add19a67d1d277c78caa772d276f11dca8d9d33557faf654da9a103", 0x32, 0x8000, &(0x7f0000000080)={{0x3, @null}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @null]}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={0xffffffffffffffff, r1}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:19 executing program 0: socket(0x0, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 08:05:19 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x1ad8a137, 0x1ff, 0x3, 0x2, 0x9, 0x8, 0x1, 0x4, 0xd973, 0x9, 0xfff, 0x649d, 0x3, 0x9, 0x400, 0x7ff, 0x2, 0x4, 0x7191, 0x7ff, 0xb2, 0xda3, 0x1ff, 0x7], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:19 executing program 3: socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:19 executing program 4: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f00000001c0)=""/250, 0xfa, 0x40012020, &(0x7f00000002c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @bcast]}, 0x48) sendto$netrom(r0, &(0x7f0000000040)="1faedda596369243a05cf0e7aefa44c56fa364b057849add19a67d1d277c78caa772d276f11dca8d9d33557faf654da9a103", 0x32, 0x8000, &(0x7f0000000080)={{0x3, @null}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @null]}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={0xffffffffffffffff, r1}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:19 executing program 2: r0 = socket(0x11, 0xa, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000180)=""/6, &(0x7f00000001c0)=0x6) ioctl$SNDRV_PCM_IOCTL_FORWARD(0xffffffffffffffff, 0x40084149, &(0x7f0000000100)=0xd9) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x27b8f16f3a4e6f63}, 0x800) 08:05:19 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:19 executing program 0: socket(0x0, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 08:05:19 executing program 4: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f00000001c0)=""/250, 0xfa, 0x40012020, &(0x7f00000002c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @bcast]}, 0x48) sendto$netrom(r0, &(0x7f0000000040)="1faedda596369243a05cf0e7aefa44c56fa364b057849add19a67d1d277c78caa772d276f11dca8d9d33557faf654da9a103", 0x32, 0x8000, &(0x7f0000000080)={{0x3, @null}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @null]}, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:19 executing program 1: socket(0x0, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 08:05:19 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x4000) 08:05:19 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x1ad8a137, 0x1ff, 0x3, 0x2, 0x9, 0x8, 0x1, 0x4, 0xd973, 0x9, 0xfff, 0x649d, 0x3, 0x9, 0x400, 0x7ff, 0x2, 0x4, 0x7191, 0x7ff, 0xb2, 0xda3, 0x1ff, 0x7, 0x63e5, 0xffffff83, 0x4, 0x9, 0x6, 0xd6, 0x5, 0x3d6], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:20 executing program 0: socket(0x0, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 08:05:20 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:20 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x1ad8a137, 0x1ff, 0x3, 0x2, 0x9, 0x8, 0x1, 0x4, 0xd973, 0x9, 0xfff, 0x649d, 0x3, 0x9, 0x400, 0x7ff, 0x2, 0x4, 0x7191, 0x7ff, 0xb2, 0xda3, 0x1ff, 0x7, 0x63e5, 0xffffff83, 0x4, 0x9, 0x6, 0xd6, 0x5, 0x3d6, 0x8], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:20 executing program 4: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f00000001c0)=""/250, 0xfa, 0x40012020, &(0x7f00000002c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @bcast]}, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='syztnl1\x00\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000002000004700009c000000007f009078ffffffffe00000014434c051ac1e0001000000000a010101000000dbac14144480000000ac1414bb000100fa000000ff00000002ac14142d00000001443447517f00000100000009b81e000100000000ffffffff000000097f00000100000008e0000002000100017f00000100000003860600000000440cf003000000000000000201070bb0b633cc8fef3661490000"]}) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x20, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x10}, {0x5, 0x6}, {0xfff3, 0x2}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x1) 08:05:20 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x4000) 08:05:20 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:20 executing program 0: socket(0x0, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='syztnl1\x00\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000002000004700009c000000007f009078ffffffffe00000014434c051ac1e0001000000000a010101000000dbac14144480000000ac1414bb000100fa000000ff00000002ac14142d00000001443447517f00000100000009b81e000100000000ffffffff000000097f00000100000008e0000002000100017f00000100000003860600000000440cf003000000000000000201070bb0b633cc8fef3661490000"]}) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x20, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x10}, {0x5, 0x6}, {0xfff3, 0x2}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x1) 08:05:20 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [0x1ad8a137, 0x1ff, 0x3, 0x2, 0x9, 0x8, 0x1, 0x4, 0xd973, 0x9, 0xfff, 0x649d, 0x3, 0x9, 0x400, 0x7ff, 0x2, 0x4, 0x7191, 0x7ff, 0xb2, 0xda3, 0x1ff, 0x7, 0x63e5, 0xffffff83, 0x4, 0x9, 0x6, 0xd6, 0x5, 0x3d6, 0x8, 0x0, 0x0, 0x5, 0x9, 0x5, 0x3b, 0x28a6, 0x358483bd, 0x7, 0x40000], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:20 executing program 4: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x4000) 08:05:20 executing program 1: r0 = socket(0x11, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x2, 0x70bd25, 0x25dfdbff, {0x1}, ["", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x20040000}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="000000000000009078ffffffff00000000000000000000000000000000000000da0500288044f7d7596d406802845efbf6aa6019f155cb330ce3ea8f4177227c20035a55dc996855cdd70688b0bbff81eec7e291f895ce0a0490a652f71967b572201de2fe4e0c3c78be4ddb85fd37987d4db81324ad2e52c29d825bee485a7d882424f56452b1a583da982f478d"]}) 08:05:20 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:20 executing program 4: r0 = socket(0x11, 0xa, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 0: socket(0x0, 0xa, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='syztnl1\x00\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000002000004700009c000000007f009078ffffffffe00000014434c051ac1e0001000000000a010101000000dbac14144480000000ac1414bb000100fa000000ff00000002ac14142d00000001443447517f00000100000009b81e000100000000ffffffff000000097f00000100000008e0000002000100017f00000100000003860600000000440cf003000000000000000201070bb0b633cc8fef3661490000"]}) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x20, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x10}, {0x5, 0x6}, {0xfff3, 0x2}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x1) 08:05:20 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) socketpair(0x3, 0x3, 0xb87, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$netrom(r1, &(0x7f0000000040)={{0x3, @bcast, 0x4}, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}, 0x48) 08:05:20 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:20 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:20 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='syztnl1\x00\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000002000004700009c000000007f009078ffffffffe00000014434c051ac1e0001000000000a010101000000dbac14144480000000ac1414bb000100fa000000ff00000002ac14142d00000001443447517f00000100000009b81e000100000000ffffffff000000097f00000100000008e0000002000100017f00000100000003860600000000440cf003000000000000000201070bb0b633cc8fef3661490000"]}) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x20, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x10}, {0x5, 0x6}, {0xfff3, 0x2}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040}, 0x1) 08:05:20 executing program 0: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$MRT_PIM(r1, 0x0, 0xcf, &(0x7f0000000040)=0x4, 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:20 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) socketpair(0x3, 0x3, 0xb87, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$netrom(r1, &(0x7f0000000040)={{0x3, @bcast, 0x4}, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}, 0x48) 08:05:20 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:20 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:20 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 0: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$MRT_PIM(r1, 0x0, 0xcf, &(0x7f0000000040)=0x4, 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:20 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) socketpair(0x3, 0x3, 0xb87, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$netrom(r1, &(0x7f0000000040)={{0x3, @bcast, 0x4}, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}, 0x48) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='syztnl1\x00\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000002000004700009c000000007f009078ffffffffe00000014434c051ac1e0001000000000a010101000000dbac14144480000000ac1414bb000100fa000000ff00000002ac14142d00000001443447517f00000100000009b81e000100000000ffffffff000000097f00000100000008e0000002000100017f00000100000003860600000000440cf003000000000000000201070bb0b633cc8fef3661490000"]}) 08:05:20 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:20 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:20 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 0: r0 = socket(0x11, 0xa, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$MRT_PIM(r1, 0x0, 0xcf, &(0x7f0000000040)=0x4, 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:20 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) socketpair(0x3, 0x3, 0xb87, &(0x7f0000000000)) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) socket(0x11, 0xa, 0x0) 08:05:20 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 08:05:20 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', 0x0}) 08:05:20 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 1: socket(0x11, 0xa, 0x0) socketpair(0x3, 0x3, 0xb87, &(0x7f0000000000)) 08:05:20 executing program 0: socket(0x11, 0xa, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000040)=0x4, 0x4) 08:05:20 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4000) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 08:05:20 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:20 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 1: socketpair(0x3, 0x3, 0xb87, &(0x7f0000000000)) 08:05:20 executing program 0: socket(0x11, 0xa, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:20 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:20 executing program 1: socketpair(0x0, 0x3, 0xb87, &(0x7f0000000000)) 08:05:20 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:20 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:20 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:20 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:20 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="73797a746e6c316262cd000000000000", @ANYRES32=0x0, @ANYBLOB="0011eeb5d58c77f7ff0000000000000000450000140000000000009078ffffff"]}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x888040a0}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_getvlan={0x30, 0x72, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x180}, 0x4004) 08:05:20 executing program 1: socketpair(0x0, 0x3, 0xb87, &(0x7f0000000000)) 08:05:20 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x1f) r4 = accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) accept4$inet6(r3, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:20 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:20 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x31}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:20 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:20 executing program 1: socketpair(0x0, 0x3, 0xb87, &(0x7f0000000000)) 08:05:20 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x1f) r4 = accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) accept4$inet6(r3, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:21 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:21 executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:21 executing program 1: socketpair(0x3, 0x0, 0xb87, &(0x7f0000000000)) 08:05:21 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x1f) r4 = accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) accept4$inet6(r3, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:21 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:21 executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:21 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x1f) r4 = accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) accept4$inet6(r3, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:21 executing program 1: socketpair(0x3, 0x0, 0x0, &(0x7f0000000000)) 08:05:21 executing program 4: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:21 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x1f) r4 = accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) accept4$inet6(r3, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:21 executing program 1: socketpair(0x3, 0x0, 0x0, &(0x7f0000000000)) 08:05:21 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_TABLE(r0, 0x0, 0xcf, &(0x7f0000000000)=0xff, 0x4) r1 = socket(0x11, 0xa, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 08:05:21 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:21 executing program 1: socketpair(0x3, 0x0, 0x0, &(0x7f0000000000)) 08:05:21 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x1f) r4 = accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) accept4$inet6(r3, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:21 executing program 2: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:21 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, 0x0, 0x4000) 08:05:21 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:21 executing program 2: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:21 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x1f) r4 = accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:21 executing program 4: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0, @ANYBLOB="000007000000000000000000450000140000000000009078ffffffffe0000001"]}) 08:05:21 executing program 0: r0 = socket(0x28, 0x6, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r1, 0x0, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) connect$pptp(r2, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0000000000000000000000008bb800140000000000009078ffffffffe0000001"]}) 08:05:21 executing program 2: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:21 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@setlink={0x3c, 0x13, 0x4, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x44480, 0x8}, [@IFLA_IFALIAS={0x14, 0x14, 'batadv_slave_0\x00'}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xca25}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4044}, 0x24000801) 08:05:21 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:21 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x1f) r3 = accept4$inet6(r2, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) accept4$inet6(r2, 0x0, &(0x7f00000000c0), 0x0) 08:05:21 executing program 0: r0 = socket(0x11, 0xa, 0x0) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @private}}, 0x1e) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x43c, 0x3f3, 0x4, 0x70bd26, 0x25dfdbfb, {0x2, 0x0, 0x29, [0x1ad8a137, 0x1ff, 0x3, 0x2, 0x9, 0x8, 0x1, 0x4, 0xd973, 0x9, 0xfff, 0x649d, 0x3, 0x9, 0x400, 0x7ff, 0x2, 0x4, 0x7191, 0x7ff, 0xb2, 0xda3, 0x1ff, 0x7, 0x63e5, 0xffffff83, 0x4, 0x9, 0x6, 0xd6, 0x5, 0x3d6, 0x8, 0x0, 0x0, 0x5, 0x9, 0x5, 0x3b, 0x28a6, 0x358483bd, 0x7, 0x40000, 0x1, 0x100, 0x0, 0x3f, 0x80, 0x1000, 0x1, 0xfffffff9, 0x400, 0x4, 0x5, 0x6, 0x5, 0x80000001, 0x401, 0x3fb6517d, 0x7, 0x0, 0xffffffe0, 0x6, 0x639b], [0x10001, 0x5, 0x2, 0x1, 0x7f, 0x8001, 0x101, 0x6, 0x5, 0x90, 0x10001, 0x0, 0x80000001, 0x6, 0x6, 0x4, 0x72, 0x9, 0x1, 0x6, 0x14, 0x5, 0x174, 0x3, 0x9, 0x2, 0xaa, 0x4, 0x90b2, 0xfffffffd, 0x8001, 0x5, 0x7, 0x8, 0x100, 0x80, 0x80000000, 0x7, 0xffffffdd, 0x4, 0x1000, 0x8001, 0x3f, 0x4, 0x1ff, 0x4, 0x7ff, 0x83c, 0xec, 0x80000000, 0x100, 0x1f, 0xff800000, 0x10001, 0x661, 0x0, 0x91d, 0x19f, 0x8000, 0x81, 0x3, 0x9, 0x5, 0x1], [0x101, 0x7e5, 0xffffffff, 0xffffff00, 0x6, 0x81, 0x336092d, 0x142a, 0x4, 0x1000, 0x2001, 0x10001, 0x4e5, 0x100, 0x8000, 0x9, 0x2, 0x2c17, 0x3, 0x2, 0x1, 0x8f1c, 0x100, 0x6, 0x475c, 0x881, 0x7ff, 0x10000, 0x6, 0x401, 0xf6, 0x6, 0x7ff, 0x101, 0x40, 0x1, 0x400, 0xdf35, 0x40, 0x1, 0x9, 0x3, 0xfff, 0x400, 0x0, 0xffffffff, 0x4, 0x7fffffff, 0x9c, 0x7ff, 0x2, 0x7b2, 0xffffffff, 0xfff, 0xfffffffd, 0x8000, 0x255, 0x8efb, 0x2, 0x0, 0xfffffff8, 0xfe, 0x3, 0x1], [0x4, 0x0, 0x5, 0x8, 0x8, 0x8, 0xa3, 0xbefc, 0x6, 0x5, 0xfff, 0x8, 0x7e, 0x101, 0x9, 0x101, 0x8001, 0x81, 0x3db, 0x6, 0x9, 0x8, 0xf2, 0x3, 0x5, 0x101, 0x101, 0x2, 0x4, 0x6, 0x7ff, 0x400, 0x8000, 0x80000001, 0x5, 0x12280, 0x0, 0x10001, 0xffff, 0x6, 0x3f, 0x80000000, 0x6, 0x81, 0x0, 0x5, 0x5, 0x48d, 0x131, 0x3f, 0xfffffffd, 0x401, 0x7, 0x1, 0xffffffff, 0x20, 0x800, 0xfffffff9, 0x8001, 0xfffffffc, 0x9ea9, 0x100, 0x1, 0x3e7b], 0x1b, ['\xc0\x98$+{]&.\x00', '\x00', ')*(,[+!!):!5(*\x00', '.\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 08:05:21 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:21 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:21 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x1f) accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:21 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (fail_nth: 1) 08:05:21 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 08:05:21 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:21 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 1) 08:05:21 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', 0x0}) 08:05:21 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, 0x0) [ 210.954886] FAULT_INJECTION: forcing a failure. [ 210.954886] name failslab, interval 1, probability 0, space 0, times 1 [ 211.008840] CPU: 1 PID: 10480 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 211.013855] FAULT_INJECTION: forcing a failure. [ 211.013855] name failslab, interval 1, probability 0, space 0, times 1 [ 211.016755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 211.016760] Call Trace: [ 211.016776] dump_stack+0x1b2/0x281 [ 211.016793] should_fail.cold+0x10a/0x149 [ 211.047730] should_failslab+0xd6/0x130 [ 211.051711] kmem_cache_alloc+0x28e/0x3c0 [ 211.055864] ? sock_destroy_inode+0x60/0x60 [ 211.060185] sock_alloc_inode+0x19/0x250 [ 211.064258] ? sock_destroy_inode+0x60/0x60 [ 211.068582] alloc_inode+0x5d/0x170 [ 211.072218] new_inode_pseudo+0x14/0xe0 [ 211.076206] sock_alloc+0x3c/0x270 [ 211.079753] __sock_create+0x8a/0x620 [ 211.083820] ? wait_for_completion_io+0x10/0x10 [ 211.088491] SyS_socketpair+0xdf/0x480 [ 211.092385] ? SyS_socket+0x1b0/0x1b0 [ 211.096189] ? SyS_read+0x210/0x210 [ 211.099811] ? __do_page_fault+0x159/0xad0 [ 211.104035] ? do_syscall_64+0x4c/0x640 [ 211.108018] ? SyS_socket+0x1b0/0x1b0 [ 211.111806] do_syscall_64+0x1d5/0x640 [ 211.115685] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 211.120875] RIP: 0033:0x7f8c2bf4e0f9 [ 211.124567] RSP: 002b:00007f8c2a4c0168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 211.132348] RAX: ffffffffffffffda RBX: 00007f8c2c06df80 RCX: 00007f8c2bf4e0f9 [ 211.139597] RDX: 0000000000000b87 RSI: 0000000000000000 RDI: 0000000000000003 [ 211.146937] RBP: 00007f8c2a4c01d0 R08: 0000000000000000 R09: 0000000000000000 08:05:21 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, 0x0) [ 211.154222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.161483] R13: 00007ffefa3cde2f R14: 00007f8c2a4c0300 R15: 0000000000022000 [ 211.168764] CPU: 0 PID: 10491 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 211.176745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 211.186100] Call Trace: [ 211.188695] dump_stack+0x1b2/0x281 [ 211.192332] should_fail.cold+0x10a/0x149 [ 211.195412] socket: no more sockets [ 211.197968] should_failslab+0xd6/0x130 [ 211.197983] kmem_cache_alloc+0x28e/0x3c0 [ 211.198002] getname_flags+0xc8/0x550 [ 211.198015] do_sys_open+0x1ce/0x410 [ 211.217315] ? filp_open+0x60/0x60 [ 211.220856] ? __do_page_fault+0x159/0xad0 [ 211.225092] ? do_syscall_64+0x4c/0x640 [ 211.229068] ? SyS_open+0x30/0x30 [ 211.232524] do_syscall_64+0x1d5/0x640 [ 211.236469] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 211.241670] RIP: 0033:0x7f6f526bf0f9 [ 211.245379] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 08:05:21 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x1f) r3 = accept4$inet6(r2, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 08:05:21 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 08:05:21 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (fail_nth: 2) 08:05:21 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', 0x0}) 08:05:21 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x1f) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:21 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 2) [ 211.253090] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 [ 211.260362] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 211.267634] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 [ 211.275003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.282275] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 08:05:22 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, 0x0) [ 211.387418] FAULT_INJECTION: forcing a failure. [ 211.387418] name failslab, interval 1, probability 0, space 0, times 0 [ 211.388119] FAULT_INJECTION: forcing a failure. [ 211.388119] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 211.403195] CPU: 1 PID: 10521 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 211.418301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 211.427634] Call Trace: [ 211.430212] dump_stack+0x1b2/0x281 [ 211.433826] should_fail.cold+0x10a/0x149 [ 211.437958] should_failslab+0xd6/0x130 [ 211.441914] kmem_cache_alloc_trace+0x29a/0x3d0 [ 211.446563] ? kmem_cache_alloc+0x35f/0x3c0 [ 211.450870] sock_alloc_inode+0x5f/0x250 [ 211.455007] ? sock_destroy_inode+0x60/0x60 [ 211.459309] alloc_inode+0x5d/0x170 [ 211.462919] new_inode_pseudo+0x14/0xe0 [ 211.466873] sock_alloc+0x3c/0x270 [ 211.470394] __sock_create+0x8a/0x620 [ 211.474266] ? wait_for_completion_io+0x10/0x10 [ 211.478918] SyS_socketpair+0xdf/0x480 [ 211.482792] ? SyS_socket+0x1b0/0x1b0 [ 211.486576] ? SyS_read+0x210/0x210 [ 211.490186] ? __do_page_fault+0x159/0xad0 [ 211.494415] ? do_syscall_64+0x4c/0x640 [ 211.498402] ? SyS_socket+0x1b0/0x1b0 [ 211.502192] do_syscall_64+0x1d5/0x640 [ 211.506088] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 211.511262] RIP: 0033:0x7f8c2bf4e0f9 [ 211.514951] RSP: 002b:00007f8c2a4c0168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 211.522648] RAX: ffffffffffffffda RBX: 00007f8c2c06df80 RCX: 00007f8c2bf4e0f9 [ 211.529905] RDX: 0000000000000b87 RSI: 0000000000000000 RDI: 0000000000000003 [ 211.537178] RBP: 00007f8c2a4c01d0 R08: 0000000000000000 R09: 0000000000000000 [ 211.544427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.551680] R13: 00007ffefa3cde2f R14: 00007f8c2a4c0300 R15: 0000000000022000 [ 211.559074] CPU: 0 PID: 10522 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 211.566963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 211.574731] socket: no more sockets [ 211.576306] Call Trace: [ 211.576323] dump_stack+0x1b2/0x281 08:05:22 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 1) 08:05:22 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', 0x0}) 08:05:22 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (fail_nth: 3) [ 211.576338] should_fail.cold+0x10a/0x149 [ 211.576353] __alloc_pages_nodemask+0x21e/0x2900 [ 211.595052] ? __lock_acquire+0x5fc/0x3f20 [ 211.599297] ? get_pid_task+0x91/0x130 [ 211.603186] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 211.608064] ? lock_downgrade+0x740/0x740 [ 211.612219] ? get_pid_task+0xb8/0x130 [ 211.616117] ? proc_fail_nth_write+0x7b/0x180 [ 211.620625] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 211.625578] cache_grow_begin+0x91/0x700 [ 211.629654] ? fs_reclaim_release+0xd0/0x110 [ 211.634129] ? check_preemption_disabled+0x35/0x240 [ 211.639153] cache_alloc_refill+0x273/0x350 [ 211.643490] kmem_cache_alloc+0x333/0x3c0 [ 211.647824] getname_flags+0xc8/0x550 [ 211.651631] do_sys_open+0x1ce/0x410 [ 211.655348] ? filp_open+0x60/0x60 [ 211.658890] ? __do_page_fault+0x159/0xad0 [ 211.663124] ? do_syscall_64+0x4c/0x640 [ 211.667096] ? SyS_open+0x30/0x30 [ 211.670554] do_syscall_64+0x1d5/0x640 [ 211.674455] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 211.679717] RIP: 0033:0x7f6f526bf0f9 08:05:22 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:22 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x1f) accept4$inet6(r2, 0x0, &(0x7f0000000100), 0x80000) [ 211.683437] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 211.691142] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 [ 211.698409] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 211.705675] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 [ 211.712942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.720210] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 08:05:22 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:22 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r2 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xffffffffffffff35}}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xb}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '$\x00'}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x810) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:22 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff"]}) [ 211.776147] FAULT_INJECTION: forcing a failure. [ 211.776147] name failslab, interval 1, probability 0, space 0, times 0 08:05:22 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x1f) [ 211.845224] CPU: 1 PID: 10547 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 211.853146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 211.862503] Call Trace: [ 211.865092] dump_stack+0x1b2/0x281 [ 211.868727] should_fail.cold+0x10a/0x149 [ 211.872878] should_failslab+0xd6/0x130 [ 211.876862] kmem_cache_alloc+0x28e/0x3c0 [ 211.881274] ? sock_destroy_inode+0x60/0x60 [ 211.885599] sock_alloc_inode+0x19/0x250 [ 211.889664] ? sock_destroy_inode+0x60/0x60 [ 211.893988] alloc_inode+0x5d/0x170 [ 211.897670] new_inode_pseudo+0x14/0xe0 [ 211.901659] sock_alloc+0x3c/0x270 [ 211.905203] __sock_create+0x8a/0x620 [ 211.909026] ? wait_for_completion_io+0x10/0x10 [ 211.913703] SyS_socketpair+0xdf/0x480 [ 211.916011] FAULT_INJECTION: forcing a failure. [ 211.916011] name failslab, interval 1, probability 0, space 0, times 0 [ 211.917597] ? SyS_socket+0x1b0/0x1b0 [ 211.917610] ? SyS_read+0x210/0x210 [ 211.917619] ? __do_page_fault+0x159/0xad0 [ 211.917634] ? do_syscall_64+0x4c/0x640 [ 211.944423] ? SyS_socket+0x1b0/0x1b0 [ 211.948296] do_syscall_64+0x1d5/0x640 [ 211.952170] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 211.957342] RIP: 0033:0x7f47973da0f9 [ 211.961033] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 211.968727] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 211.977379] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 211.984631] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 08:05:22 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 3) 08:05:22 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) [ 211.991883] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.999150] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 [ 212.006415] CPU: 0 PID: 10567 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 212.014300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 212.023654] Call Trace: [ 212.026243] dump_stack+0x1b2/0x281 [ 212.029873] should_fail.cold+0x10a/0x149 [ 212.034038] should_failslab+0xd6/0x130 [ 212.038020] kmem_cache_alloc+0x28e/0x3c0 [ 212.042180] get_empty_filp+0x86/0x3f0 [ 212.046077] path_openat+0x84/0x2970 [ 212.049797] ? get_pid_task+0x91/0x130 [ 212.053685] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 212.058544] ? path_lookupat+0x780/0x780 [ 212.062625] ? trace_hardirqs_on+0x10/0x10 [ 212.066871] do_filp_open+0x179/0x3c0 [ 212.070678] ? may_open_dev+0xe0/0xe0 [ 212.074493] ? __alloc_fd+0x1be/0x490 [ 212.078313] ? lock_downgrade+0x740/0x740 [ 212.082463] ? do_raw_spin_unlock+0x164/0x220 [ 212.087143] ? _raw_spin_unlock+0x29/0x40 [ 212.089773] socket: no more sockets [ 212.091382] ? __alloc_fd+0x1be/0x490 [ 212.091400] do_sys_open+0x296/0x410 [ 212.091410] ? filp_open+0x60/0x60 [ 212.091423] ? __do_page_fault+0x159/0xad0 [ 212.110358] ? do_syscall_64+0x4c/0x640 [ 212.114329] ? SyS_open+0x30/0x30 [ 212.117782] do_syscall_64+0x1d5/0x640 [ 212.121758] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 212.126970] RIP: 0033:0x7f6f526bf0f9 [ 212.130666] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 212.138393] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 08:05:22 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 2) 08:05:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xffffffffffffff35}}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xb}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '$\x00'}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x810) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:22 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:22 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff"]}) 08:05:22 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) 08:05:22 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 4) [ 212.145655] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 212.152907] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.160164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.167412] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 08:05:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xffffffffffffff35}}, 0x0) (async) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xffffffffffffff35}}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xb}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '$\x00'}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x810) socketpair(0x3, 0x0, 0xb87, 0x0) [ 212.264525] FAULT_INJECTION: forcing a failure. [ 212.264525] name failslab, interval 1, probability 0, space 0, times 0 [ 212.267158] FAULT_INJECTION: forcing a failure. [ 212.267158] name failslab, interval 1, probability 0, space 0, times 0 [ 212.279705] CPU: 0 PID: 10586 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 212.296274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 212.305628] Call Trace: [ 212.308217] dump_stack+0x1b2/0x281 [ 212.311849] should_fail.cold+0x10a/0x149 [ 212.316003] should_failslab+0xd6/0x130 [ 212.319987] kmem_cache_alloc_trace+0x29a/0x3d0 [ 212.324660] apparmor_file_alloc_security+0x129/0x800 [ 212.329858] security_file_alloc+0x66/0xa0 [ 212.334098] ? selinux_is_enabled+0x5/0x50 [ 212.338334] get_empty_filp+0x16b/0x3f0 [ 212.342308] path_openat+0x84/0x2970 [ 212.346017] ? get_pid_task+0x91/0x130 [ 212.349901] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 212.354741] ? path_lookupat+0x780/0x780 [ 212.358799] ? trace_hardirqs_on+0x10/0x10 [ 212.363045] do_filp_open+0x179/0x3c0 [ 212.366838] ? may_open_dev+0xe0/0xe0 [ 212.370628] ? __alloc_fd+0x1be/0x490 [ 212.374429] ? lock_downgrade+0x740/0x740 [ 212.378574] ? do_raw_spin_unlock+0x164/0x220 [ 212.383063] ? _raw_spin_unlock+0x29/0x40 [ 212.387210] ? __alloc_fd+0x1be/0x490 [ 212.391012] do_sys_open+0x296/0x410 [ 212.394728] ? filp_open+0x60/0x60 [ 212.398268] ? __do_page_fault+0x159/0xad0 [ 212.402504] ? do_syscall_64+0x4c/0x640 [ 212.406474] ? SyS_open+0x30/0x30 [ 212.409930] do_syscall_64+0x1d5/0x640 [ 212.413819] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 212.418996] RIP: 0033:0x7f6f526bf0f9 [ 212.422694] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 212.430393] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 [ 212.437662] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 212.444929] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.452193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.459466] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 [ 212.468709] CPU: 1 PID: 10585 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 212.476607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 212.485958] Call Trace: [ 212.488551] dump_stack+0x1b2/0x281 [ 212.492186] should_fail.cold+0x10a/0x149 [ 212.496336] should_failslab+0xd6/0x130 [ 212.500316] kmem_cache_alloc_trace+0x29a/0x3d0 [ 212.504989] ? kmem_cache_alloc+0x35f/0x3c0 [ 212.509487] sock_alloc_inode+0x5f/0x250 [ 212.513565] ? sock_destroy_inode+0x60/0x60 [ 212.517892] alloc_inode+0x5d/0x170 [ 212.521525] new_inode_pseudo+0x14/0xe0 [ 212.525501] sock_alloc+0x3c/0x270 [ 212.529053] __sock_create+0x8a/0x620 [ 212.532861] ? wait_for_completion_io+0x10/0x10 [ 212.537543] SyS_socketpair+0xdf/0x480 [ 212.541433] ? SyS_socket+0x1b0/0x1b0 [ 212.545238] ? SyS_read+0x210/0x210 [ 212.548671] FAULT_INJECTION: forcing a failure. [ 212.548671] name failslab, interval 1, probability 0, space 0, times 0 [ 212.548859] ? __do_page_fault+0x159/0xad0 [ 212.548875] ? do_syscall_64+0x4c/0x640 [ 212.568363] ? SyS_socket+0x1b0/0x1b0 [ 212.572161] do_syscall_64+0x1d5/0x640 [ 212.576053] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 212.581235] RIP: 0033:0x7f47973da0f9 [ 212.584934] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 212.592625] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 212.599879] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 212.607138] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 08:05:23 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 5) 08:05:23 executing program 1: socketpair(0x137dcd8f39fe28ae, 0x4, 0xb28, 0x0) 08:05:23 executing program 1: socketpair(0x137dcd8f39fe28ae, 0x4, 0xb28, 0x0) 08:05:23 executing program 1: socketpair(0x137dcd8f39fe28ae, 0x4, 0xb28, 0x0) 08:05:23 executing program 1: socketpair(0x3, 0x5, 0xb87, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipmr_newroute={0x3c, 0x18, 0x100, 0x70bd26, 0x25dfdbfe, {0x80, 0xa0, 0x14, 0x1, 0x2, 0x4, 0x0, 0x8, 0x2800}, [@RTA_PREFSRC={0x8, 0x7, @multicast1}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_PREFSRC={0x8, 0x7, @multicast1}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}]}, 0x3c}}, 0x4000000) [ 212.614404] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.621668] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 [ 212.628946] CPU: 0 PID: 10604 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 212.636833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 212.646185] Call Trace: [ 212.648772] dump_stack+0x1b2/0x281 [ 212.652407] should_fail.cold+0x10a/0x149 [ 212.656563] should_failslab+0xd6/0x130 [ 212.660540] kmem_cache_alloc+0x28e/0x3c0 [ 212.664690] __d_alloc+0x2a/0xa20 [ 212.668144] ? __lock_acquire+0x5fc/0x3f20 [ 212.672382] d_alloc+0x46/0x240 [ 212.675667] d_alloc_parallel+0xd6/0x16b0 [ 212.679820] ? lock_acquire+0x170/0x3f0 [ 212.683793] ? lock_downgrade+0x740/0x740 [ 212.687944] ? __d_lookup_rcu+0x640/0x640 [ 212.689002] socket: no more sockets [ 212.692086] ? mark_held_locks+0xa6/0xf0 [ 212.692097] ? d_lookup+0x172/0x220 [ 212.692108] ? d_lookup+0x156/0x220 [ 212.692122] lookup_open+0x462/0x1750 [ 212.692140] ? vfs_mkdir+0x6e0/0x6e0 [ 212.692157] path_openat+0x14bb/0x2970 [ 212.718427] ? path_lookupat+0x780/0x780 [ 212.722579] ? trace_hardirqs_on+0x10/0x10 [ 212.726820] do_filp_open+0x179/0x3c0 [ 212.730620] ? may_open_dev+0xe0/0xe0 [ 212.734421] ? lock_downgrade+0x740/0x740 [ 212.738693] ? do_raw_spin_unlock+0x164/0x220 [ 212.743311] ? _raw_spin_unlock+0x29/0x40 [ 212.747442] ? __alloc_fd+0x1be/0x490 [ 212.751242] do_sys_open+0x296/0x410 [ 212.754947] ? filp_open+0x60/0x60 [ 212.758474] ? __do_page_fault+0x159/0xad0 [ 212.762697] ? do_syscall_64+0x4c/0x640 [ 212.766657] ? SyS_open+0x30/0x30 [ 212.770102] do_syscall_64+0x1d5/0x640 [ 212.774002] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 212.779182] RIP: 0033:0x7f6f526bf0f9 [ 212.782880] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 212.790578] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 [ 212.797838] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 212.805109] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 08:05:23 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 3) 08:05:23 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[]}) 08:05:23 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', r1, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:23 executing program 1: socketpair(0x3, 0x5, 0xb87, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipmr_newroute={0x3c, 0x18, 0x100, 0x70bd26, 0x25dfdbfe, {0x80, 0xa0, 0x14, 0x1, 0x2, 0x4, 0x0, 0x8, 0x2800}, [@RTA_PREFSRC={0x8, 0x7, @multicast1}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_PREFSRC={0x8, 0x7, @multicast1}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}]}, 0x3c}}, 0x4000000) 08:05:23 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) socket(0x11, 0xa, 0x0) 08:05:23 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 6) [ 212.812368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.819631] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 08:05:23 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[]}) 08:05:23 executing program 3: socket(0x11, 0xa, 0x0) r0 = socket(0x26, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'tunl0\x00', &(0x7f0000000d00)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x2000000, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x2, 0x4, 0x0, @broadcast, @multicast1}}}}) 08:05:23 executing program 1: socketpair(0x3, 0x5, 0xb87, 0x0) (async, rerun: 64) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipmr_newroute={0x3c, 0x18, 0x100, 0x70bd26, 0x25dfdbfe, {0x80, 0xa0, 0x14, 0x1, 0x2, 0x4, 0x0, 0x8, 0x2800}, [@RTA_PREFSRC={0x8, 0x7, @multicast1}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_PREFSRC={0x8, 0x7, @multicast1}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}]}, 0x3c}}, 0x4000000) (rerun: 64) 08:05:23 executing program 5: socket(0x11, 0xa, 0x0) socket(0x26, 0x2, 0x1) r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) [ 212.919831] FAULT_INJECTION: forcing a failure. [ 212.919831] name failslab, interval 1, probability 0, space 0, times 0 [ 212.936096] FAULT_INJECTION: forcing a failure. [ 212.936096] name failslab, interval 1, probability 0, space 0, times 0 [ 212.958863] CPU: 0 PID: 10627 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 212.966774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 212.976126] Call Trace: [ 212.978720] dump_stack+0x1b2/0x281 [ 212.982360] should_fail.cold+0x10a/0x149 [ 212.986512] should_failslab+0xd6/0x130 [ 212.990492] kmem_cache_alloc+0x28e/0x3c0 [ 212.994658] sk_prot_alloc+0x5f/0x290 [ 212.998465] sk_alloc+0x36/0xcd0 [ 213.001833] unix_create1+0x78/0x4f0 [ 213.005548] unix_create+0xdd/0x1c0 [ 213.009176] __sock_create+0x303/0x620 [ 213.013065] SyS_socketpair+0xdf/0x480 [ 213.016955] ? SyS_socket+0x1b0/0x1b0 [ 213.020754] ? SyS_read+0x210/0x210 [ 213.024379] ? __do_page_fault+0x159/0xad0 [ 213.028636] ? do_syscall_64+0x4c/0x640 [ 213.032613] ? SyS_socket+0x1b0/0x1b0 [ 213.036414] do_syscall_64+0x1d5/0x640 [ 213.040306] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 213.045494] RIP: 0033:0x7f47973da0f9 [ 213.049198] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 213.056901] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 08:05:23 executing program 1: socketpair(0x12492e78bf9f0706, 0x1, 0xb89, 0x0) 08:05:23 executing program 3: socket(0x11, 0xa, 0x0) socket(0x26, 0x2, 0x1) [ 213.064167] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 213.071436] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.078792] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.086060] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 [ 213.118779] CPU: 0 PID: 10628 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 213.126699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 213.136051] Call Trace: [ 213.138638] dump_stack+0x1b2/0x281 [ 213.142321] should_fail.cold+0x10a/0x149 [ 213.146477] should_failslab+0xd6/0x130 [ 213.150457] kmem_cache_alloc+0x28e/0x3c0 [ 213.154600] ? proc_i_callback+0x20/0x20 [ 213.158684] proc_alloc_inode+0x18/0x1a0 [ 213.162745] ? proc_i_callback+0x20/0x20 [ 213.166824] alloc_inode+0x5d/0x170 [ 213.170461] new_inode+0x1d/0xf0 [ 213.173824] proc_get_inode+0x20/0x620 [ 213.177712] proc_lookup_de+0xd5/0x160 [ 213.181601] proc_root_lookup+0x3b/0x70 [ 213.185579] ? proc_root_getattr+0xa0/0xa0 [ 213.189821] lookup_open+0x5c4/0x1750 [ 213.193635] ? vfs_mkdir+0x6e0/0x6e0 [ 213.197365] path_openat+0x14bb/0x2970 [ 213.201260] ? path_lookupat+0x780/0x780 [ 213.205322] ? trace_hardirqs_on+0x10/0x10 [ 213.209561] do_filp_open+0x179/0x3c0 [ 213.213356] ? may_open_dev+0xe0/0xe0 [ 213.217163] ? lock_downgrade+0x740/0x740 [ 213.221322] ? do_raw_spin_unlock+0x164/0x220 [ 213.225908] ? _raw_spin_unlock+0x29/0x40 [ 213.230072] ? __alloc_fd+0x1be/0x490 [ 213.233875] do_sys_open+0x296/0x410 [ 213.237605] ? filp_open+0x60/0x60 [ 213.241135] ? __do_page_fault+0x159/0xad0 [ 213.245366] ? do_syscall_64+0x4c/0x640 [ 213.249326] ? SyS_open+0x30/0x30 [ 213.252779] do_syscall_64+0x1d5/0x640 [ 213.256684] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 213.261870] RIP: 0033:0x7f6f526bf0f9 08:05:23 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 4) 08:05:23 executing program 1: socketpair(0x12492e78bf9f0706, 0x1, 0xb89, 0x0) 08:05:23 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[]}) 08:05:24 executing program 5: socket(0x11, 0xa, 0x0) r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:24 executing program 3: socket(0x26, 0x2, 0x1) [ 213.265564] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 213.273250] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 [ 213.280499] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 213.287909] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.295286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.302536] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 08:05:24 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 7) 08:05:24 executing program 1: socketpair(0x12492e78bf9f0706, 0x1, 0xb89, 0x0) [ 213.405699] FAULT_INJECTION: forcing a failure. [ 213.405699] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.417525] CPU: 0 PID: 10666 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 213.425419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 213.434772] Call Trace: [ 213.437359] dump_stack+0x1b2/0x281 [ 213.441079] should_fail.cold+0x10a/0x149 [ 213.445323] __alloc_pages_nodemask+0x21e/0x2900 [ 213.450081] ? unwind_get_return_address+0x51/0x90 [ 213.455015] ? entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 213.460380] ? __save_stack_trace+0xa0/0x160 [ 213.464785] ? __save_stack_trace+0xa0/0x160 [ 213.469192] ? __lock_acquire+0x5fc/0x3f20 [ 213.469204] ? kasan_kmalloc+0x139/0x160 [ 213.469216] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 213.469225] ? sock_alloc_inode+0x5f/0x250 [ 213.469234] ? alloc_inode+0x5d/0x170 [ 213.469242] ? new_inode_pseudo+0x14/0xe0 [ 213.469248] ? sock_alloc+0x3c/0x270 [ 213.469265] ? __lock_acquire+0x5fc/0x3f20 [ 213.469282] cache_grow_begin+0x91/0x700 [ 213.469289] ? fs_reclaim_release+0xd0/0x110 [ 213.469301] ? check_preemption_disabled+0x35/0x240 [ 213.469311] cache_alloc_refill+0x273/0x350 [ 213.469325] kmem_cache_alloc+0x333/0x3c0 [ 213.524426] sk_prot_alloc+0x5f/0x290 [ 213.528230] sk_alloc+0x36/0xcd0 [ 213.531597] unix_create1+0x78/0x4f0 [ 213.535322] unix_create+0xdd/0x1c0 [ 213.538949] __sock_create+0x303/0x620 [ 213.542844] SyS_socketpair+0xdf/0x480 [ 213.546736] ? SyS_socket+0x1b0/0x1b0 [ 213.550535] ? SyS_read+0x210/0x210 [ 213.554159] ? __do_page_fault+0x159/0xad0 [ 213.558395] ? do_syscall_64+0x4c/0x640 [ 213.559482] FAULT_INJECTION: forcing a failure. [ 213.559482] name failslab, interval 1, probability 0, space 0, times 0 [ 213.562366] ? SyS_socket+0x1b0/0x1b0 [ 213.577354] do_syscall_64+0x1d5/0x640 [ 213.581239] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 213.586423] RIP: 0033:0x7f47973da0f9 [ 213.590120] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 213.597829] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 213.605081] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 213.612336] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.619729] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.626997] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 [ 213.634265] CPU: 1 PID: 10678 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 213.642152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 213.651589] Call Trace: [ 213.654186] dump_stack+0x1b2/0x281 [ 213.657908] should_fail.cold+0x10a/0x149 [ 213.662072] should_failslab+0xd6/0x130 [ 213.666053] kmem_cache_alloc_trace+0x29a/0x3d0 [ 213.670727] proc_reg_open+0x6d/0x3e0 [ 213.674538] do_dentry_open+0x44b/0xec0 [ 213.678518] ? proc_get_link+0x110/0x110 [ 213.682598] ? __inode_permission+0xcd/0x2f0 [ 213.687011] vfs_open+0x105/0x220 [ 213.690474] path_openat+0x628/0x2970 [ 213.694293] ? path_lookupat+0x780/0x780 [ 213.698388] ? trace_hardirqs_on+0x10/0x10 [ 213.702639] do_filp_open+0x179/0x3c0 [ 213.706450] ? may_open_dev+0xe0/0xe0 [ 213.710354] ? lock_downgrade+0x740/0x740 [ 213.714514] ? do_raw_spin_unlock+0x164/0x220 [ 213.719018] ? _raw_spin_unlock+0x29/0x40 [ 213.723170] ? __alloc_fd+0x1be/0x490 [ 213.726978] do_sys_open+0x296/0x410 [ 213.727838] FAULT_INJECTION: forcing a failure. [ 213.727838] name failslab, interval 1, probability 0, space 0, times 0 [ 213.730693] ? filp_open+0x60/0x60 [ 213.730707] ? __do_page_fault+0x159/0xad0 [ 213.730717] ? do_syscall_64+0x4c/0x640 [ 213.730725] ? SyS_open+0x30/0x30 [ 213.730734] do_syscall_64+0x1d5/0x640 [ 213.730750] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 213.730763] RIP: 0033:0x7f6f526bf0f9 [ 213.769823] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 213.777530] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 [ 213.784797] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 213.792068] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.799461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:05:24 executing program 3: socket(0x0, 0x2, 0x1) 08:05:24 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:24 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:24 executing program 1: socketpair(0x22, 0x6, 0xb8a, 0x0) 08:05:24 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 5) 08:05:24 executing program 1: socketpair(0x22, 0x6, 0xb8a, 0x0) 08:05:24 executing program 3: socket(0x0, 0x2, 0x1) 08:05:24 executing program 1: socketpair(0x22, 0x6, 0xb8a, 0x0) 08:05:24 executing program 3: socket(0x0, 0x2, 0x1) [ 213.806731] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 [ 213.823512] CPU: 0 PID: 10688 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 213.831417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 213.840771] Call Trace: [ 213.843361] dump_stack+0x1b2/0x281 [ 213.847021] should_fail.cold+0x10a/0x149 [ 213.851180] should_failslab+0xd6/0x130 [ 213.855162] kmem_cache_alloc+0x28e/0x3c0 [ 213.859353] ? sock_destroy_inode+0x60/0x60 [ 213.863680] sock_alloc_inode+0x19/0x250 [ 213.867766] ? sock_destroy_inode+0x60/0x60 [ 213.872093] alloc_inode+0x5d/0x170 [ 213.875719] new_inode_pseudo+0x14/0xe0 [ 213.879695] sock_alloc+0x3c/0x270 [ 213.883292] __sock_create+0x8a/0x620 [ 213.887102] SyS_socketpair+0x159/0x480 [ 213.891084] ? SyS_socket+0x1b0/0x1b0 [ 213.894892] ? SyS_read+0x210/0x210 [ 213.898522] ? __do_page_fault+0x159/0xad0 [ 213.902763] ? do_syscall_64+0x4c/0x640 [ 213.906740] ? SyS_socket+0x1b0/0x1b0 [ 213.910546] do_syscall_64+0x1d5/0x640 [ 213.914442] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 213.919633] RIP: 0033:0x7f47973da0f9 [ 213.923342] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 213.931053] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 213.938393] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 213.945663] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 08:05:24 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 8) 08:05:24 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:24 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:24 executing program 1: socketpair(0x15, 0x0, 0xb87, 0x0) [ 213.952936] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.960210] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 08:05:24 executing program 3: socket(0x26, 0x0, 0x1) 08:05:24 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:24 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) [ 214.044337] FAULT_INJECTION: forcing a failure. [ 214.044337] name failslab, interval 1, probability 0, space 0, times 0 [ 214.094988] CPU: 1 PID: 10718 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 214.102906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 214.112351] Call Trace: [ 214.114964] dump_stack+0x1b2/0x281 [ 214.118608] should_fail.cold+0x10a/0x149 [ 214.122768] ? cgroup_pidlist_show+0x60/0x60 [ 214.127264] should_failslab+0xd6/0x130 [ 214.129146] socket: no more sockets [ 214.131240] kmem_cache_alloc_trace+0x29a/0x3d0 [ 214.131253] ? cgroupstats_open+0x20/0x20 [ 214.131263] ? cgroup_pidlist_show+0x60/0x60 [ 214.131276] single_open+0x49/0x1e0 [ 214.151861] ? single_open+0x1e0/0x1e0 [ 214.155755] proc_reg_open+0x120/0x3e0 [ 214.159645] do_dentry_open+0x44b/0xec0 [ 214.163620] ? proc_get_link+0x110/0x110 [ 214.167703] ? __inode_permission+0xcd/0x2f0 [ 214.172117] vfs_open+0x105/0x220 [ 214.175580] path_openat+0x628/0x2970 [ 214.179391] ? path_lookupat+0x780/0x780 [ 214.180587] FAULT_INJECTION: forcing a failure. [ 214.180587] name failslab, interval 1, probability 0, space 0, times 0 [ 214.183453] ? trace_hardirqs_on+0x10/0x10 [ 214.183471] do_filp_open+0x179/0x3c0 [ 214.183480] ? may_open_dev+0xe0/0xe0 [ 214.183496] ? lock_downgrade+0x740/0x740 [ 214.183513] ? do_raw_spin_unlock+0x164/0x220 [ 214.215243] ? _raw_spin_unlock+0x29/0x40 [ 214.219386] ? __alloc_fd+0x1be/0x490 [ 214.223189] do_sys_open+0x296/0x410 [ 214.226900] ? filp_open+0x60/0x60 [ 214.230439] ? __do_page_fault+0x159/0xad0 [ 214.234673] ? do_syscall_64+0x4c/0x640 [ 214.238644] ? SyS_open+0x30/0x30 [ 214.242114] do_syscall_64+0x1d5/0x640 [ 214.246191] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 214.251383] RIP: 0033:0x7f6f526bf0f9 [ 214.255087] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 214.263139] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 [ 214.270399] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 214.277692] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 [ 214.284949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:05:24 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 6) 08:05:24 executing program 3: socket(0x26, 0x0, 0x0) 08:05:24 executing program 1: socketpair(0x15, 0x0, 0xb87, 0x0) 08:05:24 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:24 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) [ 214.292292] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 [ 214.299561] CPU: 0 PID: 10736 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 214.307453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 214.316817] Call Trace: [ 214.319412] dump_stack+0x1b2/0x281 [ 214.323047] should_fail.cold+0x10a/0x149 [ 214.327211] should_failslab+0xd6/0x130 [ 214.331190] kmem_cache_alloc+0x28e/0x3c0 [ 214.335341] sk_prot_alloc+0x5f/0x290 [ 214.339149] sk_alloc+0x36/0xcd0 [ 214.342608] unix_create1+0x78/0x4f0 [ 214.346322] unix_create+0xdd/0x1c0 [ 214.349951] __sock_create+0x303/0x620 [ 214.353848] SyS_socketpair+0x159/0x480 [ 214.357825] ? SyS_socket+0x1b0/0x1b0 [ 214.361629] ? SyS_read+0x210/0x210 [ 214.365253] ? __do_page_fault+0x159/0xad0 [ 214.369484] ? do_syscall_64+0x4c/0x640 [ 214.373457] ? SyS_socket+0x1b0/0x1b0 [ 214.377257] do_syscall_64+0x1d5/0x640 [ 214.381151] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 214.386344] RIP: 0033:0x7f47973da0f9 08:05:25 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 9) 08:05:25 executing program 3: socketpair(0x22, 0x6, 0xb8a, 0x0) 08:05:25 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:25 executing program 1: socketpair(0x15, 0x0, 0xb87, 0x0) socketpair(0x15, 0x0, 0xb87, 0x0) (async) 08:05:25 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784"]}) [ 214.390055] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 214.397766] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 214.405032] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 214.412305] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 214.419574] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.426844] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 08:05:25 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 7) 08:05:25 executing program 1: socketpair(0x3, 0x0, 0x8b87, 0x0) [ 214.530111] FAULT_INJECTION: forcing a failure. [ 214.530111] name failslab, interval 1, probability 0, space 0, times 0 [ 214.543265] CPU: 0 PID: 10764 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 214.546260] FAULT_INJECTION: forcing a failure. [ 214.546260] name failslab, interval 1, probability 0, space 0, times 0 [ 214.551161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 214.551165] Call Trace: [ 214.551183] dump_stack+0x1b2/0x281 [ 214.551197] should_fail.cold+0x10a/0x149 [ 214.551210] should_failslab+0xd6/0x130 [ 214.551224] kmem_cache_alloc+0x28e/0x3c0 [ 214.551237] sk_prot_alloc+0x5f/0x290 [ 214.551249] sk_alloc+0x36/0xcd0 [ 214.551262] unix_create1+0x78/0x4f0 [ 214.551274] unix_create+0xdd/0x1c0 [ 214.604821] __sock_create+0x303/0x620 [ 214.608717] SyS_socketpair+0x159/0x480 [ 214.612690] ? SyS_socket+0x1b0/0x1b0 [ 214.617800] ? SyS_read+0x210/0x210 [ 214.621430] ? __do_page_fault+0x159/0xad0 [ 214.625666] ? do_syscall_64+0x4c/0x640 [ 214.629639] ? SyS_socket+0x1b0/0x1b0 [ 214.633437] do_syscall_64+0x1d5/0x640 [ 214.637436] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 214.642618] RIP: 0033:0x7f47973da0f9 [ 214.647627] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 214.655359] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 214.662627] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 214.669896] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 214.677159] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.684418] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 [ 214.691795] CPU: 1 PID: 10762 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 214.699713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 214.709064] Call Trace: [ 214.711653] dump_stack+0x1b2/0x281 [ 214.715397] should_fail.cold+0x10a/0x149 [ 214.719549] ? cgroup_pidlist_show+0x60/0x60 [ 214.723956] should_failslab+0xd6/0x130 [ 214.727935] kmem_cache_alloc_trace+0x29a/0x3d0 [ 214.732610] ? cgroup_pidlist_show+0x60/0x60 [ 214.737104] seq_open+0x7b/0x1f0 [ 214.740567] ? cgroupstats_open+0x20/0x20 [ 214.744738] single_open+0xf9/0x1e0 [ 214.748366] ? single_open+0x1e0/0x1e0 [ 214.752253] proc_reg_open+0x120/0x3e0 [ 214.756146] do_dentry_open+0x44b/0xec0 [ 214.760125] ? proc_get_link+0x110/0x110 [ 214.764194] ? __inode_permission+0xcd/0x2f0 [ 214.768610] vfs_open+0x105/0x220 [ 214.770898] FAULT_INJECTION: forcing a failure. [ 214.770898] name failslab, interval 1, probability 0, space 0, times 0 [ 214.772113] path_openat+0x628/0x2970 [ 214.772138] ? path_lookupat+0x780/0x780 [ 214.772149] ? trace_hardirqs_on+0x10/0x10 [ 214.772164] do_filp_open+0x179/0x3c0 [ 214.799163] ? may_open_dev+0xe0/0xe0 [ 214.802958] ? lock_downgrade+0x740/0x740 [ 214.807093] ? do_raw_spin_unlock+0x164/0x220 [ 214.811576] ? _raw_spin_unlock+0x29/0x40 [ 214.815706] ? __alloc_fd+0x1be/0x490 [ 214.819514] do_sys_open+0x296/0x410 [ 214.823236] ? filp_open+0x60/0x60 [ 214.826767] ? __do_page_fault+0x159/0xad0 [ 214.830987] ? do_syscall_64+0x4c/0x640 [ 214.834942] ? SyS_open+0x30/0x30 [ 214.838379] do_syscall_64+0x1d5/0x640 [ 214.842256] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 214.847429] RIP: 0033:0x7f6f526bf0f9 [ 214.851122] RSP: 002b:00007f6f50c31168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 214.858815] RAX: ffffffffffffffda RBX: 00007f6f527def80 RCX: 00007f6f526bf0f9 [ 214.866070] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 214.873321] RBP: 00007f6f50c311d0 R08: 0000000000000000 R09: 0000000000000000 08:05:25 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:25 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:25 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:25 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 8) [ 214.880570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.887825] R13: 00007ffeea5bb81f R14: 00007f6f50c31300 R15: 0000000000022000 [ 214.895107] CPU: 0 PID: 10778 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 214.903000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 214.912350] Call Trace: [ 214.914943] dump_stack+0x1b2/0x281 [ 214.918579] should_fail.cold+0x10a/0x149 [ 214.922773] should_failslab+0xd6/0x130 [ 214.926763] kmem_cache_alloc+0x28e/0x3c0 [ 214.930916] __d_alloc+0x2a/0xa20 [ 214.934377] sock_alloc_file+0xc8/0x2e0 [ 214.938349] ? sock_poll+0x220/0x220 [ 214.942073] SyS_socketpair+0x20c/0x480 [ 214.946048] ? SyS_socket+0x1b0/0x1b0 [ 214.949950] ? SyS_read+0x210/0x210 [ 214.953571] ? __do_page_fault+0x159/0xad0 [ 214.957811] ? do_syscall_64+0x4c/0x640 [ 214.961786] ? SyS_socket+0x1b0/0x1b0 [ 214.965601] do_syscall_64+0x1d5/0x640 [ 214.969498] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 214.974680] RIP: 0033:0x7f47973da0f9 08:05:25 executing program 1: socketpair(0x3, 0x0, 0x8b87, 0x0) socketpair(0x3, 0x0, 0x8b87, 0x0) (async) 08:05:25 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (fail_nth: 10) 08:05:25 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:25 executing program 3: socketpair(0x22, 0x6, 0xb8a, 0x0) 08:05:25 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) [ 214.978384] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 214.986090] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 214.993359] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 215.000632] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 215.007905] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.015173] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 08:05:25 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 9) 08:05:25 executing program 1: socketpair(0x3, 0x0, 0x8b87, 0x0) 08:05:25 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x100, 0xabc, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x67, 0x0, 0x66, 0x29, 0x0, @private=0xa010101, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x36, 0x3, 0x9, [{@remote, 0x8}, {@broadcast, 0x4}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0xe, [{@remote}, {@private=0xa010102, 0x3}, {@remote, 0x1}, {@multicast2, 0x8ca9}]}]}}}}}) 08:05:25 executing program 3: socketpair(0x22, 0x6, 0xb8a, 0x0) 08:05:25 executing program 1: socketpair(0x9, 0x6, 0x988, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x200, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000010}, 0x8044) 08:05:25 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:25 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0xc, 0x2, 0xa, 0x18}, @exit, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @map_val={0x18, 0x5, 0x2, 0x0, r0}, @alu={0x4, 0x1, 0x0, 0x5, 0x6, 0x10c, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xb, 0xf, 0x3, 0x2, 0xffffffffffffffff}], &(0x7f0000000080)='syzkaller\x00', 0x10001, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xb, 0x2, 0x3}, 0x10}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) [ 215.122898] FAULT_INJECTION: forcing a failure. [ 215.122898] name failslab, interval 1, probability 0, space 0, times 0 [ 215.188817] CPU: 1 PID: 10795 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 215.196735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 215.206088] Call Trace: [ 215.208692] dump_stack+0x1b2/0x281 [ 215.212326] should_fail.cold+0x10a/0x149 [ 215.216609] should_failslab+0xd6/0x130 [ 215.220693] kmem_cache_alloc+0x28e/0x3c0 [ 215.224849] get_empty_filp+0x86/0x3f0 [ 215.228742] alloc_file+0x23/0x440 [ 215.232287] sock_alloc_file+0x113/0x2e0 [ 215.236350] ? sock_poll+0x220/0x220 [ 215.240160] SyS_socketpair+0x20c/0x480 [ 215.244140] ? SyS_socket+0x1b0/0x1b0 [ 215.248033] ? SyS_read+0x210/0x210 [ 215.251667] ? __do_page_fault+0x159/0xad0 [ 215.255904] ? do_syscall_64+0x4c/0x640 [ 215.259883] ? SyS_socket+0x1b0/0x1b0 [ 215.263695] do_syscall_64+0x1d5/0x640 [ 215.267690] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 215.272881] RIP: 0033:0x7f47973da0f9 [ 215.276586] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 08:05:25 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0xc, 0x2, 0xa, 0x18}, @exit, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @map_val={0x18, 0x5, 0x2, 0x0, r0}, @alu={0x4, 0x1, 0x0, 0x5, 0x6, 0x10c, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xb, 0xf, 0x3, 0x2, 0xffffffffffffffff}], &(0x7f0000000080)='syzkaller\x00', 0x10001, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xb, 0x2, 0x3}, 0x10}, 0x80) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:26 executing program 3: socketpair(0x0, 0x6, 0xb8a, 0x0) 08:05:26 executing program 1: socketpair(0x9, 0x6, 0x988, 0x0) (async) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x200, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000010}, 0x8044) 08:05:26 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f4664"]}) [ 215.284294] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 215.291561] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 215.298845] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 215.306114] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.313386] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 08:05:26 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 10) 08:05:26 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0xc, 0x2, 0xa, 0x18}, @exit, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}, @map_val={0x18, 0x5, 0x2, 0x0, r0}, @alu={0x4, 0x1, 0x0, 0x5, 0x6, 0x10c, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xb, 0xf, 0x3, 0x2, 0xffffffffffffffff}], &(0x7f0000000080)='syzkaller\x00', 0x10001, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xb, 0x2, 0x3}, 0x10}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:26 executing program 3: socketpair(0x0, 0x6, 0xb8a, 0x0) 08:05:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:26 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) 08:05:26 executing program 1: socketpair(0x9, 0x6, 0x988, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x200, 0x70bd2d, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000010}, 0x8044) 08:05:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) [ 215.425367] FAULT_INJECTION: forcing a failure. [ 215.425367] name failslab, interval 1, probability 0, space 0, times 0 08:05:26 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='s']}) 08:05:26 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) [ 215.484130] CPU: 0 PID: 10841 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 215.492044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 215.501402] Call Trace: [ 215.504082] dump_stack+0x1b2/0x281 [ 215.507738] should_fail.cold+0x10a/0x149 [ 215.511890] should_failslab+0xd6/0x130 [ 215.515867] kmem_cache_alloc_trace+0x29a/0x3d0 [ 215.520549] apparmor_file_alloc_security+0x129/0x800 [ 215.525840] security_file_alloc+0x66/0xa0 [ 215.530087] ? selinux_is_enabled+0x5/0x50 08:05:26 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) 08:05:26 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) [ 215.534412] get_empty_filp+0x16b/0x3f0 [ 215.538387] alloc_file+0x23/0x440 [ 215.541942] sock_alloc_file+0x113/0x2e0 [ 215.546007] ? sock_poll+0x220/0x220 [ 215.549734] SyS_socketpair+0x20c/0x480 [ 215.553723] ? SyS_socket+0x1b0/0x1b0 [ 215.557529] ? SyS_read+0x210/0x210 [ 215.561158] ? __do_page_fault+0x159/0xad0 [ 215.565392] ? do_syscall_64+0x4c/0x640 [ 215.569365] ? SyS_socket+0x1b0/0x1b0 [ 215.573167] do_syscall_64+0x1d5/0x640 [ 215.577063] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 08:05:26 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) [ 215.582345] RIP: 0033:0x7f47973da0f9 [ 215.586052] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 215.593845] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 215.601115] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 215.608387] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 215.615654] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000002 [ 215.622927] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 08:05:26 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 11) 08:05:26 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x7fff, 0x2], 0x2, 0x800, 0x0, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x20008055, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, r1}, 0x10) socketpair(0x28, 0x0, 0xb87, 0x0) 08:05:26 executing program 3: socketpair(0x0, 0x6, 0xb8a, 0x0) 08:05:26 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='s']}) 08:05:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gretap0\x00', 0x0}) 08:05:26 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) (async) 08:05:26 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x7fff, 0x2], 0x2, 0x800, 0x0, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x20008055, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, r1}, 0x10) socketpair(0x28, 0x0, 0xb87, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x7fff, 0x2], 0x2, 0x800}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r1, 0x0, 0x0, 0x20008055, 0x0, 0x0) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, r1}, 0x10) (async) socketpair(0x28, 0x0, 0xb87, 0x0) (async) [ 215.747113] FAULT_INJECTION: forcing a failure. [ 215.747113] name failslab, interval 1, probability 0, space 0, times 0 [ 215.776786] CPU: 1 PID: 10877 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 215.785591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 215.794940] Call Trace: 08:05:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:26 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x7fff, 0x2], 0x2, 0x800, 0x0, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x20008055, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, r1}, 0x10) socketpair(0x28, 0x0, 0xb87, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x7fff, 0x2], 0x2, 0x800}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r1, 0x0, 0x0, 0x20008055, 0x0, 0x0) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, r1}, 0x10) (async) socketpair(0x28, 0x0, 0xb87, 0x0) (async) [ 215.797529] dump_stack+0x1b2/0x281 [ 215.801165] should_fail.cold+0x10a/0x149 [ 215.805347] should_failslab+0xd6/0x130 [ 215.809327] kmem_cache_alloc+0x28e/0x3c0 [ 215.813484] __d_alloc+0x2a/0xa20 [ 215.816945] ? alloc_file+0x292/0x440 [ 215.820750] sock_alloc_file+0xc8/0x2e0 [ 215.824729] ? sock_poll+0x220/0x220 [ 215.828460] SyS_socketpair+0x22e/0x480 [ 215.832434] ? SyS_socket+0x1b0/0x1b0 [ 215.836243] ? SyS_read+0x210/0x210 [ 215.839869] ? __do_page_fault+0x159/0xad0 [ 215.844253] ? do_syscall_64+0x4c/0x640 [ 215.848261] ? SyS_socket+0x1b0/0x1b0 [ 215.852066] do_syscall_64+0x1d5/0x640 [ 215.855962] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 215.861155] RIP: 0033:0x7f47973da0f9 [ 215.864867] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 215.872576] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 215.879844] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 215.887322] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 08:05:26 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r0}) 08:05:26 executing program 3: socketpair(0x22, 0x0, 0xb8a, 0x0) 08:05:26 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @broadcast}}, 0x1e) [ 215.894855] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000002 [ 215.902127] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 08:05:26 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 12) 08:05:26 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='s']}) 08:05:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:26 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r0}) 08:05:26 executing program 3: socketpair(0x22, 0x0, 0x0, 0x0) 08:05:26 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @broadcast}}, 0x1e) 08:05:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:26 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000"]}) 08:05:26 executing program 3: socketpair(0x22, 0x0, 0x0, 0x0) 08:05:26 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r0}) socketpair(0x3, 0x0, 0xb87, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) (async) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) (async) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r0}) (async) [ 216.025566] FAULT_INJECTION: forcing a failure. [ 216.025566] name failslab, interval 1, probability 0, space 0, times 0 [ 216.082666] CPU: 1 PID: 10921 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 216.090582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 216.099939] Call Trace: [ 216.102532] dump_stack+0x1b2/0x281 [ 216.106168] should_fail.cold+0x10a/0x149 [ 216.110321] should_failslab+0xd6/0x130 [ 216.114304] kmem_cache_alloc+0x28e/0x3c0 [ 216.118459] get_empty_filp+0x86/0x3f0 [ 216.122348] alloc_file+0x23/0x440 [ 216.125890] sock_alloc_file+0x113/0x2e0 08:05:26 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @broadcast}}, 0x1e) [ 216.129951] ? sock_poll+0x220/0x220 [ 216.133675] SyS_socketpair+0x22e/0x480 [ 216.137652] ? SyS_socket+0x1b0/0x1b0 [ 216.141580] ? SyS_read+0x210/0x210 [ 216.145209] ? __do_page_fault+0x159/0xad0 [ 216.149442] ? do_syscall_64+0x4c/0x640 [ 216.153422] ? SyS_socket+0x1b0/0x1b0 [ 216.157232] do_syscall_64+0x1d5/0x640 [ 216.161144] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 216.166334] RIP: 0033:0x7f47973da0f9 [ 216.170048] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 08:05:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x7], 0x1, 0x80000}) socketpair(0x6, 0x0, 0x5, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x303}, "4d5f3c8364647a26", "70874887ad3985faa7a87a2d57abed22005881c0cb97df6af7e7b2a471a8aed8", "240110f1", "cfa0c3b9eb4437e7"}, 0x38) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0xfc6e, 0x4) [ 216.177764] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 216.185038] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 216.192313] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.199579] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.206852] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 08:05:26 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 13) 08:05:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:26 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000"]}) 08:05:26 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, r2, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:26 executing program 3: socketpair(0x22, 0x0, 0x0, 0x0) 08:05:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x7], 0x1, 0x80000}) socketpair(0x6, 0x0, 0x5, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x303}, "4d5f3c8364647a26", "70874887ad3985faa7a87a2d57abed22005881c0cb97df6af7e7b2a471a8aed8", "240110f1", "cfa0c3b9eb4437e7"}, 0x38) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0xfc6e, 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x7], 0x1, 0x80000}) (async) socketpair(0x6, 0x0, 0x5, 0x0) (async) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x303}, "4d5f3c8364647a26", "70874887ad3985faa7a87a2d57abed22005881c0cb97df6af7e7b2a471a8aed8", "240110f1", "cfa0c3b9eb4437e7"}, 0x38) (async) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0xfc6e, 0x4) (async) 08:05:27 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @broadcast}}, 0x1e) 08:05:27 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) (async) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) (async) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, r2, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000"]}) 08:05:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x7], 0x1, 0x80000}) socketpair(0x6, 0x0, 0x5, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x303}, "4d5f3c8364647a26", "70874887ad3985faa7a87a2d57abed22005881c0cb97df6af7e7b2a471a8aed8", "240110f1", "cfa0c3b9eb4437e7"}, 0x38) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0xfc6e, 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x7], 0x1, 0x80000}) (async) socketpair(0x6, 0x0, 0x5, 0x0) (async) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x303}, "4d5f3c8364647a26", "70874887ad3985faa7a87a2d57abed22005881c0cb97df6af7e7b2a471a8aed8", "240110f1", "cfa0c3b9eb4437e7"}, 0x38) (async) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0xfc6e, 0x4) (async) 08:05:27 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) [ 216.390988] FAULT_INJECTION: forcing a failure. [ 216.390988] name failslab, interval 1, probability 0, space 0, times 0 [ 216.429799] CPU: 0 PID: 10966 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 216.437720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 216.447312] Call Trace: [ 216.449902] dump_stack+0x1b2/0x281 [ 216.453536] should_fail.cold+0x10a/0x149 [ 216.457691] should_failslab+0xd6/0x130 [ 216.461673] kmem_cache_alloc_trace+0x29a/0x3d0 [ 216.466439] apparmor_file_alloc_security+0x129/0x800 [ 216.471637] security_file_alloc+0x66/0xa0 [ 216.475878] ? selinux_is_enabled+0x5/0x50 [ 216.480122] get_empty_filp+0x16b/0x3f0 [ 216.484107] alloc_file+0x23/0x440 [ 216.487647] sock_alloc_file+0x113/0x2e0 [ 216.491925] ? sock_poll+0x220/0x220 [ 216.495642] SyS_socketpair+0x22e/0x480 [ 216.499621] ? SyS_socket+0x1b0/0x1b0 [ 216.503421] ? SyS_read+0x210/0x210 [ 216.507223] ? __do_page_fault+0x159/0xad0 [ 216.511453] ? do_syscall_64+0x4c/0x640 [ 216.515426] ? SyS_socket+0x1b0/0x1b0 [ 216.519227] do_syscall_64+0x1d5/0x640 [ 216.523118] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 216.528425] RIP: 0033:0x7f47973da0f9 [ 216.532134] RSP: 002b:00007f479594c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 08:05:27 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 14) 08:05:27 executing program 1: socketpair(0x3, 0x0, 0xb88, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000240)="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", 0x41) 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, r2, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:27 executing program 5: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, r2, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) (async) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) (async) syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) (async) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, r2, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c"]}) [ 216.539840] RAX: ffffffffffffffda RBX: 00007f47974f9f80 RCX: 00007f47973da0f9 [ 216.547198] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 216.554465] RBP: 00007f479594c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.561852] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.569117] R13: 00007ffcfae63f1f R14: 00007f479594c300 R15: 0000000000022000 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, r2, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:27 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c310000000000000000"]}) 08:05:27 executing program 1: socketpair(0x3, 0x0, 0xb88, 0x0) (async, rerun: 32) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000240)="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", 0x41) (rerun: 32) 08:05:27 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1d}, 0x14) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x27}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:27 executing program 0: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40884) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000380)={@ipv4={""/10, ""/2, @multicast1}}, &(0x7f00000003c0)=0x14) r0 = socket(0xe, 0x1, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x3, @null, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000000c0)={0x8000, {{0xa, 0x4e20, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}, 0xe71}}}, 0x88) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/vmstat\x00', 0x0, 0x0) 08:05:27 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c310000000000000000"]}) 08:05:27 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1d}, 0x14) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x27}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:27 executing program 0: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) (async) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40884) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000380)={@ipv4={""/10, ""/2, @multicast1}}, &(0x7f00000003c0)=0x14) socket(0xe, 0x1, 0x0) (async) r0 = socket(0xe, 0x1, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x3, @null, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000000c0)={0x8000, {{0xa, 0x4e20, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}, 0xe71}}}, 0x88) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/vmstat\x00', 0x0, 0x0) 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, r2, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:27 executing program 1: socketpair(0x3, 0x0, 0xb88, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000240)="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", 0x41) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c310000000000000000"]}) 08:05:27 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x400c091) 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, r2, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:27 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1d}, 0x14) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x27}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1d}, 0x14) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x27}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) 08:05:27 executing program 0: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) (async, rerun: 64) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) (async, rerun: 64) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40884) (async, rerun: 32) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000380)={@ipv4={""/10, ""/2, @multicast1}}, &(0x7f00000003c0)=0x14) (async, rerun: 32) r0 = socket(0xe, 0x1, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x3, @null, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) (async) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000000c0)={0x8000, {{0xa, 0x4e20, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}, 0xe71}}}, 0x88) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/vmstat\x00', 0x0, 0x0) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f4"]}) 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, r1, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:27 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x400c091) 08:05:27 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f4"]}) 08:05:27 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=r0, r0, 0x0, 0x0, r0}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c) 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:27 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) socketpair(0x27, 0x800, 0xd8, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:27 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x400c091) socketpair(0x3, 0x0, 0xb87, 0x0) (async) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010102}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x400c091) (async) 08:05:27 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=r0, r0, 0x0, 0x0, r0}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c) 08:05:27 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, r0}, 0x10) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f4"]}) 08:05:27 executing program 1: socketpair(0x2a, 0x5, 0xb87, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x4) 08:05:27 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) socketpair(0x27, 0x800, 0xd8, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4}, 0x8) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) (async) socketpair(0x27, 0x800, 0xd8, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) 08:05:27 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=r0, r0, 0x0, 0x0, r0}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 32) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c) (rerun: 32) 08:05:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:27 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca"]}) 08:05:27 executing program 1: socketpair(0x2a, 0x5, 0xb87, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x4) (rerun: 32) 08:05:27 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:27 executing program 3: write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:27 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) (async) socketpair(0x27, 0x800, 0xd8, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:27 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca"]}) 08:05:27 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x25, 0x4}, 0x14) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, &(0x7f0000000040)=@raw=[@func, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0xfffffffa, 0x3b, &(0x7f0000000100)=""/59, 0x40f00, 0x8, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000140)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x2, 0x7ff, 0x6b7a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r1, 0xffffffffffffffff]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:28 executing program 1: socketpair(0x2a, 0x5, 0xb87, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x4) 08:05:28 executing program 3: write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:28 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:05:28 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:28 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca"]}) 08:05:28 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x25, 0x4}, 0x14) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, &(0x7f0000000040)=@raw=[@func, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0xfffffffa, 0x3b, &(0x7f0000000100)=""/59, 0x40f00, 0x8, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000140)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x2, 0x7ff, 0x6b7a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r1, 0xffffffffffffffff]}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:28 executing program 3: write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:28 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r0, r1}) socket(0x1d, 0x4, 0x6) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x40) socket(0x1, 0xa, 0x1) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3800000055e96f8b03eedbfbe16d9f09fed72da55b21ba14357f27", @ANYRES16=r2, @ANYBLOB="00042abd7000fddbdf250300000008001900ffffffff06001a004e2300000c001000000000000000000008000c0003000000"], 0x38}, 0x1, 0x0, 0x0, 0x2004000c}, 0x0) 08:05:28 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:05:28 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x25, 0x4}, 0x14) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, &(0x7f0000000040)=@raw=[@func, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0xfffffffa, 0x3b, &(0x7f0000000100)=""/59, 0x40f00, 0x8, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000140)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x2, 0x7ff, 0x6b7a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r1, 0xffffffffffffffff]}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:28 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:05:28 executing program 5: socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff", @ANYRES32=0x0]}) 08:05:28 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:28 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:05:28 executing program 2: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@private1}, 0x0, @in6=@private2}}, &(0x7f00000001c0)=0xe8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:28 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:28 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r0, r1}) (async) socket(0x1d, 0x4, 0x6) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x40) (async, rerun: 32) socket(0x1, 0xa, 0x1) (async, rerun: 32) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3800000055e96f8b03eedbfbe16d9f09fed72da55b21ba14357f27", @ANYRES16=r2, @ANYBLOB="00042abd7000fddbdf250300000008001900ffffffff06001a004e2300000c001000000000000000000008000c0003000000"], 0x38}, 0x1, 0x0, 0x0, 0x2004000c}, 0x0) 08:05:28 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) [ 217.598848] can: request_module (can-proto-6) failed. 08:05:28 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:05:28 executing program 2: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@private1}, 0x0, @in6=@private2}}, &(0x7f00000001c0)=0xe8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:28 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:28 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:28 executing program 2: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@private1}, 0x0, @in6=@private2}}, &(0x7f00000001c0)=0xe8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socket(0x11, 0xa, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@private1}, 0x0, @in6=@private2}}, &(0x7f00000001c0)=0xe8) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) 08:05:28 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:28 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) [ 217.733699] can: request_module (can-proto-6) failed. 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:05:28 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (async, rerun: 32) r0 = socket(0x11, 0xa, 0x0) (rerun: 32) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async, rerun: 32) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (rerun: 32) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r0, r1}) (async, rerun: 64) socket(0x1d, 0x4, 0x6) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x40) (async) socket(0x1, 0xa, 0x1) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3800000055e96f8b03eedbfbe16d9f09fed72da55b21ba14357f27", @ANYRES16=r2, @ANYBLOB="00042abd7000fddbdf250300000008001900ffffffff06001a004e2300000c001000000000000000000008000c0003000000"], 0x38}, 0x1, 0x0, 0x0, 0x2004000c}, 0x0) 08:05:28 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:28 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:28 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', 0x0}) 08:05:28 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@delqdisc={0x60, 0x25, 0x10, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x3, 0xffec}, {0x0, 0xf}, {0x0, 0x8}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x6, 0x6, 0xf92, 0x0, 0x5, 0x8, 0x3}}, {0xa, 0x2, [0x2f, 0x3, 0x40]}}]}]}, 0x60}}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x10100, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200), 0x4) 08:05:28 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', 0x0}) 08:05:28 executing program 0: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x80, 0x8, 0x1, 0x80000001, {{0x16, 0x4, 0x0, 0x13, 0x58, 0x67, 0x0, 0x80, 0x29, 0x0, @remote, @multicast2, {[@rr={0x7, 0x27, 0x99, [@local, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0xa, 0x3, [{0x0, 0x4, '\'%'}]}, @lsrr={0x83, 0xf, 0x73, [@empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'ip_vti0\x00', r0, 0x20, 0x8, 0x8000, 0x3, {{0xa, 0x4, 0x1, 0x3a, 0x28, 0x64, 0x0, 0x4, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0xb}, {[@end, @generic={0x82, 0x12, "29ad0badfa00de145ed6ce707bb37b3e"}]}}}}}) socket(0x11, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:05:28 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@delqdisc={0x60, 0x25, 0x10, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x3, 0xffec}, {0x0, 0xf}, {0x0, 0x8}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x6, 0x6, 0xf92, 0x0, 0x5, 0x8, 0x3}}, {0xa, 0x2, [0x2f, 0x3, 0x40]}}]}]}, 0x60}}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x10100, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@delqdisc={0x60, 0x25, 0x10, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x3, 0xffec}, {0x0, 0xf}, {0x0, 0x8}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x6, 0x6, 0xf92, 0x0, 0x5, 0x8, 0x3}}, {0xa, 0x2, [0x2f, 0x3, 0x40]}}]}]}, 0x60}}, 0x40) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x10100, 0x0) (async) socket(0x11, 0xa, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200), 0x4) (async) 08:05:28 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 217.909918] can: request_module (can-proto-6) failed. 08:05:28 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) r6 = accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @bcast, @remote, @rose, @null, @bcast, @default, @null]}, &(0x7f0000000380)=0x48) setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f00000003c0)=0xa444, 0x4) 08:05:28 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@void, @val={0x2, 0x3, 0x3, 0x800, 0xfffb, 0x1}, @ipv4=@tcp={{0xd, 0x4, 0x0, 0x0, 0x8d, 0x68, 0x0, 0x8, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1, {[@generic={0x94, 0xe, "530af6929f2598629acf18f9"}, @noop, @ra={0x94, 0x4}, @generic={0x44, 0xc, "3ea3d80ce5c3a5c2d54d"}, @noop]}}, {{0x4e22, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0xc2, 0x2, 0x0, 0x1a, {[@exp_fastopen={0xfe, 0x4}, @generic={0x17, 0xe, "c0e32d3598b651a5b0ad241a"}, @window={0x3, 0x3, 0xbd}]}}, {"5ec1f5dd440812b491d55ebfa6450bd8d501e8620f4e3311765f361a941678df3a0e0f54fbc8060262b9f88229"}}}}, 0x97) 08:05:28 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (async) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) (async) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) (async) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) r6 = accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @bcast, @remote, @rose, @null, @bcast, @default, @null]}, &(0x7f0000000380)=0x48) setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f00000003c0)=0xa444, 0x4) 08:05:28 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) r6 = accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @bcast, @remote, @rose, @null, @bcast, @default, @null]}, &(0x7f0000000380)=0x48) setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f00000003c0)=0xa444, 0x4) 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', 0x0}) 08:05:28 executing program 0: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x80, 0x8, 0x1, 0x80000001, {{0x16, 0x4, 0x0, 0x13, 0x58, 0x67, 0x0, 0x80, 0x29, 0x0, @remote, @multicast2, {[@rr={0x7, 0x27, 0x99, [@local, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0xa, 0x3, [{0x0, 0x4, '\'%'}]}, @lsrr={0x83, 0xf, 0x73, [@empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'ip_vti0\x00', r0, 0x20, 0x8, 0x8000, 0x3, {{0xa, 0x4, 0x1, 0x3a, 0x28, 0x64, 0x0, 0x4, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0xb}, {[@end, @generic={0x82, 0x12, "29ad0badfa00de145ed6ce707bb37b3e"}]}}}}}) (async) socket(0x11, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) (async, rerun: 32) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) (rerun: 32) 08:05:28 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) write$tun(r0, 0x0, 0x0) 08:05:28 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@delqdisc={0x60, 0x25, 0x10, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x3, 0xffec}, {0x0, 0xf}, {0x0, 0x8}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x6, 0x6, 0xf92, 0x0, 0x5, 0x8, 0x3}}, {0xa, 0x2, [0x2f, 0x3, 0x40]}}]}]}, 0x60}}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x10100, 0x0) (async) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200), 0x4) 08:05:28 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) r6 = accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @bcast, @remote, @rose, @null, @bcast, @default, @null]}, &(0x7f0000000380)=0x48) setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f00000003c0)=0xa444, 0x4) 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784ed40e1ecdcc4b6c3966ede737c120580a6f0f93451642e53955701e38351706f93164b68b9bacb770e0c37de64399412570e9e8dff"]}) 08:05:28 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) r6 = accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @bcast, @remote, @rose, @null, @bcast, @default, @null]}, &(0x7f0000000380)=0x48) setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f00000003c0)=0xa444, 0x4) socketpair(0x3, 0x0, 0xb87, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) (async) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) (async) socket(0x11, 0xa, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) (async) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) (async) socket(0x11, 0xa, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) (async) accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @bcast, @remote, @rose, @null, @bcast, @default, @null]}, &(0x7f0000000380)=0x48) (async) setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f00000003c0)=0xa444, 0x4) (async) 08:05:28 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) socketpair(0x27, 0x800, 0xd8, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:28 executing program 0: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x80, 0x8, 0x1, 0x80000001, {{0x16, 0x4, 0x0, 0x13, 0x58, 0x67, 0x0, 0x80, 0x29, 0x0, @remote, @multicast2, {[@rr={0x7, 0x27, 0x99, [@local, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0xa, 0x3, [{0x0, 0x4, '\'%'}]}, @lsrr={0x83, 0xf, 0x73, [@empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x80, 0x8, 0x1, 0x80000001, {{0x16, 0x4, 0x0, 0x13, 0x58, 0x67, 0x0, 0x80, 0x29, 0x0, @remote, @multicast2, {[@rr={0x7, 0x27, 0x99, [@local, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0xa, 0x3, [{0x0, 0x4, '\'%'}]}, @lsrr={0x83, 0xf, 0x73, [@empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'ip_vti0\x00', r0, 0x20, 0x8, 0x8000, 0x3, {{0xa, 0x4, 0x1, 0x3a, 0x28, 0x64, 0x0, 0x4, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0xb}, {[@end, @generic={0x82, 0x12, "29ad0badfa00de145ed6ce707bb37b3e"}]}}}}}) socket(0x11, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:05:28 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x2, 0x1}, 0x14) 08:05:28 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) r6 = accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @bcast, @remote, @rose, @null, @bcast, @default, @null]}, &(0x7f0000000380)=0x48) setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f00000003c0)=0xa444, 0x4) 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[]}) 08:05:28 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) socketpair(0x27, 0x800, 0xd8, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:28 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x5, 'syz1\x00', @default, 0x8, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x22, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 08:05:28 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x2, 0x1}, 0x14) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x2, 0x1}, 0x14) 08:05:28 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x1}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000c4}, 0x20000c03) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f8, 0x900, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc0}, 0x8800) 08:05:28 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) accept$netrom(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @rose}, [@default, @bcast, @remote, @rose, @null, @bcast, @default, @null]}, &(0x7f0000000380)=0x48) 08:05:28 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[]}) 08:05:28 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) socketpair(0x27, 0x800, 0xd8, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:29 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (async) socketpair(0x3, 0x0, 0xb87, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x5, 'syz1\x00', @default, 0x8, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x22, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[]}) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r5}) 08:05:29 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x2, 0x1}, 0x14) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x2, 0x1}, 0x14) 08:05:29 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x1}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000c4}, 0x20000c03) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f8, 0x900, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc0}, 0x8800) (async) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f8, 0x900, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc0}, 0x8800) 08:05:29 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (async) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x5, 'syz1\x00', @default, 0x8, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}) (async) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x22, 0x4) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 08:05:29 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) socketpair(0x27, 0x800, 0xd8, &(0x7f00000000c0)) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:29 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/partitions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0xe4, 0x7], 0x2, 0x80400, 0x0, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000200)=r2) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x10028, 0x3f7, 0x1, 0x70bd29, 0x25dfdbfc, {0x7, 0x10009, './file0', './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, [""]}, 0x10028}, 0x1, 0x0, 0x0, 0x4000801}, 0x4000000) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0, 0x5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:29 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) 08:05:29 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 08:05:29 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x1}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000c4}, 0x20000c03) (async) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f8, 0x900, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc0}, 0x8800) 08:05:29 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) socketpair(0x3, 0x0, 0xb87, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) (async) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:29 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x8, 0xa, 0xfffffffffffffff4, 0x4}, @alu={0x4, 0x1, 0x2, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x1, 0x8, 0xb, 0xffffffffffffffc0, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x6, 0x9}, 0x10, 0xffffffffffffffff, r1}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4}, 0x8) 08:05:29 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/partitions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0xe4, 0x7], 0x2, 0x80400, 0x0, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000200)=r2) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x10028, 0x3f7, 0x1, 0x70bd29, 0x25dfdbfc, {0x7, 0x10009, './file0', './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, [""]}, 0x10028}, 0x1, 0x0, 0x0, 0x4000801}, 0x4000000) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0, 0x5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/partitions\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0xe4, 0x7], 0x2, 0x80400}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000200)=r2) (async) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x10028, 0x3f7, 0x1, 0x70bd29, 0x25dfdbfc, {0x7, 0x10009, './file0', './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, [""]}, 0x10028}, 0x1, 0x0, 0x0, 0x4000801}, 0x4000000) (async) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0, 0x5}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x2, 0x70bd2c, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x4844) 08:05:29 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) 08:05:29 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:29 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/partitions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0xe4, 0x7], 0x2, 0x80400, 0x0, 0xffffffffffffffff}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000200)=r2) (async, rerun: 32) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x10028, 0x3f7, 0x1, 0x70bd29, 0x25dfdbfc, {0x7, 0x10009, './file0', './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, [""]}, 0x10028}, 0x1, 0x0, 0x0, 0x4000801}, 0x4000000) (rerun: 32) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0, 0x5}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:29 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x8, 0xa, 0xfffffffffffffff4, 0x4}, @alu={0x4, 0x1, 0x2, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x1, 0x8, 0xb, 0xffffffffffffffc0, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x6, 0x9}, 0x10, 0xffffffffffffffff, r1}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) 08:05:29 executing program 1: socketpair(0x5, 0x80000, 0xb87, 0x0) 08:05:29 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x8, 0xa, 0xfffffffffffffff4, 0x4}, @alu={0x4, 0x1, 0x2, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x1, 0x8, 0xb, 0xffffffffffffffc0, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x6, 0x9}, 0x10, 0xffffffffffffffff, r1}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f46645810920f59315cd0c8e0e464fb72476e6fa7afe6592858309784"]}) 08:05:29 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x8, 0xa, 0xfffffffffffffff4, 0x4}, @alu={0x4, 0x1, 0x2, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x1, 0x8, 0xb, 0xffffffffffffffc0, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x6, 0x9}, 0x10, 0xffffffffffffffff, r1}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x8, 0xa, 0xfffffffffffffff4, 0x4}, @alu={0x4, 0x1, 0x2, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x1, 0x8, 0xb, 0xffffffffffffffc0, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x6, 0x9}, 0x10, 0xffffffffffffffff, r1}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) 08:05:29 executing program 1: socketpair(0x5, 0x80000, 0xb87, 0x0) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:29 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x8, 0xa, 0xfffffffffffffff4, 0x4}, @alu={0x4, 0x1, 0x2, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x1, 0x8, 0xb, 0xffffffffffffffc0, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x6, 0x9}, 0x10, 0xffffffffffffffff, r1}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0x7b, 0xc1, 0x6, 0x60, @dev={0xfe, 0x80, '\x00', 0x27}, @private1, 0x8000, 0x8000, 0xd3e6, 0xffffffff}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x424}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) socket(0x11, 0xa, 0x0) 08:05:29 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:29 executing program 1: socketpair(0x5, 0x80000, 0xb87, 0x0) 08:05:29 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x8, 0xa, 0xfffffffffffffff4, 0x4}, @alu={0x4, 0x1, 0x2, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x1, 0x8, 0xb, 0xffffffffffffffc0, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000000140)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x6, 0x9}, 0x10, 0xffffffffffffffff, r1}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0x7b, 0xc1, 0x6, 0x60, @dev={0xfe, 0x80, '\x00', 0x27}, @private1, 0x8000, 0x8000, 0xd3e6, 0xffffffff}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x424}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c, 0x800) 08:05:29 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r0}, 0x14) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) 08:05:29 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) 08:05:29 executing program 1: socketpair(0x1e, 0x1, 0xb87, 0x0) socketpair(0x6, 0x4, 0x4, &(0x7f0000000040)) r0 = socket$kcm(0x29, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1}) 08:05:29 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0x7b, 0xc1, 0x6, 0x60, @dev={0xfe, 0x80, '\x00', 0x27}, @private1, 0x8000, 0x8000, 0xd3e6, 0xffffffff}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x424}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 08:05:29 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c2e68511f4664"]}) 08:05:29 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) socket(0x11, 0xa, 0x0) 08:05:29 executing program 1: socketpair(0x1e, 0x1, 0xb87, 0x0) socketpair(0x6, 0x4, 0x4, &(0x7f0000000040)) (async) r0 = socket$kcm(0x29, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1}) 08:05:29 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='s']}) 08:05:29 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 08:05:29 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0xa, 0x84) 08:05:29 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) 08:05:29 executing program 1: socketpair(0x1e, 0x1, 0xb87, 0x0) (async) socketpair(0x6, 0x4, 0x4, &(0x7f0000000040)) (async) r0 = socket$kcm(0x29, 0x0, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1}) 08:05:29 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:29 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='s']}) 08:05:29 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x8581cd91ce9c54a0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x6, 0x6}, 0x14) 08:05:29 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0xa, 0x84) 08:05:30 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:30 executing program 3: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:30 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='s']}) 08:05:30 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x8581cd91ce9c54a0, 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x6, 0x6}, 0x14) 08:05:30 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0xa, 0x84) 08:05:30 executing program 3: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:30 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) (async) ioctl$NBD_DO_IT(r0, 0xab03) (async, rerun: 64) socketpair(0x3, 0x0, 0xb87, 0x0) (rerun: 64) 08:05:30 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000"]}) 08:05:30 executing program 3: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:30 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x7, 0x5, 0x2a}) 08:05:30 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x8581cd91ce9c54a0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x6, 0x6}, 0x14) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r0, 0x0, 0x0, 0x8581cd91ce9c54a0, 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x6, 0x6}, 0x14) (async) 08:05:30 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) (async) ioctl$NBD_DO_IT(r0, 0xab03) (async) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:30 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000"]}) 08:05:30 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:30 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x7, 0x5, 0x2a}) 08:05:30 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000"]}) 08:05:30 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000680)={@in6={{0xa, 0x4e20, 0x7ff, @mcast1, 0xfffff800}}, 0x0, 0x0, 0x4f, 0x0, "41f0305bdc836c0e4cdc799a4f5aee3593f72ab06398bdc6c85e1ecf79d95f1502924a011aba6f1d464a31a517dc99df044ae19c77bb21321398b2f4ebf3ce55949a6026d1d57d70c5a72596836c70a3"}, 0xd8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x27}, 0x14) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x4e20, @private=0xa010102}}, 0x0, 0x0, 0xd, 0x0, "d93e09265996c4b74abf5ba0a6bfb0508937ffc5728b293e30a72b04554b5eec8c4fe460c14e0a567c404228d94c66356435cc7733f2079d9e94987f08d86db15e8c0ffb03bce5d51734385e58e2bb09"}, 0xd8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x560, 0x490, 0xd0, 0x1c0, 0xd0, 0x2b0, 0x490, 0x490, 0x490, 0x490, 0x490, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x3, 0x2, 0x5}}}}, {{@ipv6={@remote, @remote, [0xff, 0xff, 0xffffffff, 0xffffffff], [0xff, 0xffffff00, 0xff000000, 0xffffff00], 'team_slave_1\x00', 'batadv_slave_0\x00', {}, {}, 0x32, 0x0, 0x3, 0x30}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@rand_addr=0x64010102, @ipv4=@multicast2, 0x6, 0x16, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv4=@private=0xa010102, 0xe, 0x14, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0, 0x40, 0x20, 0x2}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x29}, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3f, 0x24, 0x4}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c0) 08:05:30 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:30 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000037c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000002700)=""/4096, 0x1000, 0x0, &(0x7f0000003700)=""/169, 0xa9}, &(0x7f0000003800)=0x40) socketpair(0x3, 0x0, 0xb87, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000003840)='/proc/consoles\x00', 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000003940)={&(0x7f0000003880), 0xc, &(0x7f0000003900)={&(0x7f00000038c0)={0x10, 0x3f5, 0x1, 0x70bd2a, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002680)={&(0x7f0000000080)=@newchain={0x25f8, 0x64, 0x4, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x6, 0xf}, {0x2, 0xe}, {0x7, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x223c, 0x2, [@TCA_CGROUP_POLICE={0x30, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x40}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}]}, @TCA_CGROUP_EMATCHES={0x198, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x2}, {0x1, 0x5, 0x2}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x3, 0x3, 0xff}, {0x5, 0xa066, 0x0, 0xfffffffe}}}]}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x20, 0x8, 0x3}, {0x0, 0x3}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x1f, 0x3, 0x8}, {0x8, 0xfffffffd, 0x400, 0x6aac}}}]}, @TCA_EMATCH_TREE_LIST={0x11c, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4}, {{0x0, 0x1, 0x1}, {0x0, 0x1}}}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x5, 0x8, 0x1}, {0x1, 0x0, 0x1}}}, @TCF_EM_META={0xc8, 0x3, 0x0, 0x0, {{0x9, 0x4, 0xe04}, [@TCA_EM_META_RVALUE={0x2b, 0x3, [@TCF_META_TYPE_VAR="936e86c2fd535781", @TCF_META_TYPE_VAR="e26dc246a68d7fc045", @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="4166a4290d", @TCF_META_TYPE_VAR="89"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x8, 0x3, 0x7}, {0x400, 0xf7, 0x6}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x4, 0x1}, {0x1f, 0x2a, 0x1}}}, @TCA_EM_META_LVALUE={0x25, 0x2, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="6eae", @TCF_META_TYPE_VAR="b9c446150dbd7a", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="5c4259aa", @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_LVALUE={0x6, 0x2, [@TCF_META_TYPE_VAR="b06a"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xff}, {0x0, 0x8, 0x1}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x81, 0x38, 0x2}, {0x7ff, 0x3f, 0x1}}}, @TCA_EM_META_LVALUE={0xd, 0x2, [@TCF_META_TYPE_VAR='6', @TCF_META_TYPE_VAR="ec703960", @TCF_META_TYPE_INT=0x1]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x0, 0x3f, 0x1}, {0xfffa, 0x17}}}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x3, 0x8, 0x8001}, {0xffffffffffffffff, 0x2, 0x6}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x8, 0x3, 0x5}, {0x6, 0x400, 0x82, 0xfff}}}]}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4fd7}}]}, @TCA_CGROUP_ACT={0x1fc, 0x1, [@m_mirred={0xf0, 0x8, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x8bd, 0x1, 0xffffffff, 0x6}, 0x3, r1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0xfffffffa, 0x7, 0x8, 0x4}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0xffffffff, 0x1, 0xa38, 0x8}, 0x4}}]}, {0x61, 0x6, "bfaa2865d20a9fc183ab6e53e74e55b058ea564d62450e284c089a1b72eb5fe8eda02f0a18eafb1f24088d97843745566ad251b9a1efcbc12bac22ae5062ccf3107d52e4ea065759d5126d899191271726fc876ae9ec2e80870b507545"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x108, 0x6, 0x0, 0x0, {{0xc}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x7, 0x5, 0x3, 0x0, 0xb3e}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xf, 0xffe0}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff2}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x9, 0x1, 0x4, 0x1f3}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}]}, {0x8b, 0x6, "4c4594f371f8a54ddce1fd2d44918f75c39190ff48e05c918cc58c31bc0b220cb6fed963c9ebae1ae0b7a921faf8d4187af24faae1406f8a7ae949877175f9d6bc3c6bbbe455a9f4bd47fe60fafb1fe021a830ad1ecd0e3628db4911b1538612d0431a9f0384fde93c161288b9262ff8ea045e0118bfcd8f604918686f86a1b670a3077485bdcb"}, {0xc}, {0xc}}}]}, @TCA_CGROUP_EMATCHES={0x1c8, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3}}, @TCA_EMATCH_TREE_LIST={0x7c, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x20, 0x3, 0xff}, {0x1, 0x7fffffff, 0xfb, 0x4}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0xfff7, 0x2, 0x1ff}, {0x4, 0x1, 0x2, "ca"}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x820e, 0x1, 0x400}, {0x101, 0x10000, 0x2, 0x5, 0x9, 0x3}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x8, 0x7, 0x80}, {{0x1, 0x1, 0x1}, {0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x1, 0x3, 0x5}, {0x80000000, 0x1, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8a}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7ff}}, @TCA_EMATCH_TREE_LIST={0xb8, 0x2, 0x0, 0x1, [@TCF_EM_META={0x2c, 0x3, 0x0, 0x0, {{0x81, 0x4, 0x5}, [@TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="9996", @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR="21129a53055012c5", @TCF_META_TYPE_VAR="a7d2140d62527502dda5", @TCF_META_TYPE_VAR]}]}}, @TCF_EM_META={0x54, 0x2, 0x0, 0x0, {{0x40, 0x4, 0x87}, [@TCA_EM_META_RVALUE={0x1d, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="2f18dfb9a945d73bdb", @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x4]}, @TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="a1009b5dbaee79ad8800", @TCF_META_TYPE_VAR="b0bb32152cdf621b"]}, @TCA_EM_META_RVALUE={0xc, 0x3, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x8]}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x5ec}, {{0x4, 0x1}}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7fff, 0x7, 0x1}, {{0x1, 0x0, 0x1}, {0x2}}}}, @TCF_EM_IPT={0xc, 0x1, 0x0, 0x0, {{0x8001, 0x9, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffd}}, @TCA_EMATCH_TREE_LIST={0x68, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x3, 0x7, 0x5e}, {{0x3, 0x1, 0x0, 0x1}, {0x4, 0x0, 0x0, 0x1}}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x7}, {0x0, 0x3, 0x1, "0319cc"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x1, 0x1, 0xcb65}, {0x7, 0x10001, 0xf7e3, 0x2, 0x7, 0x0, 0x1}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x8000, 0x8, 0x401}, {0x3, 0x1, 0x3}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7, 0x7, 0x2}, {{0x1, 0x0, 0x0, 0x1}, {0x1, 0x1, 0x1, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3ff}}]}, @TCA_CGROUP_POLICE={0x408, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x3c77, 0x0, 0x80000001, 0x3, 0x80, 0x6, 0xe3, 0x100, 0x6, 0xfffffffb, 0x4, 0xa69a, 0x6, 0x4, 0xbe, 0x6, 0x10000, 0x6, 0x8001, 0x4, 0x80000000, 0xb0d5, 0x9, 0x8, 0x8, 0xf1, 0x5, 0x3, 0x2, 0x4, 0x7, 0x2, 0x4, 0x1, 0x6, 0x6, 0x5e, 0x401, 0x6, 0x0, 0xfffffff8, 0x6, 0x44252700, 0x6a3dd426, 0x800, 0x9, 0x6, 0xb4c485a, 0x4, 0x200, 0x81, 0x0, 0xfff, 0x9, 0x2, 0x80000001, 0x6, 0x3, 0x80000000, 0x7, 0x3b, 0x1, 0x40, 0x9, 0xfffffff9, 0xc7, 0x3, 0xff, 0x80000000, 0x2, 0x6, 0x1931, 0x3, 0x20, 0x4, 0x7f, 0x1, 0x20, 0x200, 0x9, 0x7, 0x7fffffff, 0xda7, 0xd9, 0x800, 0x80000001, 0x3, 0x5, 0x2, 0x1, 0xffffff01, 0x3, 0x7, 0x8, 0xfff, 0x2a1, 0x8, 0x0, 0x0, 0x9, 0xbe8, 0x7, 0x1, 0x9, 0xe43e, 0x7, 0xfff, 0x7ff, 0x80000000, 0x3, 0x2, 0x100, 0x7, 0x8, 0x5, 0x31, 0x8001, 0x7, 0x8, 0x2ab2, 0x3, 0x4, 0xff, 0xab4, 0x8, 0x0, 0x9, 0x0, 0x10001, 0xfffffff8, 0x6, 0x4, 0x1200, 0x8, 0xd7, 0x7, 0x10000, 0x2, 0x800, 0x6, 0x10001, 0x6, 0x2, 0x0, 0x3, 0x5, 0x101, 0x1, 0x800, 0x4, 0x2, 0x6, 0x7, 0x1000, 0x10000, 0x8001, 0x309, 0x7, 0x3, 0x7, 0xfffffff7, 0x5, 0x9, 0x2, 0x40, 0x3ff, 0x5, 0x4, 0x6, 0x0, 0x3, 0x6, 0x81, 0x1, 0x1000, 0x401, 0x1, 0xf7f, 0x3f, 0x80, 0xcf32, 0x5, 0x80, 0x0, 0x6c77, 0x7, 0x200, 0x7, 0x5, 0x10000, 0x6, 0x2, 0x150, 0x7fff, 0x0, 0x92b, 0x4, 0x6, 0x5, 0x9, 0x6, 0x0, 0x1, 0x200, 0x1fffe, 0x20, 0x200, 0xf77, 0x1, 0x4, 0x8001, 0x4, 0x4, 0x1, 0x6, 0x3, 0x3, 0x400, 0x7, 0x9, 0xd1, 0x5, 0x7, 0x9, 0x6, 0x5, 0x80000000, 0x24b, 0x3, 0x3, 0x1, 0x40000000, 0x757, 0x7, 0xffff, 0x7, 0x400, 0x4, 0x7, 0x3, 0x0, 0xc9, 0x0, 0x16f, 0x0, 0xa57, 0x8, 0x9, 0x9, 0x0, 0x80000001, 0xbd0, 0x10001, 0xc81, 0x8]}]}, @TCA_CGROUP_ACT={0x530, 0x1, [@m_vlan={0x14c, 0x16, 0x0, 0x0, {{0x9}, {0x24, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x9a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x2e1}]}, {0xfd, 0x6, "42b153f4f26c185e860aba8a7186700ca38503595fca14b63ea181ceccd17fe01d72bbb7846e0d50f87a029b355d14997994da042eed331a717bed2d030576ffb1ae45e98b41299d7c7dfc2c7886884c70788357dd9bbc1c095530ad360bd58e834d5c8fd02bcd76343689f5d001fa8b2c91e559cf4b467fae421432b87e3b1066d263639bca41a7766ac32c98dc9e557cd5c82b694bf80a8b04663281e024cc12aef362b269a18ef06d230025ea22830dfcd2415841fb449a53bc00e896fad643f22558fc61ed87c2e003ad58287643fdcbd732da0de13e24c64f033244ad40f8f2665ac1bda919c4b5d844d849b301aab3034bfa472203bd"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_gact={0x1e4, 0x4, 0x0, 0x0, {{0x9}, {0xc4, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1eb1, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0x0, 0x1, 0x2, 0x3f}}, @TCA_GACT_PARMS={0x18, 0x2, {0x3, 0x800, 0x7, 0x2, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x73a, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1, 0x3, 0x20000000, 0x10001, 0x619b}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1807, 0x1}}, @TCA_GACT_PARMS={0x18, 0x2, {0xa5, 0x0, 0x20000000, 0x1, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x98, 0x3, 0x8, 0x1f}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1199, 0x10000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0xfff, 0xfffffffe, 0x4, 0x4, 0x6}}]}, {0xf8, 0x6, "46e7bb5b7d742389757f177ac95c3c382534ff9778fb97116bcfcb1ce0819cb3d95827e547c69e72b711f2f03348f2361ee725f42b976e175ce678141670744b4043ffc4bd416473415056ab0da631e64347f248044811f71910c3fb2f8bfdd2ab6f0761536422141e5cd0045cc326043455c701e8f45e464de4871e7e589ac37d5dc8ac04aa37ba0624ced8f883a9e654a6c412752d321b3f8af93c09e3e7adfb271ca8700cfc1e083c758c6d575b70079aaca9a837ced708a1bda11c1804399f92ee258c47f24b912854cd4812b671d95008b735165bc25ca26d2c80655af768446f32667e7663a256c4bcb50d60d8cc29d261"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ipt={0x1fc, 0x14, 0x0, 0x0, {{0x8}, {0x168, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x57, 0x6, {0x40, 'mangle\x00', 0x3, 0x8001, "2e3f74485a7335d43569a70b44c951a96ae52a652af1a3e12187cbac36c4b2b1fad985087f1ab70b13ad6d55da"}}, @TCA_IPT_TARG={0xc7, 0x6, {0x0, 'security\x00', 0x8, 0xd0, "854cdd94342e86652d4efd51ccf5e2990cbfde5351bbabfd6cf2e92eb1e71dbecb3d44210ccb2b2c05fa8b8b5acdab3441618cbb7fff66e750f04f55c01f651e42f59e8434040ca256403fc8d2e6f778bf629a3589c50f4ceccfcac03dce63bb6dd936af00e0efa76603fa56ec6ddfd9dff7d78b430fbaef02f3a15909e27e9c69e301c7cdf695f9c91eaf431110f3aa1992864f3fa8a4d0de68bf2faf"}}, @TCA_IPT_INDEX={0x8, 0x3, 0xf3d}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_HOOK={0x8}]}, {0x6f, 0x6, "5816966f63cf3e5a75e55a403c08cd16a554dacd94e5e9c8dde34821594d273112534e64bb52dd401345e550718d4e3bb39c8da35c7781d61f1074cfb98900e95685b2e67883fc7b5922b2fc9b665a38450af809810b1e97517f693ed1662b7e07922b65fc248769fe142f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_CGROUP_EMATCHES={0x15c, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x150, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x6, 0x2, 0x401}, {0x7, 0x5, 0x1, "d3b360b82a"}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x4, 0x1, 0x8}, {0x6, 0x7, 0xfffa, 0x3, 0x2, 0x2}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x2, 0x7, 0x660c}, {{0x1, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x4, 0x3, 0x3}, {0x8, 0x8000, 0xed, 0x7ff}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xc84, 0x1, 0x7}, {0xffff, 0x17e, 0xf9a, 0x4, 0x5, 0x2, 0x2}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x7, 0x1, 0x8}, {0xfff, 0x9, 0xcd8, 0xe, 0xf, 0x1}}}, @TCF_EM_CONTAINER={0xac, 0x1, 0x0, 0x0, {{0x7, 0x0, 0x4}, "63998f0828801fcf9016b509a1016bb62726b7f0f24c32c53250fd6dc6a78bd79909bb4110a4afb57aac60602c057d428e4728092d3c40f0a58c262558e9e7bef6560e43a8b2723276989f9f644c26c4d1136779595a521057f50e44f45aa72d4b7da6a4841b5a76943d77cace962b0a89ab20107b19b473585274cd98fb484b7abba46039a6be8cc0d6e3e516e9924a74cd60355a9434bf89e2142292bb78"}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x8, 0x8, 0x8}, {0x4, 0x5, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffd}}]}, @TCA_CGROUP_EMATCHES={0xcc, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xb8, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x9}, {0x5, 0x7, 0x1, "b476fdc518fee8"}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x7, 0x3, 0x6b6}, {0x331, 0x1, 0x9, 0x1}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x7, 0x1, 0x1}, {0xbddb, 0x3, 0x4, 0x6, 0x5}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x8}, {0xffffffffffffffff, 0x4, 0x1}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xf801, 0x1, 0xfffe}, {0x80000001, 0x10000, 0x4, 0x0, 0x5}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x1, 0x1, 0x401}, {0x4, 0x1, 0xfffa, 0x0, 0x1, 0x2, 0x1}}}, @TCF_EM_META={0x28, 0x1, 0x0, 0x0, {{0x2, 0x4, 0x38}, [@TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="cc", @TCF_META_TYPE_VAR="f0fcf19160a8e1", @TCF_META_TYPE_VAR="3def5e9dc3e6b7d2", @TCF_META_TYPE_VAR="b0ad"]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x14}}]}, @TCA_CGROUP_POLICE={0x102c, 0x2, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x6, 0x1f, 0x4, 0x7f, 0x296, 0x1, 0x2, 0xffffffff, 0x3, 0x4b, 0xfffffffd, 0xfffffff7, 0x1, 0x7b0, 0x2, 0x6, 0xe6, 0x8, 0x9346, 0x4, 0x8000, 0x9, 0x4, 0xffffff52, 0x0, 0x8, 0x5, 0xf374, 0x4, 0x81, 0x5d, 0x8, 0x1, 0x2, 0x6, 0x81, 0x5, 0xfffffffb, 0x4, 0x0, 0x8, 0x79cc8506, 0xffff, 0x3, 0x73, 0x7ff, 0x7, 0x3ff, 0x400, 0x6, 0x8, 0x8, 0x3, 0x3, 0x40, 0x7, 0xb90, 0x7fffffff, 0x4, 0x1, 0x0, 0x1, 0x2, 0x6df, 0xe, 0x4, 0xffffffff, 0x0, 0x5, 0x9ee, 0x1, 0x101, 0x8, 0x1ff, 0x2, 0x0, 0x7, 0x9a, 0xe2c, 0x6, 0xffffffff, 0x5, 0x73, 0x5, 0xf424, 0x7fffffff, 0x6, 0x7f, 0x40, 0x3, 0x7, 0x40, 0x8, 0xf5, 0x3f, 0x6f26, 0x491d2e90, 0x7, 0x4, 0x4, 0x1000, 0x2, 0x5, 0x0, 0x78b, 0xfd3, 0x101, 0x10000, 0x370480e1, 0x9, 0x1, 0x9, 0x3, 0x1, 0xde8, 0x7, 0x100, 0x80, 0x3, 0x9, 0x5, 0x3, 0x4, 0x5, 0x7, 0x1, 0x0, 0x3f, 0x5, 0x7e6cb856, 0x7, 0xb, 0xa2a, 0x4, 0x2, 0x1, 0x5c73cd35, 0x0, 0x10001, 0x7f, 0x0, 0x5, 0x0, 0x6, 0x5, 0x9, 0x2, 0xfffffffb, 0x7fffffff, 0xfff, 0x1f, 0x15bd97d5, 0xfffffff8, 0x1, 0x82, 0x4, 0x1, 0x40, 0x9, 0x0, 0x0, 0x6, 0x55, 0x3, 0x8, 0xc555, 0x1f, 0xffff, 0x3, 0x7d, 0x1, 0xc47d, 0x1, 0xfffffffc, 0x8d4, 0x2, 0x3, 0x7fff, 0xb046, 0x1, 0x2, 0x6, 0x9, 0x2, 0x87b, 0x0, 0xe7, 0xfffffff9, 0x3, 0x3f, 0x8001, 0x10001, 0xb60a, 0x8, 0x7, 0xfffffff9, 0x3d6b, 0x0, 0x1000, 0x1, 0x0, 0xfffffff8, 0x400, 0x80, 0xd907, 0x5, 0x6, 0x3ff, 0x6, 0x9, 0x816, 0x0, 0x40, 0xe40c, 0x2, 0xfff80000, 0xfffffffd, 0xda4, 0x7, 0xbd3, 0x4, 0x6, 0x5, 0x2, 0x2, 0xff, 0x7, 0x80000001, 0x5, 0x7ce, 0x7, 0x3, 0x1, 0x4, 0x8, 0x9, 0x9, 0x5, 0x800, 0x14478fd5, 0x66, 0x5, 0x9, 0x8, 0x2, 0x101, 0x3, 0x6, 0x5, 0x81, 0x7ff, 0x0, 0xc88, 0x10000, 0x134]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8ba, 0x1, 0x8, 0xa7, 0xe55, 0x7, 0x0, 0x4, 0x3, 0x7, 0x1, 0x1, 0xfffffff9, 0x8, 0x6, 0x1ff, 0x1, 0x100, 0x8, 0x3, 0x7, 0x8, 0x20, 0xffff, 0x5, 0xfffffffe, 0x9, 0x2, 0x8001, 0x401, 0xfffff001, 0xffffffff, 0x80, 0x8, 0x101, 0x2, 0x7, 0x3, 0x7fff, 0x0, 0x4, 0x7f, 0x5, 0x4, 0x80000000, 0x10001, 0x2, 0xac7, 0x9, 0x0, 0xfff, 0xfff, 0x6, 0x7, 0x3, 0x6, 0x5, 0x3f, 0x2, 0x8, 0xffffffff, 0x8, 0x4, 0x0, 0x81, 0x4, 0x1, 0x7, 0x7f, 0x5, 0x4, 0x8000, 0x3, 0x40, 0x7ff, 0x4, 0x2, 0x85, 0xffff, 0x0, 0x1000, 0x9, 0x8000, 0x3, 0x8000, 0x9, 0x3, 0x40, 0x8, 0x400, 0x7, 0xffffff01, 0x4, 0x6, 0x8, 0x2, 0x3, 0x7fff, 0x17, 0x84d0, 0x2, 0x80000000, 0x6, 0x9, 0x8, 0x0, 0x1, 0xffff7dfd, 0x2e2, 0x8, 0xfffffffe, 0xd52, 0x35a, 0x1, 0x1f, 0x1, 0xda, 0x8, 0x0, 0xfffff22a, 0x0, 0x8, 0x1, 0x3, 0x100, 0xfffffaf9, 0xebf, 0x3, 0x7, 0xfffffffa, 0x1, 0x80000001, 0x9, 0x20000000, 0x20, 0x8, 0x7, 0x2, 0x8, 0x84f6, 0x8001, 0x100, 0x4, 0x7, 0x401, 0x7fff, 0x7f, 0x800, 0x7, 0x387, 0x5, 0x8, 0x8, 0x9, 0xfa8aad33, 0x7, 0x2, 0x7, 0x400, 0x2, 0x7, 0x9, 0x5, 0x5, 0xbae, 0x0, 0xfffffff7, 0x0, 0x0, 0x36, 0x100, 0x2096, 0x6, 0xfffffffe, 0x6, 0x4, 0x6, 0x1ff, 0x5, 0x8, 0x5, 0xfffffff8, 0x2, 0xfffffff8, 0x2, 0xb23a, 0x0, 0x6f, 0x5, 0x9, 0x101, 0x7, 0x1f, 0x5, 0x80, 0x100, 0x1, 0x30bd, 0x6, 0x2, 0x2, 0x6, 0x9, 0xac7e, 0x40000000, 0x7988, 0x4568, 0x1, 0x5, 0x0, 0x6, 0xff, 0x8, 0xfffffc01, 0x7, 0x80, 0x200, 0x7fffffff, 0x7, 0x7fffffff, 0xfd68, 0x661e6863, 0x6fda, 0x6, 0x9, 0x3000000, 0x3, 0x3ff, 0x3ff, 0x8, 0x7, 0xffffffff, 0x1ff, 0x5, 0x5, 0x2936, 0x8, 0x7, 0x239, 0x1000, 0xe9d, 0x7, 0x80000000, 0xffe00000, 0x9c7f, 0x1c3c, 0x2, 0x3f, 0x4, 0xac3c, 0x80, 0xb4, 0x6, 0x4, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0xffffffff, 0x397, 0x81, 0x5, 0x8, 0x3, 0x7fff, 0x5b, 0xd665, 0x5a, 0x30c6, 0xff, 0x7, 0xfffffe00, 0x7, 0x2, 0x3ff, 0x1, 0x9, 0x4, 0xbda8, 0x3, 0x5, 0x5, 0x0, 0x9, 0x4, 0x40, 0xef1d, 0x5, 0x5, 0x5, 0x1000, 0x0, 0x3d66, 0x92, 0x0, 0x1, 0x9, 0x9, 0xa029, 0x835, 0x8, 0x6, 0x81, 0x4000400, 0x5e, 0x3, 0x9, 0x7ff, 0x0, 0x5, 0x8, 0x2, 0x1f, 0x8001, 0x7ff, 0x0, 0x5, 0xa3c6, 0x7ff, 0x1ff, 0x400000, 0x401, 0x9, 0x9, 0x8, 0x10001, 0xba0, 0x2, 0x4, 0x7fff, 0x7, 0x8, 0x2, 0xff, 0xfff, 0x0, 0x400, 0x1, 0x5e54f69a, 0x0, 0x200, 0x1, 0x45f4052a, 0x0, 0xecc, 0xfffffbff, 0x3, 0x7, 0x9, 0x2, 0x9, 0x3, 0x8, 0x0, 0x101, 0x1000, 0x101, 0x38, 0x8, 0xff, 0x3ebeb23b, 0x1, 0x2, 0x80000000, 0x8, 0x5, 0x200, 0x2, 0x5, 0x7, 0x6, 0x3, 0x6, 0x1, 0x2, 0x0, 0x5a, 0x4, 0x2, 0x7, 0x2, 0x1, 0x3, 0x0, 0x4, 0x3, 0x0, 0x8, 0x7fff, 0x4, 0x40, 0x3, 0x2, 0x2d4aa025, 0x1ff, 0xfffffc00, 0x0, 0x0, 0x9, 0xfffffffe, 0x6, 0x1, 0x0, 0x800000, 0x4, 0x1, 0xff, 0x80000001, 0x0, 0xd5fc, 0x5, 0x4, 0x657, 0x0, 0x4, 0x5, 0xff, 0x8, 0x4, 0x2, 0x400, 0x2, 0xc06, 0x1, 0x0, 0x3ff, 0x101, 0x80000001, 0x0, 0x4cffd746, 0x5, 0x81, 0x7, 0x9, 0x0, 0x2, 0x8, 0x8000, 0x1, 0x2, 0x80000000, 0x1, 0xff, 0x3f, 0x3f, 0xff, 0x9, 0xa4d6, 0x20, 0x8000, 0x6e2e, 0x1, 0x5, 0x20, 0x4, 0x4, 0x8, 0x80000001, 0x80000000, 0x3, 0x6, 0x5, 0x81, 0x8000, 0xdf9, 0x3, 0x85, 0xb467, 0x0, 0x2, 0x6, 0x96, 0x0, 0x7, 0x5, 0x8, 0x0, 0x8d9, 0x6, 0x5, 0x3f, 0x0, 0x80, 0x400, 0x20, 0x1000, 0x0, 0x3, 0x8, 0x7, 0x1, 0x0, 0x400, 0x6, 0xede, 0x80000001, 0x0, 0x3, 0x8, 0x400, 0xfffffffd, 0x5, 0x0, 0x2efd, 0x1, 0x81, 0x7fffffff, 0x81, 0xfffffff7, 0x9, 0xfb76, 0x9, 0x23a, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x9, 0x7, 0x0, 0x7a, 0x7, 0x45, 0x4, 0x9, 0xfffffc01, 0x7, 0x8, 0x200, 0x1, 0x3, 0x200, 0x6, 0x4, 0xffffff00, 0x80000000, 0x80000000, 0x4, 0x0, 0x3, 0x2, 0x0, 0xffffccfe, 0x200, 0x283a, 0x37, 0xffff14ab, 0x7, 0x4, 0x20, 0x80, 0x40, 0x1ff, 0x7e8, 0xffff, 0xffffffff, 0x0, 0x9, 0x0, 0x4, 0x200, 0x0, 0x43, 0x400, 0x2, 0x8, 0x9, 0x80, 0x0, 0x2d1f, 0x8001, 0x3ff, 0x5d, 0x4, 0x10000, 0x6, 0x2, 0x1, 0x315da364, 0x4, 0x8, 0xd136, 0xd7f5, 0x6, 0x7, 0x1, 0x7fff, 0x66, 0xe000000, 0x0, 0xffff, 0x4, 0x4, 0x70, 0x8, 0xd79, 0x8, 0x7, 0x6, 0x5, 0x1, 0x1, 0x6, 0x3, 0xffffffc1, 0x6, 0xfffffff8, 0x0, 0x40, 0x400, 0x0, 0x1ff, 0x4, 0x380, 0x2, 0x2, 0x9a76, 0xff, 0x40, 0x9, 0x2, 0x0, 0x7, 0xbd, 0x2, 0x3a814ecb, 0x5, 0x1, 0x101, 0x0, 0x2, 0x4577, 0x7fffffff, 0xc8, 0x1, 0x400, 0x1, 0x10000, 0x7, 0x9, 0x5, 0x80, 0x200, 0x3925ecf4, 0x10000, 0x2, 0xffffff80, 0xcc1, 0x0, 0xc000, 0xb9d, 0x9, 0x10000, 0x6, 0x3, 0x0, 0xf, 0x10001, 0x10000, 0x5, 0x4982, 0x1, 0x3, 0x5, 0x20, 0x5, 0x7ff, 0x7fffffff, 0x8, 0x0, 0x0, 0x9, 0x6, 0x7, 0x1ff, 0x4a, 0x6, 0x3, 0x2, 0x400, 0x200000, 0x3, 0x1, 0x401, 0xfff, 0x6, 0x10001, 0x7fffffff, 0x7f, 0x7, 0x8, 0x9, 0x40, 0x5, 0x4, 0x6, 0x5, 0x4, 0xe33, 0x6, 0x3, 0x5b9e, 0x101, 0x6, 0x3ff, 0x0, 0x6, 0xfffffffa, 0x1, 0x800, 0x0, 0x1f, 0x80000000, 0x2, 0x5, 0x8, 0x4, 0x1000000, 0x48f6f8da, 0x7, 0x7, 0x5, 0xfffffff9, 0x10001, 0x8, 0x822f, 0x200, 0x8000, 0x8001, 0xeb9e, 0x11b, 0x2, 0x7, 0xff, 0x6e3f, 0x1, 0x7, 0x1, 0x6, 0x9e5, 0x9, 0x6, 0xc, 0x9, 0x4, 0x8, 0x7f0, 0xebb7, 0x30e7c820, 0x7, 0x8, 0x7fffffff, 0x2, 0xfffffffa, 0x4, 0x2, 0x5, 0x8000, 0xfffffff8, 0x0, 0x1, 0x9, 0x2, 0x5, 0x2, 0x3, 0x7, 0x10001, 0xff, 0x60, 0x5, 0x10000]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x80000000}]}, @TCA_CGROUP_ACT={0x120, 0x1, [@m_tunnel_key={0x11c, 0xb, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x1f, 0x2, 0x20000000, 0x8, 0x4a}, 0x2}}]}, {0xc8, 0x6, "ed59a64df2216ac2a8dbee0fcbc580b55b6235d8dfe85df4f9b6027a10535ec399a0b34b5d15bfe5075dc3d64a71072ffc2ef44c6c0cd86a289cfb3b3becfcbb52161963ccdbff91cfe2d6020b702a126db8ece7b2ba0959b873742c513fe3ce3e49e1c971fb4983880fe696b156c2b251fec0c23329aba4ebdccf55e2add255ff8923e07778ff4a52510b81d421b7414301af867c3f1bee7bf2e57975902083db335a3fe807be8b01fb4cfb03bd2e2e0ccfc0cc2848eb12c096faeb404bd1847728cde4"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x3f, 0x2}}, @filter_kind_options=@f_rsvp={{0x9}, {0x378, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @broadcast}, @TCA_RSVP_SRC={0x8, 0x3, @multicast1}, @TCA_RSVP_ACT={0x258, 0x6, [@m_ipt={0x254, 0x14, 0x0, 0x0, {{0x8}, {0x164, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_TARG={0x51, 0x6, {0x1ff, 'mangle\x00', 0x3f, 0x6, "2eeb5bf5d9810b3f19a18f44ef442b08797be53477add956cb7810f015501868bfd39950ecb50e"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TARG={0x78, 0x6, {0x400, 'mangle\x00', 0x2, 0xfff, "87087629e55598b41d1cf97f5349514414f1b0ded3f0ac324a1b5ac749a9e036451b8e3e18553e264494ab8355b41f68029696fd35e7cebe657b00ef03623189677bce513658c3a3be8414e52f9e"}}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}]}, {0xcc, 0x6, "e9ebabf23ef7a706210004b8a10d59bf858b88af0755000dcd21c5ef713fbaa7d6715a59cf91c2440219055ab4ac8326921cbcba5248373e1881a28c90c748f3baa1707a1860dd0c0e476bfe18f7b00b115542ad414edd142eeff5d222332799189cffa66720bbdad1cec42208722fd51202adbac1e33bd9e4ccfb81acc483e6b2a971653a1b1f512a4f0dde4fca8e21e3f6da01230becb1e0241b27184db1656dae838580c21b7f852dbc0557ee8e42bc763f23e57bd9485af8249f797d8e174203dc5837dbc648"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}, @TCA_RSVP_ACT={0x10c, 0x6, [@m_vlan={0x108, 0x1e, 0x0, 0x0, {{0x9}, {0x3c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0xa4, 0x6, "ded5f2dcde73baa173034873f2e03d8dec410a9e99efff6aaf2c1716840e377e92e53a74f96de5c357dfd1f6dbbf52430f93a3eb9d6b378478593a69d3294c9961fd986945135017b95aa0015b90fb8bbc39279376961334e84400565544a49cf7bf35a94e6c00e1aa3bf19dc64a7052814a79212d17ffe65923eca31182010af66994053575709191719302c3eb74d9c04f7867153944f1069ba97fc505f8ff"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}]}, 0x25f8}, 0x1, 0x0, 0x0, 0x8000}, 0x40400d0) 08:05:30 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x7, 0x5, 0x2a}) 08:05:30 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca6c"]}) 08:05:30 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:30 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000037c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000002700)=""/4096, 0x1000, 0x0, &(0x7f0000003700)=""/169, 0xa9}, &(0x7f0000003800)=0x40) (async, rerun: 64) socketpair(0x3, 0x0, 0xb87, 0x0) (rerun: 64) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000003840)='/proc/consoles\x00', 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000003940)={&(0x7f0000003880), 0xc, &(0x7f0000003900)={&(0x7f00000038c0)={0x10, 0x3f5, 0x1, 0x70bd2a, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002680)={&(0x7f0000000080)=@newchain={0x25f8, 0x64, 0x4, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x6, 0xf}, {0x2, 0xe}, {0x7, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x223c, 0x2, [@TCA_CGROUP_POLICE={0x30, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x40}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}]}, @TCA_CGROUP_EMATCHES={0x198, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x2}, {0x1, 0x5, 0x2}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x3, 0x3, 0xff}, {0x5, 0xa066, 0x0, 0xfffffffe}}}]}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x20, 0x8, 0x3}, {0x0, 0x3}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x1f, 0x3, 0x8}, {0x8, 0xfffffffd, 0x400, 0x6aac}}}]}, @TCA_EMATCH_TREE_LIST={0x11c, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4}, {{0x0, 0x1, 0x1}, {0x0, 0x1}}}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x5, 0x8, 0x1}, {0x1, 0x0, 0x1}}}, @TCF_EM_META={0xc8, 0x3, 0x0, 0x0, {{0x9, 0x4, 0xe04}, [@TCA_EM_META_RVALUE={0x2b, 0x3, [@TCF_META_TYPE_VAR="936e86c2fd535781", @TCF_META_TYPE_VAR="e26dc246a68d7fc045", @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="4166a4290d", @TCF_META_TYPE_VAR="89"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x8, 0x3, 0x7}, {0x400, 0xf7, 0x6}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x4, 0x1}, {0x1f, 0x2a, 0x1}}}, @TCA_EM_META_LVALUE={0x25, 0x2, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="6eae", @TCF_META_TYPE_VAR="b9c446150dbd7a", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="5c4259aa", @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_LVALUE={0x6, 0x2, [@TCF_META_TYPE_VAR="b06a"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xff}, {0x0, 0x8, 0x1}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x81, 0x38, 0x2}, {0x7ff, 0x3f, 0x1}}}, @TCA_EM_META_LVALUE={0xd, 0x2, [@TCF_META_TYPE_VAR='6', @TCF_META_TYPE_VAR="ec703960", @TCF_META_TYPE_INT=0x1]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x0, 0x3f, 0x1}, {0xfffa, 0x17}}}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x3, 0x8, 0x8001}, {0xffffffffffffffff, 0x2, 0x6}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x8, 0x3, 0x5}, {0x6, 0x400, 0x82, 0xfff}}}]}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4fd7}}]}, @TCA_CGROUP_ACT={0x1fc, 0x1, [@m_mirred={0xf0, 0x8, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x8bd, 0x1, 0xffffffff, 0x6}, 0x3, r1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0xfffffffa, 0x7, 0x8, 0x4}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0xffffffff, 0x1, 0xa38, 0x8}, 0x4}}]}, {0x61, 0x6, "bfaa2865d20a9fc183ab6e53e74e55b058ea564d62450e284c089a1b72eb5fe8eda02f0a18eafb1f24088d97843745566ad251b9a1efcbc12bac22ae5062ccf3107d52e4ea065759d5126d899191271726fc876ae9ec2e80870b507545"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x108, 0x6, 0x0, 0x0, {{0xc}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x7, 0x5, 0x3, 0x0, 0xb3e}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xf, 0xffe0}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff2}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x9, 0x1, 0x4, 0x1f3}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}]}, {0x8b, 0x6, "4c4594f371f8a54ddce1fd2d44918f75c39190ff48e05c918cc58c31bc0b220cb6fed963c9ebae1ae0b7a921faf8d4187af24faae1406f8a7ae949877175f9d6bc3c6bbbe455a9f4bd47fe60fafb1fe021a830ad1ecd0e3628db4911b1538612d0431a9f0384fde93c161288b9262ff8ea045e0118bfcd8f604918686f86a1b670a3077485bdcb"}, {0xc}, {0xc}}}]}, @TCA_CGROUP_EMATCHES={0x1c8, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3}}, @TCA_EMATCH_TREE_LIST={0x7c, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x20, 0x3, 0xff}, {0x1, 0x7fffffff, 0xfb, 0x4}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0xfff7, 0x2, 0x1ff}, {0x4, 0x1, 0x2, "ca"}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x820e, 0x1, 0x400}, {0x101, 0x10000, 0x2, 0x5, 0x9, 0x3}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x8, 0x7, 0x80}, {{0x1, 0x1, 0x1}, {0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x1, 0x3, 0x5}, {0x80000000, 0x1, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8a}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7ff}}, @TCA_EMATCH_TREE_LIST={0xb8, 0x2, 0x0, 0x1, [@TCF_EM_META={0x2c, 0x3, 0x0, 0x0, {{0x81, 0x4, 0x5}, [@TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="9996", @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR="21129a53055012c5", @TCF_META_TYPE_VAR="a7d2140d62527502dda5", @TCF_META_TYPE_VAR]}]}}, @TCF_EM_META={0x54, 0x2, 0x0, 0x0, {{0x40, 0x4, 0x87}, [@TCA_EM_META_RVALUE={0x1d, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="2f18dfb9a945d73bdb", @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x4]}, @TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="a1009b5dbaee79ad8800", @TCF_META_TYPE_VAR="b0bb32152cdf621b"]}, @TCA_EM_META_RVALUE={0xc, 0x3, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x8]}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x5ec}, {{0x4, 0x1}}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7fff, 0x7, 0x1}, {{0x1, 0x0, 0x1}, {0x2}}}}, @TCF_EM_IPT={0xc, 0x1, 0x0, 0x0, {{0x8001, 0x9, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffd}}, @TCA_EMATCH_TREE_LIST={0x68, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x3, 0x7, 0x5e}, {{0x3, 0x1, 0x0, 0x1}, {0x4, 0x0, 0x0, 0x1}}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x7}, {0x0, 0x3, 0x1, "0319cc"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x1, 0x1, 0xcb65}, {0x7, 0x10001, 0xf7e3, 0x2, 0x7, 0x0, 0x1}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x8000, 0x8, 0x401}, {0x3, 0x1, 0x3}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7, 0x7, 0x2}, {{0x1, 0x0, 0x0, 0x1}, {0x1, 0x1, 0x1, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3ff}}]}, @TCA_CGROUP_POLICE={0x408, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x3c77, 0x0, 0x80000001, 0x3, 0x80, 0x6, 0xe3, 0x100, 0x6, 0xfffffffb, 0x4, 0xa69a, 0x6, 0x4, 0xbe, 0x6, 0x10000, 0x6, 0x8001, 0x4, 0x80000000, 0xb0d5, 0x9, 0x8, 0x8, 0xf1, 0x5, 0x3, 0x2, 0x4, 0x7, 0x2, 0x4, 0x1, 0x6, 0x6, 0x5e, 0x401, 0x6, 0x0, 0xfffffff8, 0x6, 0x44252700, 0x6a3dd426, 0x800, 0x9, 0x6, 0xb4c485a, 0x4, 0x200, 0x81, 0x0, 0xfff, 0x9, 0x2, 0x80000001, 0x6, 0x3, 0x80000000, 0x7, 0x3b, 0x1, 0x40, 0x9, 0xfffffff9, 0xc7, 0x3, 0xff, 0x80000000, 0x2, 0x6, 0x1931, 0x3, 0x20, 0x4, 0x7f, 0x1, 0x20, 0x200, 0x9, 0x7, 0x7fffffff, 0xda7, 0xd9, 0x800, 0x80000001, 0x3, 0x5, 0x2, 0x1, 0xffffff01, 0x3, 0x7, 0x8, 0xfff, 0x2a1, 0x8, 0x0, 0x0, 0x9, 0xbe8, 0x7, 0x1, 0x9, 0xe43e, 0x7, 0xfff, 0x7ff, 0x80000000, 0x3, 0x2, 0x100, 0x7, 0x8, 0x5, 0x31, 0x8001, 0x7, 0x8, 0x2ab2, 0x3, 0x4, 0xff, 0xab4, 0x8, 0x0, 0x9, 0x0, 0x10001, 0xfffffff8, 0x6, 0x4, 0x1200, 0x8, 0xd7, 0x7, 0x10000, 0x2, 0x800, 0x6, 0x10001, 0x6, 0x2, 0x0, 0x3, 0x5, 0x101, 0x1, 0x800, 0x4, 0x2, 0x6, 0x7, 0x1000, 0x10000, 0x8001, 0x309, 0x7, 0x3, 0x7, 0xfffffff7, 0x5, 0x9, 0x2, 0x40, 0x3ff, 0x5, 0x4, 0x6, 0x0, 0x3, 0x6, 0x81, 0x1, 0x1000, 0x401, 0x1, 0xf7f, 0x3f, 0x80, 0xcf32, 0x5, 0x80, 0x0, 0x6c77, 0x7, 0x200, 0x7, 0x5, 0x10000, 0x6, 0x2, 0x150, 0x7fff, 0x0, 0x92b, 0x4, 0x6, 0x5, 0x9, 0x6, 0x0, 0x1, 0x200, 0x1fffe, 0x20, 0x200, 0xf77, 0x1, 0x4, 0x8001, 0x4, 0x4, 0x1, 0x6, 0x3, 0x3, 0x400, 0x7, 0x9, 0xd1, 0x5, 0x7, 0x9, 0x6, 0x5, 0x80000000, 0x24b, 0x3, 0x3, 0x1, 0x40000000, 0x757, 0x7, 0xffff, 0x7, 0x400, 0x4, 0x7, 0x3, 0x0, 0xc9, 0x0, 0x16f, 0x0, 0xa57, 0x8, 0x9, 0x9, 0x0, 0x80000001, 0xbd0, 0x10001, 0xc81, 0x8]}]}, @TCA_CGROUP_ACT={0x530, 0x1, [@m_vlan={0x14c, 0x16, 0x0, 0x0, {{0x9}, {0x24, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x9a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x2e1}]}, {0xfd, 0x6, "42b153f4f26c185e860aba8a7186700ca38503595fca14b63ea181ceccd17fe01d72bbb7846e0d50f87a029b355d14997994da042eed331a717bed2d030576ffb1ae45e98b41299d7c7dfc2c7886884c70788357dd9bbc1c095530ad360bd58e834d5c8fd02bcd76343689f5d001fa8b2c91e559cf4b467fae421432b87e3b1066d263639bca41a7766ac32c98dc9e557cd5c82b694bf80a8b04663281e024cc12aef362b269a18ef06d230025ea22830dfcd2415841fb449a53bc00e896fad643f22558fc61ed87c2e003ad58287643fdcbd732da0de13e24c64f033244ad40f8f2665ac1bda919c4b5d844d849b301aab3034bfa472203bd"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_gact={0x1e4, 0x4, 0x0, 0x0, {{0x9}, {0xc4, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1eb1, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0x0, 0x1, 0x2, 0x3f}}, @TCA_GACT_PARMS={0x18, 0x2, {0x3, 0x800, 0x7, 0x2, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x73a, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1, 0x3, 0x20000000, 0x10001, 0x619b}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1807, 0x1}}, @TCA_GACT_PARMS={0x18, 0x2, {0xa5, 0x0, 0x20000000, 0x1, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x98, 0x3, 0x8, 0x1f}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1199, 0x10000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0xfff, 0xfffffffe, 0x4, 0x4, 0x6}}]}, {0xf8, 0x6, "46e7bb5b7d742389757f177ac95c3c382534ff9778fb97116bcfcb1ce0819cb3d95827e547c69e72b711f2f03348f2361ee725f42b976e175ce678141670744b4043ffc4bd416473415056ab0da631e64347f248044811f71910c3fb2f8bfdd2ab6f0761536422141e5cd0045cc326043455c701e8f45e464de4871e7e589ac37d5dc8ac04aa37ba0624ced8f883a9e654a6c412752d321b3f8af93c09e3e7adfb271ca8700cfc1e083c758c6d575b70079aaca9a837ced708a1bda11c1804399f92ee258c47f24b912854cd4812b671d95008b735165bc25ca26d2c80655af768446f32667e7663a256c4bcb50d60d8cc29d261"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ipt={0x1fc, 0x14, 0x0, 0x0, {{0x8}, {0x168, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x57, 0x6, {0x40, 'mangle\x00', 0x3, 0x8001, "2e3f74485a7335d43569a70b44c951a96ae52a652af1a3e12187cbac36c4b2b1fad985087f1ab70b13ad6d55da"}}, @TCA_IPT_TARG={0xc7, 0x6, {0x0, 'security\x00', 0x8, 0xd0, "854cdd94342e86652d4efd51ccf5e2990cbfde5351bbabfd6cf2e92eb1e71dbecb3d44210ccb2b2c05fa8b8b5acdab3441618cbb7fff66e750f04f55c01f651e42f59e8434040ca256403fc8d2e6f778bf629a3589c50f4ceccfcac03dce63bb6dd936af00e0efa76603fa56ec6ddfd9dff7d78b430fbaef02f3a15909e27e9c69e301c7cdf695f9c91eaf431110f3aa1992864f3fa8a4d0de68bf2faf"}}, @TCA_IPT_INDEX={0x8, 0x3, 0xf3d}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_HOOK={0x8}]}, {0x6f, 0x6, "5816966f63cf3e5a75e55a403c08cd16a554dacd94e5e9c8dde34821594d273112534e64bb52dd401345e550718d4e3bb39c8da35c7781d61f1074cfb98900e95685b2e67883fc7b5922b2fc9b665a38450af809810b1e97517f693ed1662b7e07922b65fc248769fe142f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_CGROUP_EMATCHES={0x15c, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x150, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x6, 0x2, 0x401}, {0x7, 0x5, 0x1, "d3b360b82a"}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x4, 0x1, 0x8}, {0x6, 0x7, 0xfffa, 0x3, 0x2, 0x2}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x2, 0x7, 0x660c}, {{0x1, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x4, 0x3, 0x3}, {0x8, 0x8000, 0xed, 0x7ff}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xc84, 0x1, 0x7}, {0xffff, 0x17e, 0xf9a, 0x4, 0x5, 0x2, 0x2}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x7, 0x1, 0x8}, {0xfff, 0x9, 0xcd8, 0xe, 0xf, 0x1}}}, @TCF_EM_CONTAINER={0xac, 0x1, 0x0, 0x0, {{0x7, 0x0, 0x4}, "63998f0828801fcf9016b509a1016bb62726b7f0f24c32c53250fd6dc6a78bd79909bb4110a4afb57aac60602c057d428e4728092d3c40f0a58c262558e9e7bef6560e43a8b2723276989f9f644c26c4d1136779595a521057f50e44f45aa72d4b7da6a4841b5a76943d77cace962b0a89ab20107b19b473585274cd98fb484b7abba46039a6be8cc0d6e3e516e9924a74cd60355a9434bf89e2142292bb78"}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x8, 0x8, 0x8}, {0x4, 0x5, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffd}}]}, @TCA_CGROUP_EMATCHES={0xcc, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xb8, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x9}, {0x5, 0x7, 0x1, "b476fdc518fee8"}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x7, 0x3, 0x6b6}, {0x331, 0x1, 0x9, 0x1}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x7, 0x1, 0x1}, {0xbddb, 0x3, 0x4, 0x6, 0x5}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x8}, {0xffffffffffffffff, 0x4, 0x1}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xf801, 0x1, 0xfffe}, {0x80000001, 0x10000, 0x4, 0x0, 0x5}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x1, 0x1, 0x401}, {0x4, 0x1, 0xfffa, 0x0, 0x1, 0x2, 0x1}}}, @TCF_EM_META={0x28, 0x1, 0x0, 0x0, {{0x2, 0x4, 0x38}, [@TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="cc", @TCF_META_TYPE_VAR="f0fcf19160a8e1", @TCF_META_TYPE_VAR="3def5e9dc3e6b7d2", @TCF_META_TYPE_VAR="b0ad"]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x14}}]}, @TCA_CGROUP_POLICE={0x102c, 0x2, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x6, 0x1f, 0x4, 0x7f, 0x296, 0x1, 0x2, 0xffffffff, 0x3, 0x4b, 0xfffffffd, 0xfffffff7, 0x1, 0x7b0, 0x2, 0x6, 0xe6, 0x8, 0x9346, 0x4, 0x8000, 0x9, 0x4, 0xffffff52, 0x0, 0x8, 0x5, 0xf374, 0x4, 0x81, 0x5d, 0x8, 0x1, 0x2, 0x6, 0x81, 0x5, 0xfffffffb, 0x4, 0x0, 0x8, 0x79cc8506, 0xffff, 0x3, 0x73, 0x7ff, 0x7, 0x3ff, 0x400, 0x6, 0x8, 0x8, 0x3, 0x3, 0x40, 0x7, 0xb90, 0x7fffffff, 0x4, 0x1, 0x0, 0x1, 0x2, 0x6df, 0xe, 0x4, 0xffffffff, 0x0, 0x5, 0x9ee, 0x1, 0x101, 0x8, 0x1ff, 0x2, 0x0, 0x7, 0x9a, 0xe2c, 0x6, 0xffffffff, 0x5, 0x73, 0x5, 0xf424, 0x7fffffff, 0x6, 0x7f, 0x40, 0x3, 0x7, 0x40, 0x8, 0xf5, 0x3f, 0x6f26, 0x491d2e90, 0x7, 0x4, 0x4, 0x1000, 0x2, 0x5, 0x0, 0x78b, 0xfd3, 0x101, 0x10000, 0x370480e1, 0x9, 0x1, 0x9, 0x3, 0x1, 0xde8, 0x7, 0x100, 0x80, 0x3, 0x9, 0x5, 0x3, 0x4, 0x5, 0x7, 0x1, 0x0, 0x3f, 0x5, 0x7e6cb856, 0x7, 0xb, 0xa2a, 0x4, 0x2, 0x1, 0x5c73cd35, 0x0, 0x10001, 0x7f, 0x0, 0x5, 0x0, 0x6, 0x5, 0x9, 0x2, 0xfffffffb, 0x7fffffff, 0xfff, 0x1f, 0x15bd97d5, 0xfffffff8, 0x1, 0x82, 0x4, 0x1, 0x40, 0x9, 0x0, 0x0, 0x6, 0x55, 0x3, 0x8, 0xc555, 0x1f, 0xffff, 0x3, 0x7d, 0x1, 0xc47d, 0x1, 0xfffffffc, 0x8d4, 0x2, 0x3, 0x7fff, 0xb046, 0x1, 0x2, 0x6, 0x9, 0x2, 0x87b, 0x0, 0xe7, 0xfffffff9, 0x3, 0x3f, 0x8001, 0x10001, 0xb60a, 0x8, 0x7, 0xfffffff9, 0x3d6b, 0x0, 0x1000, 0x1, 0x0, 0xfffffff8, 0x400, 0x80, 0xd907, 0x5, 0x6, 0x3ff, 0x6, 0x9, 0x816, 0x0, 0x40, 0xe40c, 0x2, 0xfff80000, 0xfffffffd, 0xda4, 0x7, 0xbd3, 0x4, 0x6, 0x5, 0x2, 0x2, 0xff, 0x7, 0x80000001, 0x5, 0x7ce, 0x7, 0x3, 0x1, 0x4, 0x8, 0x9, 0x9, 0x5, 0x800, 0x14478fd5, 0x66, 0x5, 0x9, 0x8, 0x2, 0x101, 0x3, 0x6, 0x5, 0x81, 0x7ff, 0x0, 0xc88, 0x10000, 0x134]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8ba, 0x1, 0x8, 0xa7, 0xe55, 0x7, 0x0, 0x4, 0x3, 0x7, 0x1, 0x1, 0xfffffff9, 0x8, 0x6, 0x1ff, 0x1, 0x100, 0x8, 0x3, 0x7, 0x8, 0x20, 0xffff, 0x5, 0xfffffffe, 0x9, 0x2, 0x8001, 0x401, 0xfffff001, 0xffffffff, 0x80, 0x8, 0x101, 0x2, 0x7, 0x3, 0x7fff, 0x0, 0x4, 0x7f, 0x5, 0x4, 0x80000000, 0x10001, 0x2, 0xac7, 0x9, 0x0, 0xfff, 0xfff, 0x6, 0x7, 0x3, 0x6, 0x5, 0x3f, 0x2, 0x8, 0xffffffff, 0x8, 0x4, 0x0, 0x81, 0x4, 0x1, 0x7, 0x7f, 0x5, 0x4, 0x8000, 0x3, 0x40, 0x7ff, 0x4, 0x2, 0x85, 0xffff, 0x0, 0x1000, 0x9, 0x8000, 0x3, 0x8000, 0x9, 0x3, 0x40, 0x8, 0x400, 0x7, 0xffffff01, 0x4, 0x6, 0x8, 0x2, 0x3, 0x7fff, 0x17, 0x84d0, 0x2, 0x80000000, 0x6, 0x9, 0x8, 0x0, 0x1, 0xffff7dfd, 0x2e2, 0x8, 0xfffffffe, 0xd52, 0x35a, 0x1, 0x1f, 0x1, 0xda, 0x8, 0x0, 0xfffff22a, 0x0, 0x8, 0x1, 0x3, 0x100, 0xfffffaf9, 0xebf, 0x3, 0x7, 0xfffffffa, 0x1, 0x80000001, 0x9, 0x20000000, 0x20, 0x8, 0x7, 0x2, 0x8, 0x84f6, 0x8001, 0x100, 0x4, 0x7, 0x401, 0x7fff, 0x7f, 0x800, 0x7, 0x387, 0x5, 0x8, 0x8, 0x9, 0xfa8aad33, 0x7, 0x2, 0x7, 0x400, 0x2, 0x7, 0x9, 0x5, 0x5, 0xbae, 0x0, 0xfffffff7, 0x0, 0x0, 0x36, 0x100, 0x2096, 0x6, 0xfffffffe, 0x6, 0x4, 0x6, 0x1ff, 0x5, 0x8, 0x5, 0xfffffff8, 0x2, 0xfffffff8, 0x2, 0xb23a, 0x0, 0x6f, 0x5, 0x9, 0x101, 0x7, 0x1f, 0x5, 0x80, 0x100, 0x1, 0x30bd, 0x6, 0x2, 0x2, 0x6, 0x9, 0xac7e, 0x40000000, 0x7988, 0x4568, 0x1, 0x5, 0x0, 0x6, 0xff, 0x8, 0xfffffc01, 0x7, 0x80, 0x200, 0x7fffffff, 0x7, 0x7fffffff, 0xfd68, 0x661e6863, 0x6fda, 0x6, 0x9, 0x3000000, 0x3, 0x3ff, 0x3ff, 0x8, 0x7, 0xffffffff, 0x1ff, 0x5, 0x5, 0x2936, 0x8, 0x7, 0x239, 0x1000, 0xe9d, 0x7, 0x80000000, 0xffe00000, 0x9c7f, 0x1c3c, 0x2, 0x3f, 0x4, 0xac3c, 0x80, 0xb4, 0x6, 0x4, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0xffffffff, 0x397, 0x81, 0x5, 0x8, 0x3, 0x7fff, 0x5b, 0xd665, 0x5a, 0x30c6, 0xff, 0x7, 0xfffffe00, 0x7, 0x2, 0x3ff, 0x1, 0x9, 0x4, 0xbda8, 0x3, 0x5, 0x5, 0x0, 0x9, 0x4, 0x40, 0xef1d, 0x5, 0x5, 0x5, 0x1000, 0x0, 0x3d66, 0x92, 0x0, 0x1, 0x9, 0x9, 0xa029, 0x835, 0x8, 0x6, 0x81, 0x4000400, 0x5e, 0x3, 0x9, 0x7ff, 0x0, 0x5, 0x8, 0x2, 0x1f, 0x8001, 0x7ff, 0x0, 0x5, 0xa3c6, 0x7ff, 0x1ff, 0x400000, 0x401, 0x9, 0x9, 0x8, 0x10001, 0xba0, 0x2, 0x4, 0x7fff, 0x7, 0x8, 0x2, 0xff, 0xfff, 0x0, 0x400, 0x1, 0x5e54f69a, 0x0, 0x200, 0x1, 0x45f4052a, 0x0, 0xecc, 0xfffffbff, 0x3, 0x7, 0x9, 0x2, 0x9, 0x3, 0x8, 0x0, 0x101, 0x1000, 0x101, 0x38, 0x8, 0xff, 0x3ebeb23b, 0x1, 0x2, 0x80000000, 0x8, 0x5, 0x200, 0x2, 0x5, 0x7, 0x6, 0x3, 0x6, 0x1, 0x2, 0x0, 0x5a, 0x4, 0x2, 0x7, 0x2, 0x1, 0x3, 0x0, 0x4, 0x3, 0x0, 0x8, 0x7fff, 0x4, 0x40, 0x3, 0x2, 0x2d4aa025, 0x1ff, 0xfffffc00, 0x0, 0x0, 0x9, 0xfffffffe, 0x6, 0x1, 0x0, 0x800000, 0x4, 0x1, 0xff, 0x80000001, 0x0, 0xd5fc, 0x5, 0x4, 0x657, 0x0, 0x4, 0x5, 0xff, 0x8, 0x4, 0x2, 0x400, 0x2, 0xc06, 0x1, 0x0, 0x3ff, 0x101, 0x80000001, 0x0, 0x4cffd746, 0x5, 0x81, 0x7, 0x9, 0x0, 0x2, 0x8, 0x8000, 0x1, 0x2, 0x80000000, 0x1, 0xff, 0x3f, 0x3f, 0xff, 0x9, 0xa4d6, 0x20, 0x8000, 0x6e2e, 0x1, 0x5, 0x20, 0x4, 0x4, 0x8, 0x80000001, 0x80000000, 0x3, 0x6, 0x5, 0x81, 0x8000, 0xdf9, 0x3, 0x85, 0xb467, 0x0, 0x2, 0x6, 0x96, 0x0, 0x7, 0x5, 0x8, 0x0, 0x8d9, 0x6, 0x5, 0x3f, 0x0, 0x80, 0x400, 0x20, 0x1000, 0x0, 0x3, 0x8, 0x7, 0x1, 0x0, 0x400, 0x6, 0xede, 0x80000001, 0x0, 0x3, 0x8, 0x400, 0xfffffffd, 0x5, 0x0, 0x2efd, 0x1, 0x81, 0x7fffffff, 0x81, 0xfffffff7, 0x9, 0xfb76, 0x9, 0x23a, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x9, 0x7, 0x0, 0x7a, 0x7, 0x45, 0x4, 0x9, 0xfffffc01, 0x7, 0x8, 0x200, 0x1, 0x3, 0x200, 0x6, 0x4, 0xffffff00, 0x80000000, 0x80000000, 0x4, 0x0, 0x3, 0x2, 0x0, 0xffffccfe, 0x200, 0x283a, 0x37, 0xffff14ab, 0x7, 0x4, 0x20, 0x80, 0x40, 0x1ff, 0x7e8, 0xffff, 0xffffffff, 0x0, 0x9, 0x0, 0x4, 0x200, 0x0, 0x43, 0x400, 0x2, 0x8, 0x9, 0x80, 0x0, 0x2d1f, 0x8001, 0x3ff, 0x5d, 0x4, 0x10000, 0x6, 0x2, 0x1, 0x315da364, 0x4, 0x8, 0xd136, 0xd7f5, 0x6, 0x7, 0x1, 0x7fff, 0x66, 0xe000000, 0x0, 0xffff, 0x4, 0x4, 0x70, 0x8, 0xd79, 0x8, 0x7, 0x6, 0x5, 0x1, 0x1, 0x6, 0x3, 0xffffffc1, 0x6, 0xfffffff8, 0x0, 0x40, 0x400, 0x0, 0x1ff, 0x4, 0x380, 0x2, 0x2, 0x9a76, 0xff, 0x40, 0x9, 0x2, 0x0, 0x7, 0xbd, 0x2, 0x3a814ecb, 0x5, 0x1, 0x101, 0x0, 0x2, 0x4577, 0x7fffffff, 0xc8, 0x1, 0x400, 0x1, 0x10000, 0x7, 0x9, 0x5, 0x80, 0x200, 0x3925ecf4, 0x10000, 0x2, 0xffffff80, 0xcc1, 0x0, 0xc000, 0xb9d, 0x9, 0x10000, 0x6, 0x3, 0x0, 0xf, 0x10001, 0x10000, 0x5, 0x4982, 0x1, 0x3, 0x5, 0x20, 0x5, 0x7ff, 0x7fffffff, 0x8, 0x0, 0x0, 0x9, 0x6, 0x7, 0x1ff, 0x4a, 0x6, 0x3, 0x2, 0x400, 0x200000, 0x3, 0x1, 0x401, 0xfff, 0x6, 0x10001, 0x7fffffff, 0x7f, 0x7, 0x8, 0x9, 0x40, 0x5, 0x4, 0x6, 0x5, 0x4, 0xe33, 0x6, 0x3, 0x5b9e, 0x101, 0x6, 0x3ff, 0x0, 0x6, 0xfffffffa, 0x1, 0x800, 0x0, 0x1f, 0x80000000, 0x2, 0x5, 0x8, 0x4, 0x1000000, 0x48f6f8da, 0x7, 0x7, 0x5, 0xfffffff9, 0x10001, 0x8, 0x822f, 0x200, 0x8000, 0x8001, 0xeb9e, 0x11b, 0x2, 0x7, 0xff, 0x6e3f, 0x1, 0x7, 0x1, 0x6, 0x9e5, 0x9, 0x6, 0xc, 0x9, 0x4, 0x8, 0x7f0, 0xebb7, 0x30e7c820, 0x7, 0x8, 0x7fffffff, 0x2, 0xfffffffa, 0x4, 0x2, 0x5, 0x8000, 0xfffffff8, 0x0, 0x1, 0x9, 0x2, 0x5, 0x2, 0x3, 0x7, 0x10001, 0xff, 0x60, 0x5, 0x10000]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x80000000}]}, @TCA_CGROUP_ACT={0x120, 0x1, [@m_tunnel_key={0x11c, 0xb, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x1f, 0x2, 0x20000000, 0x8, 0x4a}, 0x2}}]}, {0xc8, 0x6, "ed59a64df2216ac2a8dbee0fcbc580b55b6235d8dfe85df4f9b6027a10535ec399a0b34b5d15bfe5075dc3d64a71072ffc2ef44c6c0cd86a289cfb3b3becfcbb52161963ccdbff91cfe2d6020b702a126db8ece7b2ba0959b873742c513fe3ce3e49e1c971fb4983880fe696b156c2b251fec0c23329aba4ebdccf55e2add255ff8923e07778ff4a52510b81d421b7414301af867c3f1bee7bf2e57975902083db335a3fe807be8b01fb4cfb03bd2e2e0ccfc0cc2848eb12c096faeb404bd1847728cde4"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x3f, 0x2}}, @filter_kind_options=@f_rsvp={{0x9}, {0x378, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @broadcast}, @TCA_RSVP_SRC={0x8, 0x3, @multicast1}, @TCA_RSVP_ACT={0x258, 0x6, [@m_ipt={0x254, 0x14, 0x0, 0x0, {{0x8}, {0x164, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_TARG={0x51, 0x6, {0x1ff, 'mangle\x00', 0x3f, 0x6, "2eeb5bf5d9810b3f19a18f44ef442b08797be53477add956cb7810f015501868bfd39950ecb50e"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TARG={0x78, 0x6, {0x400, 'mangle\x00', 0x2, 0xfff, "87087629e55598b41d1cf97f5349514414f1b0ded3f0ac324a1b5ac749a9e036451b8e3e18553e264494ab8355b41f68029696fd35e7cebe657b00ef03623189677bce513658c3a3be8414e52f9e"}}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}]}, {0xcc, 0x6, "e9ebabf23ef7a706210004b8a10d59bf858b88af0755000dcd21c5ef713fbaa7d6715a59cf91c2440219055ab4ac8326921cbcba5248373e1881a28c90c748f3baa1707a1860dd0c0e476bfe18f7b00b115542ad414edd142eeff5d222332799189cffa66720bbdad1cec42208722fd51202adbac1e33bd9e4ccfb81acc483e6b2a971653a1b1f512a4f0dde4fca8e21e3f6da01230becb1e0241b27184db1656dae838580c21b7f852dbc0557ee8e42bc763f23e57bd9485af8249f797d8e174203dc5837dbc648"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}, @TCA_RSVP_ACT={0x10c, 0x6, [@m_vlan={0x108, 0x1e, 0x0, 0x0, {{0x9}, {0x3c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0xa4, 0x6, "ded5f2dcde73baa173034873f2e03d8dec410a9e99efff6aaf2c1716840e377e92e53a74f96de5c357dfd1f6dbbf52430f93a3eb9d6b378478593a69d3294c9961fd986945135017b95aa0015b90fb8bbc39279376961334e84400565544a49cf7bf35a94e6c00e1aa3bf19dc64a7052814a79212d17ffe65923eca31182010af66994053575709191719302c3eb74d9c04f7867153944f1069ba97fc505f8ff"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}]}, 0x25f8}, 0x1, 0x0, 0x0, 0x8000}, 0x40400d0) 08:05:30 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000680)={@in6={{0xa, 0x4e20, 0x7ff, @mcast1, 0xfffff800}}, 0x0, 0x0, 0x4f, 0x0, "41f0305bdc836c0e4cdc799a4f5aee3593f72ab06398bdc6c85e1ecf79d95f1502924a011aba6f1d464a31a517dc99df044ae19c77bb21321398b2f4ebf3ce55949a6026d1d57d70c5a72596836c70a3"}, 0xd8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x27}, 0x14) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x4e20, @private=0xa010102}}, 0x0, 0x0, 0xd, 0x0, "d93e09265996c4b74abf5ba0a6bfb0508937ffc5728b293e30a72b04554b5eec8c4fe460c14e0a567c404228d94c66356435cc7733f2079d9e94987f08d86db15e8c0ffb03bce5d51734385e58e2bb09"}, 0xd8) (async) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x560, 0x490, 0xd0, 0x1c0, 0xd0, 0x2b0, 0x490, 0x490, 0x490, 0x490, 0x490, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x3, 0x2, 0x5}}}}, {{@ipv6={@remote, @remote, [0xff, 0xff, 0xffffffff, 0xffffffff], [0xff, 0xffffff00, 0xff000000, 0xffffff00], 'team_slave_1\x00', 'batadv_slave_0\x00', {}, {}, 0x32, 0x0, 0x3, 0x30}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@rand_addr=0x64010102, @ipv4=@multicast2, 0x6, 0x16, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv4=@private=0xa010102, 0xe, 0x14, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0, 0x40, 0x20, 0x2}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x29}, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3f, 0x24, 0x4}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c0) 08:05:30 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0}, 0x10) 08:05:30 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c310000000000000000"]}) 08:05:30 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:30 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000037c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000002700)=""/4096, 0x1000, 0x0, &(0x7f0000003700)=""/169, 0xa9}, &(0x7f0000003800)=0x40) socketpair(0x3, 0x0, 0xb87, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000003840)='/proc/consoles\x00', 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000003940)={&(0x7f0000003880), 0xc, &(0x7f0000003900)={&(0x7f00000038c0)={0x10, 0x3f5, 0x1, 0x70bd2a, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002680)={&(0x7f0000000080)=@newchain={0x25f8, 0x64, 0x4, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x6, 0xf}, {0x2, 0xe}, {0x7, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x223c, 0x2, [@TCA_CGROUP_POLICE={0x30, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x40}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}]}, @TCA_CGROUP_EMATCHES={0x198, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x2}, {0x1, 0x5, 0x2}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x3, 0x3, 0xff}, {0x5, 0xa066, 0x0, 0xfffffffe}}}]}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x20, 0x8, 0x3}, {0x0, 0x3}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x1f, 0x3, 0x8}, {0x8, 0xfffffffd, 0x400, 0x6aac}}}]}, @TCA_EMATCH_TREE_LIST={0x11c, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4}, {{0x0, 0x1, 0x1}, {0x0, 0x1}}}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x5, 0x8, 0x1}, {0x1, 0x0, 0x1}}}, @TCF_EM_META={0xc8, 0x3, 0x0, 0x0, {{0x9, 0x4, 0xe04}, [@TCA_EM_META_RVALUE={0x2b, 0x3, [@TCF_META_TYPE_VAR="936e86c2fd535781", @TCF_META_TYPE_VAR="e26dc246a68d7fc045", @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="4166a4290d", @TCF_META_TYPE_VAR="89"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x8, 0x3, 0x7}, {0x400, 0xf7, 0x6}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x4, 0x1}, {0x1f, 0x2a, 0x1}}}, @TCA_EM_META_LVALUE={0x25, 0x2, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="6eae", @TCF_META_TYPE_VAR="b9c446150dbd7a", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="5c4259aa", @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_LVALUE={0x6, 0x2, [@TCF_META_TYPE_VAR="b06a"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xff}, {0x0, 0x8, 0x1}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x81, 0x38, 0x2}, {0x7ff, 0x3f, 0x1}}}, @TCA_EM_META_LVALUE={0xd, 0x2, [@TCF_META_TYPE_VAR='6', @TCF_META_TYPE_VAR="ec703960", @TCF_META_TYPE_INT=0x1]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x0, 0x3f, 0x1}, {0xfffa, 0x17}}}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x3, 0x8, 0x8001}, {0xffffffffffffffff, 0x2, 0x6}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x8, 0x3, 0x5}, {0x6, 0x400, 0x82, 0xfff}}}]}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4fd7}}]}, @TCA_CGROUP_ACT={0x1fc, 0x1, [@m_mirred={0xf0, 0x8, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x8bd, 0x1, 0xffffffff, 0x6}, 0x3, r1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0xfffffffa, 0x7, 0x8, 0x4}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0xffffffff, 0x1, 0xa38, 0x8}, 0x4}}]}, {0x61, 0x6, "bfaa2865d20a9fc183ab6e53e74e55b058ea564d62450e284c089a1b72eb5fe8eda02f0a18eafb1f24088d97843745566ad251b9a1efcbc12bac22ae5062ccf3107d52e4ea065759d5126d899191271726fc876ae9ec2e80870b507545"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x108, 0x6, 0x0, 0x0, {{0xc}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x7, 0x5, 0x3, 0x0, 0xb3e}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xf, 0xffe0}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff2}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x9, 0x1, 0x4, 0x1f3}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}]}, {0x8b, 0x6, "4c4594f371f8a54ddce1fd2d44918f75c39190ff48e05c918cc58c31bc0b220cb6fed963c9ebae1ae0b7a921faf8d4187af24faae1406f8a7ae949877175f9d6bc3c6bbbe455a9f4bd47fe60fafb1fe021a830ad1ecd0e3628db4911b1538612d0431a9f0384fde93c161288b9262ff8ea045e0118bfcd8f604918686f86a1b670a3077485bdcb"}, {0xc}, {0xc}}}]}, @TCA_CGROUP_EMATCHES={0x1c8, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3}}, @TCA_EMATCH_TREE_LIST={0x7c, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x20, 0x3, 0xff}, {0x1, 0x7fffffff, 0xfb, 0x4}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0xfff7, 0x2, 0x1ff}, {0x4, 0x1, 0x2, "ca"}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x820e, 0x1, 0x400}, {0x101, 0x10000, 0x2, 0x5, 0x9, 0x3}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x8, 0x7, 0x80}, {{0x1, 0x1, 0x1}, {0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x1, 0x3, 0x5}, {0x80000000, 0x1, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8a}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7ff}}, @TCA_EMATCH_TREE_LIST={0xb8, 0x2, 0x0, 0x1, [@TCF_EM_META={0x2c, 0x3, 0x0, 0x0, {{0x81, 0x4, 0x5}, [@TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="9996", @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR="21129a53055012c5", @TCF_META_TYPE_VAR="a7d2140d62527502dda5", @TCF_META_TYPE_VAR]}]}}, @TCF_EM_META={0x54, 0x2, 0x0, 0x0, {{0x40, 0x4, 0x87}, [@TCA_EM_META_RVALUE={0x1d, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="2f18dfb9a945d73bdb", @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x4]}, @TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="a1009b5dbaee79ad8800", @TCF_META_TYPE_VAR="b0bb32152cdf621b"]}, @TCA_EM_META_RVALUE={0xc, 0x3, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x8]}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x5ec}, {{0x4, 0x1}}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7fff, 0x7, 0x1}, {{0x1, 0x0, 0x1}, {0x2}}}}, @TCF_EM_IPT={0xc, 0x1, 0x0, 0x0, {{0x8001, 0x9, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffd}}, @TCA_EMATCH_TREE_LIST={0x68, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x3, 0x7, 0x5e}, {{0x3, 0x1, 0x0, 0x1}, {0x4, 0x0, 0x0, 0x1}}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x7}, {0x0, 0x3, 0x1, "0319cc"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x1, 0x1, 0xcb65}, {0x7, 0x10001, 0xf7e3, 0x2, 0x7, 0x0, 0x1}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x8000, 0x8, 0x401}, {0x3, 0x1, 0x3}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7, 0x7, 0x2}, {{0x1, 0x0, 0x0, 0x1}, {0x1, 0x1, 0x1, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3ff}}]}, @TCA_CGROUP_POLICE={0x408, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x3c77, 0x0, 0x80000001, 0x3, 0x80, 0x6, 0xe3, 0x100, 0x6, 0xfffffffb, 0x4, 0xa69a, 0x6, 0x4, 0xbe, 0x6, 0x10000, 0x6, 0x8001, 0x4, 0x80000000, 0xb0d5, 0x9, 0x8, 0x8, 0xf1, 0x5, 0x3, 0x2, 0x4, 0x7, 0x2, 0x4, 0x1, 0x6, 0x6, 0x5e, 0x401, 0x6, 0x0, 0xfffffff8, 0x6, 0x44252700, 0x6a3dd426, 0x800, 0x9, 0x6, 0xb4c485a, 0x4, 0x200, 0x81, 0x0, 0xfff, 0x9, 0x2, 0x80000001, 0x6, 0x3, 0x80000000, 0x7, 0x3b, 0x1, 0x40, 0x9, 0xfffffff9, 0xc7, 0x3, 0xff, 0x80000000, 0x2, 0x6, 0x1931, 0x3, 0x20, 0x4, 0x7f, 0x1, 0x20, 0x200, 0x9, 0x7, 0x7fffffff, 0xda7, 0xd9, 0x800, 0x80000001, 0x3, 0x5, 0x2, 0x1, 0xffffff01, 0x3, 0x7, 0x8, 0xfff, 0x2a1, 0x8, 0x0, 0x0, 0x9, 0xbe8, 0x7, 0x1, 0x9, 0xe43e, 0x7, 0xfff, 0x7ff, 0x80000000, 0x3, 0x2, 0x100, 0x7, 0x8, 0x5, 0x31, 0x8001, 0x7, 0x8, 0x2ab2, 0x3, 0x4, 0xff, 0xab4, 0x8, 0x0, 0x9, 0x0, 0x10001, 0xfffffff8, 0x6, 0x4, 0x1200, 0x8, 0xd7, 0x7, 0x10000, 0x2, 0x800, 0x6, 0x10001, 0x6, 0x2, 0x0, 0x3, 0x5, 0x101, 0x1, 0x800, 0x4, 0x2, 0x6, 0x7, 0x1000, 0x10000, 0x8001, 0x309, 0x7, 0x3, 0x7, 0xfffffff7, 0x5, 0x9, 0x2, 0x40, 0x3ff, 0x5, 0x4, 0x6, 0x0, 0x3, 0x6, 0x81, 0x1, 0x1000, 0x401, 0x1, 0xf7f, 0x3f, 0x80, 0xcf32, 0x5, 0x80, 0x0, 0x6c77, 0x7, 0x200, 0x7, 0x5, 0x10000, 0x6, 0x2, 0x150, 0x7fff, 0x0, 0x92b, 0x4, 0x6, 0x5, 0x9, 0x6, 0x0, 0x1, 0x200, 0x1fffe, 0x20, 0x200, 0xf77, 0x1, 0x4, 0x8001, 0x4, 0x4, 0x1, 0x6, 0x3, 0x3, 0x400, 0x7, 0x9, 0xd1, 0x5, 0x7, 0x9, 0x6, 0x5, 0x80000000, 0x24b, 0x3, 0x3, 0x1, 0x40000000, 0x757, 0x7, 0xffff, 0x7, 0x400, 0x4, 0x7, 0x3, 0x0, 0xc9, 0x0, 0x16f, 0x0, 0xa57, 0x8, 0x9, 0x9, 0x0, 0x80000001, 0xbd0, 0x10001, 0xc81, 0x8]}]}, @TCA_CGROUP_ACT={0x530, 0x1, [@m_vlan={0x14c, 0x16, 0x0, 0x0, {{0x9}, {0x24, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x9a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x2e1}]}, {0xfd, 0x6, "42b153f4f26c185e860aba8a7186700ca38503595fca14b63ea181ceccd17fe01d72bbb7846e0d50f87a029b355d14997994da042eed331a717bed2d030576ffb1ae45e98b41299d7c7dfc2c7886884c70788357dd9bbc1c095530ad360bd58e834d5c8fd02bcd76343689f5d001fa8b2c91e559cf4b467fae421432b87e3b1066d263639bca41a7766ac32c98dc9e557cd5c82b694bf80a8b04663281e024cc12aef362b269a18ef06d230025ea22830dfcd2415841fb449a53bc00e896fad643f22558fc61ed87c2e003ad58287643fdcbd732da0de13e24c64f033244ad40f8f2665ac1bda919c4b5d844d849b301aab3034bfa472203bd"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_gact={0x1e4, 0x4, 0x0, 0x0, {{0x9}, {0xc4, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1eb1, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0x0, 0x1, 0x2, 0x3f}}, @TCA_GACT_PARMS={0x18, 0x2, {0x3, 0x800, 0x7, 0x2, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x73a, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1, 0x3, 0x20000000, 0x10001, 0x619b}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1807, 0x1}}, @TCA_GACT_PARMS={0x18, 0x2, {0xa5, 0x0, 0x20000000, 0x1, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x98, 0x3, 0x8, 0x1f}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1199, 0x10000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0xfff, 0xfffffffe, 0x4, 0x4, 0x6}}]}, {0xf8, 0x6, "46e7bb5b7d742389757f177ac95c3c382534ff9778fb97116bcfcb1ce0819cb3d95827e547c69e72b711f2f03348f2361ee725f42b976e175ce678141670744b4043ffc4bd416473415056ab0da631e64347f248044811f71910c3fb2f8bfdd2ab6f0761536422141e5cd0045cc326043455c701e8f45e464de4871e7e589ac37d5dc8ac04aa37ba0624ced8f883a9e654a6c412752d321b3f8af93c09e3e7adfb271ca8700cfc1e083c758c6d575b70079aaca9a837ced708a1bda11c1804399f92ee258c47f24b912854cd4812b671d95008b735165bc25ca26d2c80655af768446f32667e7663a256c4bcb50d60d8cc29d261"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ipt={0x1fc, 0x14, 0x0, 0x0, {{0x8}, {0x168, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x57, 0x6, {0x40, 'mangle\x00', 0x3, 0x8001, "2e3f74485a7335d43569a70b44c951a96ae52a652af1a3e12187cbac36c4b2b1fad985087f1ab70b13ad6d55da"}}, @TCA_IPT_TARG={0xc7, 0x6, {0x0, 'security\x00', 0x8, 0xd0, "854cdd94342e86652d4efd51ccf5e2990cbfde5351bbabfd6cf2e92eb1e71dbecb3d44210ccb2b2c05fa8b8b5acdab3441618cbb7fff66e750f04f55c01f651e42f59e8434040ca256403fc8d2e6f778bf629a3589c50f4ceccfcac03dce63bb6dd936af00e0efa76603fa56ec6ddfd9dff7d78b430fbaef02f3a15909e27e9c69e301c7cdf695f9c91eaf431110f3aa1992864f3fa8a4d0de68bf2faf"}}, @TCA_IPT_INDEX={0x8, 0x3, 0xf3d}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_HOOK={0x8}]}, {0x6f, 0x6, "5816966f63cf3e5a75e55a403c08cd16a554dacd94e5e9c8dde34821594d273112534e64bb52dd401345e550718d4e3bb39c8da35c7781d61f1074cfb98900e95685b2e67883fc7b5922b2fc9b665a38450af809810b1e97517f693ed1662b7e07922b65fc248769fe142f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_CGROUP_EMATCHES={0x15c, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x150, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x6, 0x2, 0x401}, {0x7, 0x5, 0x1, "d3b360b82a"}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x4, 0x1, 0x8}, {0x6, 0x7, 0xfffa, 0x3, 0x2, 0x2}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x2, 0x7, 0x660c}, {{0x1, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x4, 0x3, 0x3}, {0x8, 0x8000, 0xed, 0x7ff}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xc84, 0x1, 0x7}, {0xffff, 0x17e, 0xf9a, 0x4, 0x5, 0x2, 0x2}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x7, 0x1, 0x8}, {0xfff, 0x9, 0xcd8, 0xe, 0xf, 0x1}}}, @TCF_EM_CONTAINER={0xac, 0x1, 0x0, 0x0, {{0x7, 0x0, 0x4}, "63998f0828801fcf9016b509a1016bb62726b7f0f24c32c53250fd6dc6a78bd79909bb4110a4afb57aac60602c057d428e4728092d3c40f0a58c262558e9e7bef6560e43a8b2723276989f9f644c26c4d1136779595a521057f50e44f45aa72d4b7da6a4841b5a76943d77cace962b0a89ab20107b19b473585274cd98fb484b7abba46039a6be8cc0d6e3e516e9924a74cd60355a9434bf89e2142292bb78"}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x8, 0x8, 0x8}, {0x4, 0x5, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffd}}]}, @TCA_CGROUP_EMATCHES={0xcc, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xb8, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x9}, {0x5, 0x7, 0x1, "b476fdc518fee8"}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x7, 0x3, 0x6b6}, {0x331, 0x1, 0x9, 0x1}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x7, 0x1, 0x1}, {0xbddb, 0x3, 0x4, 0x6, 0x5}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x8}, {0xffffffffffffffff, 0x4, 0x1}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xf801, 0x1, 0xfffe}, {0x80000001, 0x10000, 0x4, 0x0, 0x5}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x1, 0x1, 0x401}, {0x4, 0x1, 0xfffa, 0x0, 0x1, 0x2, 0x1}}}, @TCF_EM_META={0x28, 0x1, 0x0, 0x0, {{0x2, 0x4, 0x38}, [@TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="cc", @TCF_META_TYPE_VAR="f0fcf19160a8e1", @TCF_META_TYPE_VAR="3def5e9dc3e6b7d2", @TCF_META_TYPE_VAR="b0ad"]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x14}}]}, @TCA_CGROUP_POLICE={0x102c, 0x2, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x6, 0x1f, 0x4, 0x7f, 0x296, 0x1, 0x2, 0xffffffff, 0x3, 0x4b, 0xfffffffd, 0xfffffff7, 0x1, 0x7b0, 0x2, 0x6, 0xe6, 0x8, 0x9346, 0x4, 0x8000, 0x9, 0x4, 0xffffff52, 0x0, 0x8, 0x5, 0xf374, 0x4, 0x81, 0x5d, 0x8, 0x1, 0x2, 0x6, 0x81, 0x5, 0xfffffffb, 0x4, 0x0, 0x8, 0x79cc8506, 0xffff, 0x3, 0x73, 0x7ff, 0x7, 0x3ff, 0x400, 0x6, 0x8, 0x8, 0x3, 0x3, 0x40, 0x7, 0xb90, 0x7fffffff, 0x4, 0x1, 0x0, 0x1, 0x2, 0x6df, 0xe, 0x4, 0xffffffff, 0x0, 0x5, 0x9ee, 0x1, 0x101, 0x8, 0x1ff, 0x2, 0x0, 0x7, 0x9a, 0xe2c, 0x6, 0xffffffff, 0x5, 0x73, 0x5, 0xf424, 0x7fffffff, 0x6, 0x7f, 0x40, 0x3, 0x7, 0x40, 0x8, 0xf5, 0x3f, 0x6f26, 0x491d2e90, 0x7, 0x4, 0x4, 0x1000, 0x2, 0x5, 0x0, 0x78b, 0xfd3, 0x101, 0x10000, 0x370480e1, 0x9, 0x1, 0x9, 0x3, 0x1, 0xde8, 0x7, 0x100, 0x80, 0x3, 0x9, 0x5, 0x3, 0x4, 0x5, 0x7, 0x1, 0x0, 0x3f, 0x5, 0x7e6cb856, 0x7, 0xb, 0xa2a, 0x4, 0x2, 0x1, 0x5c73cd35, 0x0, 0x10001, 0x7f, 0x0, 0x5, 0x0, 0x6, 0x5, 0x9, 0x2, 0xfffffffb, 0x7fffffff, 0xfff, 0x1f, 0x15bd97d5, 0xfffffff8, 0x1, 0x82, 0x4, 0x1, 0x40, 0x9, 0x0, 0x0, 0x6, 0x55, 0x3, 0x8, 0xc555, 0x1f, 0xffff, 0x3, 0x7d, 0x1, 0xc47d, 0x1, 0xfffffffc, 0x8d4, 0x2, 0x3, 0x7fff, 0xb046, 0x1, 0x2, 0x6, 0x9, 0x2, 0x87b, 0x0, 0xe7, 0xfffffff9, 0x3, 0x3f, 0x8001, 0x10001, 0xb60a, 0x8, 0x7, 0xfffffff9, 0x3d6b, 0x0, 0x1000, 0x1, 0x0, 0xfffffff8, 0x400, 0x80, 0xd907, 0x5, 0x6, 0x3ff, 0x6, 0x9, 0x816, 0x0, 0x40, 0xe40c, 0x2, 0xfff80000, 0xfffffffd, 0xda4, 0x7, 0xbd3, 0x4, 0x6, 0x5, 0x2, 0x2, 0xff, 0x7, 0x80000001, 0x5, 0x7ce, 0x7, 0x3, 0x1, 0x4, 0x8, 0x9, 0x9, 0x5, 0x800, 0x14478fd5, 0x66, 0x5, 0x9, 0x8, 0x2, 0x101, 0x3, 0x6, 0x5, 0x81, 0x7ff, 0x0, 0xc88, 0x10000, 0x134]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8ba, 0x1, 0x8, 0xa7, 0xe55, 0x7, 0x0, 0x4, 0x3, 0x7, 0x1, 0x1, 0xfffffff9, 0x8, 0x6, 0x1ff, 0x1, 0x100, 0x8, 0x3, 0x7, 0x8, 0x20, 0xffff, 0x5, 0xfffffffe, 0x9, 0x2, 0x8001, 0x401, 0xfffff001, 0xffffffff, 0x80, 0x8, 0x101, 0x2, 0x7, 0x3, 0x7fff, 0x0, 0x4, 0x7f, 0x5, 0x4, 0x80000000, 0x10001, 0x2, 0xac7, 0x9, 0x0, 0xfff, 0xfff, 0x6, 0x7, 0x3, 0x6, 0x5, 0x3f, 0x2, 0x8, 0xffffffff, 0x8, 0x4, 0x0, 0x81, 0x4, 0x1, 0x7, 0x7f, 0x5, 0x4, 0x8000, 0x3, 0x40, 0x7ff, 0x4, 0x2, 0x85, 0xffff, 0x0, 0x1000, 0x9, 0x8000, 0x3, 0x8000, 0x9, 0x3, 0x40, 0x8, 0x400, 0x7, 0xffffff01, 0x4, 0x6, 0x8, 0x2, 0x3, 0x7fff, 0x17, 0x84d0, 0x2, 0x80000000, 0x6, 0x9, 0x8, 0x0, 0x1, 0xffff7dfd, 0x2e2, 0x8, 0xfffffffe, 0xd52, 0x35a, 0x1, 0x1f, 0x1, 0xda, 0x8, 0x0, 0xfffff22a, 0x0, 0x8, 0x1, 0x3, 0x100, 0xfffffaf9, 0xebf, 0x3, 0x7, 0xfffffffa, 0x1, 0x80000001, 0x9, 0x20000000, 0x20, 0x8, 0x7, 0x2, 0x8, 0x84f6, 0x8001, 0x100, 0x4, 0x7, 0x401, 0x7fff, 0x7f, 0x800, 0x7, 0x387, 0x5, 0x8, 0x8, 0x9, 0xfa8aad33, 0x7, 0x2, 0x7, 0x400, 0x2, 0x7, 0x9, 0x5, 0x5, 0xbae, 0x0, 0xfffffff7, 0x0, 0x0, 0x36, 0x100, 0x2096, 0x6, 0xfffffffe, 0x6, 0x4, 0x6, 0x1ff, 0x5, 0x8, 0x5, 0xfffffff8, 0x2, 0xfffffff8, 0x2, 0xb23a, 0x0, 0x6f, 0x5, 0x9, 0x101, 0x7, 0x1f, 0x5, 0x80, 0x100, 0x1, 0x30bd, 0x6, 0x2, 0x2, 0x6, 0x9, 0xac7e, 0x40000000, 0x7988, 0x4568, 0x1, 0x5, 0x0, 0x6, 0xff, 0x8, 0xfffffc01, 0x7, 0x80, 0x200, 0x7fffffff, 0x7, 0x7fffffff, 0xfd68, 0x661e6863, 0x6fda, 0x6, 0x9, 0x3000000, 0x3, 0x3ff, 0x3ff, 0x8, 0x7, 0xffffffff, 0x1ff, 0x5, 0x5, 0x2936, 0x8, 0x7, 0x239, 0x1000, 0xe9d, 0x7, 0x80000000, 0xffe00000, 0x9c7f, 0x1c3c, 0x2, 0x3f, 0x4, 0xac3c, 0x80, 0xb4, 0x6, 0x4, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0xffffffff, 0x397, 0x81, 0x5, 0x8, 0x3, 0x7fff, 0x5b, 0xd665, 0x5a, 0x30c6, 0xff, 0x7, 0xfffffe00, 0x7, 0x2, 0x3ff, 0x1, 0x9, 0x4, 0xbda8, 0x3, 0x5, 0x5, 0x0, 0x9, 0x4, 0x40, 0xef1d, 0x5, 0x5, 0x5, 0x1000, 0x0, 0x3d66, 0x92, 0x0, 0x1, 0x9, 0x9, 0xa029, 0x835, 0x8, 0x6, 0x81, 0x4000400, 0x5e, 0x3, 0x9, 0x7ff, 0x0, 0x5, 0x8, 0x2, 0x1f, 0x8001, 0x7ff, 0x0, 0x5, 0xa3c6, 0x7ff, 0x1ff, 0x400000, 0x401, 0x9, 0x9, 0x8, 0x10001, 0xba0, 0x2, 0x4, 0x7fff, 0x7, 0x8, 0x2, 0xff, 0xfff, 0x0, 0x400, 0x1, 0x5e54f69a, 0x0, 0x200, 0x1, 0x45f4052a, 0x0, 0xecc, 0xfffffbff, 0x3, 0x7, 0x9, 0x2, 0x9, 0x3, 0x8, 0x0, 0x101, 0x1000, 0x101, 0x38, 0x8, 0xff, 0x3ebeb23b, 0x1, 0x2, 0x80000000, 0x8, 0x5, 0x200, 0x2, 0x5, 0x7, 0x6, 0x3, 0x6, 0x1, 0x2, 0x0, 0x5a, 0x4, 0x2, 0x7, 0x2, 0x1, 0x3, 0x0, 0x4, 0x3, 0x0, 0x8, 0x7fff, 0x4, 0x40, 0x3, 0x2, 0x2d4aa025, 0x1ff, 0xfffffc00, 0x0, 0x0, 0x9, 0xfffffffe, 0x6, 0x1, 0x0, 0x800000, 0x4, 0x1, 0xff, 0x80000001, 0x0, 0xd5fc, 0x5, 0x4, 0x657, 0x0, 0x4, 0x5, 0xff, 0x8, 0x4, 0x2, 0x400, 0x2, 0xc06, 0x1, 0x0, 0x3ff, 0x101, 0x80000001, 0x0, 0x4cffd746, 0x5, 0x81, 0x7, 0x9, 0x0, 0x2, 0x8, 0x8000, 0x1, 0x2, 0x80000000, 0x1, 0xff, 0x3f, 0x3f, 0xff, 0x9, 0xa4d6, 0x20, 0x8000, 0x6e2e, 0x1, 0x5, 0x20, 0x4, 0x4, 0x8, 0x80000001, 0x80000000, 0x3, 0x6, 0x5, 0x81, 0x8000, 0xdf9, 0x3, 0x85, 0xb467, 0x0, 0x2, 0x6, 0x96, 0x0, 0x7, 0x5, 0x8, 0x0, 0x8d9, 0x6, 0x5, 0x3f, 0x0, 0x80, 0x400, 0x20, 0x1000, 0x0, 0x3, 0x8, 0x7, 0x1, 0x0, 0x400, 0x6, 0xede, 0x80000001, 0x0, 0x3, 0x8, 0x400, 0xfffffffd, 0x5, 0x0, 0x2efd, 0x1, 0x81, 0x7fffffff, 0x81, 0xfffffff7, 0x9, 0xfb76, 0x9, 0x23a, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x9, 0x7, 0x0, 0x7a, 0x7, 0x45, 0x4, 0x9, 0xfffffc01, 0x7, 0x8, 0x200, 0x1, 0x3, 0x200, 0x6, 0x4, 0xffffff00, 0x80000000, 0x80000000, 0x4, 0x0, 0x3, 0x2, 0x0, 0xffffccfe, 0x200, 0x283a, 0x37, 0xffff14ab, 0x7, 0x4, 0x20, 0x80, 0x40, 0x1ff, 0x7e8, 0xffff, 0xffffffff, 0x0, 0x9, 0x0, 0x4, 0x200, 0x0, 0x43, 0x400, 0x2, 0x8, 0x9, 0x80, 0x0, 0x2d1f, 0x8001, 0x3ff, 0x5d, 0x4, 0x10000, 0x6, 0x2, 0x1, 0x315da364, 0x4, 0x8, 0xd136, 0xd7f5, 0x6, 0x7, 0x1, 0x7fff, 0x66, 0xe000000, 0x0, 0xffff, 0x4, 0x4, 0x70, 0x8, 0xd79, 0x8, 0x7, 0x6, 0x5, 0x1, 0x1, 0x6, 0x3, 0xffffffc1, 0x6, 0xfffffff8, 0x0, 0x40, 0x400, 0x0, 0x1ff, 0x4, 0x380, 0x2, 0x2, 0x9a76, 0xff, 0x40, 0x9, 0x2, 0x0, 0x7, 0xbd, 0x2, 0x3a814ecb, 0x5, 0x1, 0x101, 0x0, 0x2, 0x4577, 0x7fffffff, 0xc8, 0x1, 0x400, 0x1, 0x10000, 0x7, 0x9, 0x5, 0x80, 0x200, 0x3925ecf4, 0x10000, 0x2, 0xffffff80, 0xcc1, 0x0, 0xc000, 0xb9d, 0x9, 0x10000, 0x6, 0x3, 0x0, 0xf, 0x10001, 0x10000, 0x5, 0x4982, 0x1, 0x3, 0x5, 0x20, 0x5, 0x7ff, 0x7fffffff, 0x8, 0x0, 0x0, 0x9, 0x6, 0x7, 0x1ff, 0x4a, 0x6, 0x3, 0x2, 0x400, 0x200000, 0x3, 0x1, 0x401, 0xfff, 0x6, 0x10001, 0x7fffffff, 0x7f, 0x7, 0x8, 0x9, 0x40, 0x5, 0x4, 0x6, 0x5, 0x4, 0xe33, 0x6, 0x3, 0x5b9e, 0x101, 0x6, 0x3ff, 0x0, 0x6, 0xfffffffa, 0x1, 0x800, 0x0, 0x1f, 0x80000000, 0x2, 0x5, 0x8, 0x4, 0x1000000, 0x48f6f8da, 0x7, 0x7, 0x5, 0xfffffff9, 0x10001, 0x8, 0x822f, 0x200, 0x8000, 0x8001, 0xeb9e, 0x11b, 0x2, 0x7, 0xff, 0x6e3f, 0x1, 0x7, 0x1, 0x6, 0x9e5, 0x9, 0x6, 0xc, 0x9, 0x4, 0x8, 0x7f0, 0xebb7, 0x30e7c820, 0x7, 0x8, 0x7fffffff, 0x2, 0xfffffffa, 0x4, 0x2, 0x5, 0x8000, 0xfffffff8, 0x0, 0x1, 0x9, 0x2, 0x5, 0x2, 0x3, 0x7, 0x10001, 0xff, 0x60, 0x5, 0x10000]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x80000000}]}, @TCA_CGROUP_ACT={0x120, 0x1, [@m_tunnel_key={0x11c, 0xb, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x1f, 0x2, 0x20000000, 0x8, 0x4a}, 0x2}}]}, {0xc8, 0x6, "ed59a64df2216ac2a8dbee0fcbc580b55b6235d8dfe85df4f9b6027a10535ec399a0b34b5d15bfe5075dc3d64a71072ffc2ef44c6c0cd86a289cfb3b3becfcbb52161963ccdbff91cfe2d6020b702a126db8ece7b2ba0959b873742c513fe3ce3e49e1c971fb4983880fe696b156c2b251fec0c23329aba4ebdccf55e2add255ff8923e07778ff4a52510b81d421b7414301af867c3f1bee7bf2e57975902083db335a3fe807be8b01fb4cfb03bd2e2e0ccfc0cc2848eb12c096faeb404bd1847728cde4"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x3f, 0x2}}, @filter_kind_options=@f_rsvp={{0x9}, {0x378, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @broadcast}, @TCA_RSVP_SRC={0x8, 0x3, @multicast1}, @TCA_RSVP_ACT={0x258, 0x6, [@m_ipt={0x254, 0x14, 0x0, 0x0, {{0x8}, {0x164, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_TARG={0x51, 0x6, {0x1ff, 'mangle\x00', 0x3f, 0x6, "2eeb5bf5d9810b3f19a18f44ef442b08797be53477add956cb7810f015501868bfd39950ecb50e"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TARG={0x78, 0x6, {0x400, 'mangle\x00', 0x2, 0xfff, "87087629e55598b41d1cf97f5349514414f1b0ded3f0ac324a1b5ac749a9e036451b8e3e18553e264494ab8355b41f68029696fd35e7cebe657b00ef03623189677bce513658c3a3be8414e52f9e"}}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}]}, {0xcc, 0x6, "e9ebabf23ef7a706210004b8a10d59bf858b88af0755000dcd21c5ef713fbaa7d6715a59cf91c2440219055ab4ac8326921cbcba5248373e1881a28c90c748f3baa1707a1860dd0c0e476bfe18f7b00b115542ad414edd142eeff5d222332799189cffa66720bbdad1cec42208722fd51202adbac1e33bd9e4ccfb81acc483e6b2a971653a1b1f512a4f0dde4fca8e21e3f6da01230becb1e0241b27184db1656dae838580c21b7f852dbc0557ee8e42bc763f23e57bd9485af8249f797d8e174203dc5837dbc648"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}, @TCA_RSVP_ACT={0x10c, 0x6, [@m_vlan={0x108, 0x1e, 0x0, 0x0, {{0x9}, {0x3c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0xa4, 0x6, "ded5f2dcde73baa173034873f2e03d8dec410a9e99efff6aaf2c1716840e377e92e53a74f96de5c357dfd1f6dbbf52430f93a3eb9d6b378478593a69d3294c9961fd986945135017b95aa0015b90fb8bbc39279376961334e84400565544a49cf7bf35a94e6c00e1aa3bf19dc64a7052814a79212d17ffe65923eca31182010af66994053575709191719302c3eb74d9c04f7867153944f1069ba97fc505f8ff"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}]}, 0x25f8}, 0x1, 0x0, 0x0, 0x8000}, 0x40400d0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000037c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000002700)=""/4096, 0x1000, 0x0, &(0x7f0000003700)=""/169, 0xa9}, &(0x7f0000003800)=0x40) (async) socketpair(0x3, 0x0, 0xb87, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000003840)='/proc/consoles\x00', 0x0, 0x0) (async) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000003940)={&(0x7f0000003880), 0xc, &(0x7f0000003900)={&(0x7f00000038c0)={0x10, 0x3f5, 0x1, 0x70bd2a, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002680)={&(0x7f0000000080)=@newchain={0x25f8, 0x64, 0x4, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x6, 0xf}, {0x2, 0xe}, {0x7, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x223c, 0x2, [@TCA_CGROUP_POLICE={0x30, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x40}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}]}, @TCA_CGROUP_EMATCHES={0x198, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x2}, {0x1, 0x5, 0x2}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x3, 0x3, 0xff}, {0x5, 0xa066, 0x0, 0xfffffffe}}}]}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x20, 0x8, 0x3}, {0x0, 0x3}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x1f, 0x3, 0x8}, {0x8, 0xfffffffd, 0x400, 0x6aac}}}]}, @TCA_EMATCH_TREE_LIST={0x11c, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4}, {{0x0, 0x1, 0x1}, {0x0, 0x1}}}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x5, 0x8, 0x1}, {0x1, 0x0, 0x1}}}, @TCF_EM_META={0xc8, 0x3, 0x0, 0x0, {{0x9, 0x4, 0xe04}, [@TCA_EM_META_RVALUE={0x2b, 0x3, [@TCF_META_TYPE_VAR="936e86c2fd535781", @TCF_META_TYPE_VAR="e26dc246a68d7fc045", @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="4166a4290d", @TCF_META_TYPE_VAR="89"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x8, 0x3, 0x7}, {0x400, 0xf7, 0x6}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x4, 0x1}, {0x1f, 0x2a, 0x1}}}, @TCA_EM_META_LVALUE={0x25, 0x2, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="6eae", @TCF_META_TYPE_VAR="b9c446150dbd7a", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="5c4259aa", @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_LVALUE={0x6, 0x2, [@TCF_META_TYPE_VAR="b06a"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xff}, {0x0, 0x8, 0x1}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x81, 0x38, 0x2}, {0x7ff, 0x3f, 0x1}}}, @TCA_EM_META_LVALUE={0xd, 0x2, [@TCF_META_TYPE_VAR='6', @TCF_META_TYPE_VAR="ec703960", @TCF_META_TYPE_INT=0x1]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x0, 0x3f, 0x1}, {0xfffa, 0x17}}}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x3, 0x8, 0x8001}, {0xffffffffffffffff, 0x2, 0x6}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x8, 0x3, 0x5}, {0x6, 0x400, 0x82, 0xfff}}}]}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4fd7}}]}, @TCA_CGROUP_ACT={0x1fc, 0x1, [@m_mirred={0xf0, 0x8, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x8bd, 0x1, 0xffffffff, 0x6}, 0x3, r1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0xfffffffa, 0x7, 0x8, 0x4}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0xffffffff, 0x1, 0xa38, 0x8}, 0x4}}]}, {0x61, 0x6, "bfaa2865d20a9fc183ab6e53e74e55b058ea564d62450e284c089a1b72eb5fe8eda02f0a18eafb1f24088d97843745566ad251b9a1efcbc12bac22ae5062ccf3107d52e4ea065759d5126d899191271726fc876ae9ec2e80870b507545"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x108, 0x6, 0x0, 0x0, {{0xc}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x7, 0x5, 0x3, 0x0, 0xb3e}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xf, 0xffe0}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff2}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x9, 0x1, 0x4, 0x1f3}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}]}, {0x8b, 0x6, "4c4594f371f8a54ddce1fd2d44918f75c39190ff48e05c918cc58c31bc0b220cb6fed963c9ebae1ae0b7a921faf8d4187af24faae1406f8a7ae949877175f9d6bc3c6bbbe455a9f4bd47fe60fafb1fe021a830ad1ecd0e3628db4911b1538612d0431a9f0384fde93c161288b9262ff8ea045e0118bfcd8f604918686f86a1b670a3077485bdcb"}, {0xc}, {0xc}}}]}, @TCA_CGROUP_EMATCHES={0x1c8, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3}}, @TCA_EMATCH_TREE_LIST={0x7c, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x20, 0x3, 0xff}, {0x1, 0x7fffffff, 0xfb, 0x4}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0xfff7, 0x2, 0x1ff}, {0x4, 0x1, 0x2, "ca"}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x820e, 0x1, 0x400}, {0x101, 0x10000, 0x2, 0x5, 0x9, 0x3}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x8, 0x7, 0x80}, {{0x1, 0x1, 0x1}, {0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x1, 0x3, 0x5}, {0x80000000, 0x1, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8a}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7ff}}, @TCA_EMATCH_TREE_LIST={0xb8, 0x2, 0x0, 0x1, [@TCF_EM_META={0x2c, 0x3, 0x0, 0x0, {{0x81, 0x4, 0x5}, [@TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="9996", @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR="21129a53055012c5", @TCF_META_TYPE_VAR="a7d2140d62527502dda5", @TCF_META_TYPE_VAR]}]}}, @TCF_EM_META={0x54, 0x2, 0x0, 0x0, {{0x40, 0x4, 0x87}, [@TCA_EM_META_RVALUE={0x1d, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="2f18dfb9a945d73bdb", @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x4]}, @TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="a1009b5dbaee79ad8800", @TCF_META_TYPE_VAR="b0bb32152cdf621b"]}, @TCA_EM_META_RVALUE={0xc, 0x3, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x8]}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x5ec}, {{0x4, 0x1}}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7fff, 0x7, 0x1}, {{0x1, 0x0, 0x1}, {0x2}}}}, @TCF_EM_IPT={0xc, 0x1, 0x0, 0x0, {{0x8001, 0x9, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffd}}, @TCA_EMATCH_TREE_LIST={0x68, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x3, 0x7, 0x5e}, {{0x3, 0x1, 0x0, 0x1}, {0x4, 0x0, 0x0, 0x1}}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x7}, {0x0, 0x3, 0x1, "0319cc"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x1, 0x1, 0xcb65}, {0x7, 0x10001, 0xf7e3, 0x2, 0x7, 0x0, 0x1}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x8000, 0x8, 0x401}, {0x3, 0x1, 0x3}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7, 0x7, 0x2}, {{0x1, 0x0, 0x0, 0x1}, {0x1, 0x1, 0x1, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x3ff}}]}, @TCA_CGROUP_POLICE={0x408, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x3c77, 0x0, 0x80000001, 0x3, 0x80, 0x6, 0xe3, 0x100, 0x6, 0xfffffffb, 0x4, 0xa69a, 0x6, 0x4, 0xbe, 0x6, 0x10000, 0x6, 0x8001, 0x4, 0x80000000, 0xb0d5, 0x9, 0x8, 0x8, 0xf1, 0x5, 0x3, 0x2, 0x4, 0x7, 0x2, 0x4, 0x1, 0x6, 0x6, 0x5e, 0x401, 0x6, 0x0, 0xfffffff8, 0x6, 0x44252700, 0x6a3dd426, 0x800, 0x9, 0x6, 0xb4c485a, 0x4, 0x200, 0x81, 0x0, 0xfff, 0x9, 0x2, 0x80000001, 0x6, 0x3, 0x80000000, 0x7, 0x3b, 0x1, 0x40, 0x9, 0xfffffff9, 0xc7, 0x3, 0xff, 0x80000000, 0x2, 0x6, 0x1931, 0x3, 0x20, 0x4, 0x7f, 0x1, 0x20, 0x200, 0x9, 0x7, 0x7fffffff, 0xda7, 0xd9, 0x800, 0x80000001, 0x3, 0x5, 0x2, 0x1, 0xffffff01, 0x3, 0x7, 0x8, 0xfff, 0x2a1, 0x8, 0x0, 0x0, 0x9, 0xbe8, 0x7, 0x1, 0x9, 0xe43e, 0x7, 0xfff, 0x7ff, 0x80000000, 0x3, 0x2, 0x100, 0x7, 0x8, 0x5, 0x31, 0x8001, 0x7, 0x8, 0x2ab2, 0x3, 0x4, 0xff, 0xab4, 0x8, 0x0, 0x9, 0x0, 0x10001, 0xfffffff8, 0x6, 0x4, 0x1200, 0x8, 0xd7, 0x7, 0x10000, 0x2, 0x800, 0x6, 0x10001, 0x6, 0x2, 0x0, 0x3, 0x5, 0x101, 0x1, 0x800, 0x4, 0x2, 0x6, 0x7, 0x1000, 0x10000, 0x8001, 0x309, 0x7, 0x3, 0x7, 0xfffffff7, 0x5, 0x9, 0x2, 0x40, 0x3ff, 0x5, 0x4, 0x6, 0x0, 0x3, 0x6, 0x81, 0x1, 0x1000, 0x401, 0x1, 0xf7f, 0x3f, 0x80, 0xcf32, 0x5, 0x80, 0x0, 0x6c77, 0x7, 0x200, 0x7, 0x5, 0x10000, 0x6, 0x2, 0x150, 0x7fff, 0x0, 0x92b, 0x4, 0x6, 0x5, 0x9, 0x6, 0x0, 0x1, 0x200, 0x1fffe, 0x20, 0x200, 0xf77, 0x1, 0x4, 0x8001, 0x4, 0x4, 0x1, 0x6, 0x3, 0x3, 0x400, 0x7, 0x9, 0xd1, 0x5, 0x7, 0x9, 0x6, 0x5, 0x80000000, 0x24b, 0x3, 0x3, 0x1, 0x40000000, 0x757, 0x7, 0xffff, 0x7, 0x400, 0x4, 0x7, 0x3, 0x0, 0xc9, 0x0, 0x16f, 0x0, 0xa57, 0x8, 0x9, 0x9, 0x0, 0x80000001, 0xbd0, 0x10001, 0xc81, 0x8]}]}, @TCA_CGROUP_ACT={0x530, 0x1, [@m_vlan={0x14c, 0x16, 0x0, 0x0, {{0x9}, {0x24, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x9a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x2e1}]}, {0xfd, 0x6, "42b153f4f26c185e860aba8a7186700ca38503595fca14b63ea181ceccd17fe01d72bbb7846e0d50f87a029b355d14997994da042eed331a717bed2d030576ffb1ae45e98b41299d7c7dfc2c7886884c70788357dd9bbc1c095530ad360bd58e834d5c8fd02bcd76343689f5d001fa8b2c91e559cf4b467fae421432b87e3b1066d263639bca41a7766ac32c98dc9e557cd5c82b694bf80a8b04663281e024cc12aef362b269a18ef06d230025ea22830dfcd2415841fb449a53bc00e896fad643f22558fc61ed87c2e003ad58287643fdcbd732da0de13e24c64f033244ad40f8f2665ac1bda919c4b5d844d849b301aab3034bfa472203bd"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_gact={0x1e4, 0x4, 0x0, 0x0, {{0x9}, {0xc4, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1eb1, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0x0, 0x1, 0x2, 0x3f}}, @TCA_GACT_PARMS={0x18, 0x2, {0x3, 0x800, 0x7, 0x2, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x73a, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1, 0x3, 0x20000000, 0x10001, 0x619b}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1807, 0x1}}, @TCA_GACT_PARMS={0x18, 0x2, {0xa5, 0x0, 0x20000000, 0x1, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x98, 0x3, 0x8, 0x1f}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1199, 0x10000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0xfff, 0xfffffffe, 0x4, 0x4, 0x6}}]}, {0xf8, 0x6, "46e7bb5b7d742389757f177ac95c3c382534ff9778fb97116bcfcb1ce0819cb3d95827e547c69e72b711f2f03348f2361ee725f42b976e175ce678141670744b4043ffc4bd416473415056ab0da631e64347f248044811f71910c3fb2f8bfdd2ab6f0761536422141e5cd0045cc326043455c701e8f45e464de4871e7e589ac37d5dc8ac04aa37ba0624ced8f883a9e654a6c412752d321b3f8af93c09e3e7adfb271ca8700cfc1e083c758c6d575b70079aaca9a837ced708a1bda11c1804399f92ee258c47f24b912854cd4812b671d95008b735165bc25ca26d2c80655af768446f32667e7663a256c4bcb50d60d8cc29d261"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ipt={0x1fc, 0x14, 0x0, 0x0, {{0x8}, {0x168, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x57, 0x6, {0x40, 'mangle\x00', 0x3, 0x8001, "2e3f74485a7335d43569a70b44c951a96ae52a652af1a3e12187cbac36c4b2b1fad985087f1ab70b13ad6d55da"}}, @TCA_IPT_TARG={0xc7, 0x6, {0x0, 'security\x00', 0x8, 0xd0, "854cdd94342e86652d4efd51ccf5e2990cbfde5351bbabfd6cf2e92eb1e71dbecb3d44210ccb2b2c05fa8b8b5acdab3441618cbb7fff66e750f04f55c01f651e42f59e8434040ca256403fc8d2e6f778bf629a3589c50f4ceccfcac03dce63bb6dd936af00e0efa76603fa56ec6ddfd9dff7d78b430fbaef02f3a15909e27e9c69e301c7cdf695f9c91eaf431110f3aa1992864f3fa8a4d0de68bf2faf"}}, @TCA_IPT_INDEX={0x8, 0x3, 0xf3d}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_HOOK={0x8}]}, {0x6f, 0x6, "5816966f63cf3e5a75e55a403c08cd16a554dacd94e5e9c8dde34821594d273112534e64bb52dd401345e550718d4e3bb39c8da35c7781d61f1074cfb98900e95685b2e67883fc7b5922b2fc9b665a38450af809810b1e97517f693ed1662b7e07922b65fc248769fe142f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_CGROUP_EMATCHES={0x15c, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x150, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x6, 0x2, 0x401}, {0x7, 0x5, 0x1, "d3b360b82a"}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x4, 0x1, 0x8}, {0x6, 0x7, 0xfffa, 0x3, 0x2, 0x2}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x2, 0x7, 0x660c}, {{0x1, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x4, 0x3, 0x3}, {0x8, 0x8000, 0xed, 0x7ff}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xc84, 0x1, 0x7}, {0xffff, 0x17e, 0xf9a, 0x4, 0x5, 0x2, 0x2}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x7, 0x1, 0x8}, {0xfff, 0x9, 0xcd8, 0xe, 0xf, 0x1}}}, @TCF_EM_CONTAINER={0xac, 0x1, 0x0, 0x0, {{0x7, 0x0, 0x4}, "63998f0828801fcf9016b509a1016bb62726b7f0f24c32c53250fd6dc6a78bd79909bb4110a4afb57aac60602c057d428e4728092d3c40f0a58c262558e9e7bef6560e43a8b2723276989f9f644c26c4d1136779595a521057f50e44f45aa72d4b7da6a4841b5a76943d77cace962b0a89ab20107b19b473585274cd98fb484b7abba46039a6be8cc0d6e3e516e9924a74cd60355a9434bf89e2142292bb78"}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x8, 0x8, 0x8}, {0x4, 0x5, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffd}}]}, @TCA_CGROUP_EMATCHES={0xcc, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xb8, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x9}, {0x5, 0x7, 0x1, "b476fdc518fee8"}}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x7, 0x3, 0x6b6}, {0x331, 0x1, 0x9, 0x1}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x7, 0x1, 0x1}, {0xbddb, 0x3, 0x4, 0x6, 0x5}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x8}, {0xffffffffffffffff, 0x4, 0x1}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xf801, 0x1, 0xfffe}, {0x80000001, 0x10000, 0x4, 0x0, 0x5}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x1, 0x1, 0x401}, {0x4, 0x1, 0xfffa, 0x0, 0x1, 0x2, 0x1}}}, @TCF_EM_META={0x28, 0x1, 0x0, 0x0, {{0x2, 0x4, 0x38}, [@TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="cc", @TCF_META_TYPE_VAR="f0fcf19160a8e1", @TCF_META_TYPE_VAR="3def5e9dc3e6b7d2", @TCF_META_TYPE_VAR="b0ad"]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x14}}]}, @TCA_CGROUP_POLICE={0x102c, 0x2, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x6, 0x1f, 0x4, 0x7f, 0x296, 0x1, 0x2, 0xffffffff, 0x3, 0x4b, 0xfffffffd, 0xfffffff7, 0x1, 0x7b0, 0x2, 0x6, 0xe6, 0x8, 0x9346, 0x4, 0x8000, 0x9, 0x4, 0xffffff52, 0x0, 0x8, 0x5, 0xf374, 0x4, 0x81, 0x5d, 0x8, 0x1, 0x2, 0x6, 0x81, 0x5, 0xfffffffb, 0x4, 0x0, 0x8, 0x79cc8506, 0xffff, 0x3, 0x73, 0x7ff, 0x7, 0x3ff, 0x400, 0x6, 0x8, 0x8, 0x3, 0x3, 0x40, 0x7, 0xb90, 0x7fffffff, 0x4, 0x1, 0x0, 0x1, 0x2, 0x6df, 0xe, 0x4, 0xffffffff, 0x0, 0x5, 0x9ee, 0x1, 0x101, 0x8, 0x1ff, 0x2, 0x0, 0x7, 0x9a, 0xe2c, 0x6, 0xffffffff, 0x5, 0x73, 0x5, 0xf424, 0x7fffffff, 0x6, 0x7f, 0x40, 0x3, 0x7, 0x40, 0x8, 0xf5, 0x3f, 0x6f26, 0x491d2e90, 0x7, 0x4, 0x4, 0x1000, 0x2, 0x5, 0x0, 0x78b, 0xfd3, 0x101, 0x10000, 0x370480e1, 0x9, 0x1, 0x9, 0x3, 0x1, 0xde8, 0x7, 0x100, 0x80, 0x3, 0x9, 0x5, 0x3, 0x4, 0x5, 0x7, 0x1, 0x0, 0x3f, 0x5, 0x7e6cb856, 0x7, 0xb, 0xa2a, 0x4, 0x2, 0x1, 0x5c73cd35, 0x0, 0x10001, 0x7f, 0x0, 0x5, 0x0, 0x6, 0x5, 0x9, 0x2, 0xfffffffb, 0x7fffffff, 0xfff, 0x1f, 0x15bd97d5, 0xfffffff8, 0x1, 0x82, 0x4, 0x1, 0x40, 0x9, 0x0, 0x0, 0x6, 0x55, 0x3, 0x8, 0xc555, 0x1f, 0xffff, 0x3, 0x7d, 0x1, 0xc47d, 0x1, 0xfffffffc, 0x8d4, 0x2, 0x3, 0x7fff, 0xb046, 0x1, 0x2, 0x6, 0x9, 0x2, 0x87b, 0x0, 0xe7, 0xfffffff9, 0x3, 0x3f, 0x8001, 0x10001, 0xb60a, 0x8, 0x7, 0xfffffff9, 0x3d6b, 0x0, 0x1000, 0x1, 0x0, 0xfffffff8, 0x400, 0x80, 0xd907, 0x5, 0x6, 0x3ff, 0x6, 0x9, 0x816, 0x0, 0x40, 0xe40c, 0x2, 0xfff80000, 0xfffffffd, 0xda4, 0x7, 0xbd3, 0x4, 0x6, 0x5, 0x2, 0x2, 0xff, 0x7, 0x80000001, 0x5, 0x7ce, 0x7, 0x3, 0x1, 0x4, 0x8, 0x9, 0x9, 0x5, 0x800, 0x14478fd5, 0x66, 0x5, 0x9, 0x8, 0x2, 0x101, 0x3, 0x6, 0x5, 0x81, 0x7ff, 0x0, 0xc88, 0x10000, 0x134]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8ba, 0x1, 0x8, 0xa7, 0xe55, 0x7, 0x0, 0x4, 0x3, 0x7, 0x1, 0x1, 0xfffffff9, 0x8, 0x6, 0x1ff, 0x1, 0x100, 0x8, 0x3, 0x7, 0x8, 0x20, 0xffff, 0x5, 0xfffffffe, 0x9, 0x2, 0x8001, 0x401, 0xfffff001, 0xffffffff, 0x80, 0x8, 0x101, 0x2, 0x7, 0x3, 0x7fff, 0x0, 0x4, 0x7f, 0x5, 0x4, 0x80000000, 0x10001, 0x2, 0xac7, 0x9, 0x0, 0xfff, 0xfff, 0x6, 0x7, 0x3, 0x6, 0x5, 0x3f, 0x2, 0x8, 0xffffffff, 0x8, 0x4, 0x0, 0x81, 0x4, 0x1, 0x7, 0x7f, 0x5, 0x4, 0x8000, 0x3, 0x40, 0x7ff, 0x4, 0x2, 0x85, 0xffff, 0x0, 0x1000, 0x9, 0x8000, 0x3, 0x8000, 0x9, 0x3, 0x40, 0x8, 0x400, 0x7, 0xffffff01, 0x4, 0x6, 0x8, 0x2, 0x3, 0x7fff, 0x17, 0x84d0, 0x2, 0x80000000, 0x6, 0x9, 0x8, 0x0, 0x1, 0xffff7dfd, 0x2e2, 0x8, 0xfffffffe, 0xd52, 0x35a, 0x1, 0x1f, 0x1, 0xda, 0x8, 0x0, 0xfffff22a, 0x0, 0x8, 0x1, 0x3, 0x100, 0xfffffaf9, 0xebf, 0x3, 0x7, 0xfffffffa, 0x1, 0x80000001, 0x9, 0x20000000, 0x20, 0x8, 0x7, 0x2, 0x8, 0x84f6, 0x8001, 0x100, 0x4, 0x7, 0x401, 0x7fff, 0x7f, 0x800, 0x7, 0x387, 0x5, 0x8, 0x8, 0x9, 0xfa8aad33, 0x7, 0x2, 0x7, 0x400, 0x2, 0x7, 0x9, 0x5, 0x5, 0xbae, 0x0, 0xfffffff7, 0x0, 0x0, 0x36, 0x100, 0x2096, 0x6, 0xfffffffe, 0x6, 0x4, 0x6, 0x1ff, 0x5, 0x8, 0x5, 0xfffffff8, 0x2, 0xfffffff8, 0x2, 0xb23a, 0x0, 0x6f, 0x5, 0x9, 0x101, 0x7, 0x1f, 0x5, 0x80, 0x100, 0x1, 0x30bd, 0x6, 0x2, 0x2, 0x6, 0x9, 0xac7e, 0x40000000, 0x7988, 0x4568, 0x1, 0x5, 0x0, 0x6, 0xff, 0x8, 0xfffffc01, 0x7, 0x80, 0x200, 0x7fffffff, 0x7, 0x7fffffff, 0xfd68, 0x661e6863, 0x6fda, 0x6, 0x9, 0x3000000, 0x3, 0x3ff, 0x3ff, 0x8, 0x7, 0xffffffff, 0x1ff, 0x5, 0x5, 0x2936, 0x8, 0x7, 0x239, 0x1000, 0xe9d, 0x7, 0x80000000, 0xffe00000, 0x9c7f, 0x1c3c, 0x2, 0x3f, 0x4, 0xac3c, 0x80, 0xb4, 0x6, 0x4, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0xffffffff, 0x397, 0x81, 0x5, 0x8, 0x3, 0x7fff, 0x5b, 0xd665, 0x5a, 0x30c6, 0xff, 0x7, 0xfffffe00, 0x7, 0x2, 0x3ff, 0x1, 0x9, 0x4, 0xbda8, 0x3, 0x5, 0x5, 0x0, 0x9, 0x4, 0x40, 0xef1d, 0x5, 0x5, 0x5, 0x1000, 0x0, 0x3d66, 0x92, 0x0, 0x1, 0x9, 0x9, 0xa029, 0x835, 0x8, 0x6, 0x81, 0x4000400, 0x5e, 0x3, 0x9, 0x7ff, 0x0, 0x5, 0x8, 0x2, 0x1f, 0x8001, 0x7ff, 0x0, 0x5, 0xa3c6, 0x7ff, 0x1ff, 0x400000, 0x401, 0x9, 0x9, 0x8, 0x10001, 0xba0, 0x2, 0x4, 0x7fff, 0x7, 0x8, 0x2, 0xff, 0xfff, 0x0, 0x400, 0x1, 0x5e54f69a, 0x0, 0x200, 0x1, 0x45f4052a, 0x0, 0xecc, 0xfffffbff, 0x3, 0x7, 0x9, 0x2, 0x9, 0x3, 0x8, 0x0, 0x101, 0x1000, 0x101, 0x38, 0x8, 0xff, 0x3ebeb23b, 0x1, 0x2, 0x80000000, 0x8, 0x5, 0x200, 0x2, 0x5, 0x7, 0x6, 0x3, 0x6, 0x1, 0x2, 0x0, 0x5a, 0x4, 0x2, 0x7, 0x2, 0x1, 0x3, 0x0, 0x4, 0x3, 0x0, 0x8, 0x7fff, 0x4, 0x40, 0x3, 0x2, 0x2d4aa025, 0x1ff, 0xfffffc00, 0x0, 0x0, 0x9, 0xfffffffe, 0x6, 0x1, 0x0, 0x800000, 0x4, 0x1, 0xff, 0x80000001, 0x0, 0xd5fc, 0x5, 0x4, 0x657, 0x0, 0x4, 0x5, 0xff, 0x8, 0x4, 0x2, 0x400, 0x2, 0xc06, 0x1, 0x0, 0x3ff, 0x101, 0x80000001, 0x0, 0x4cffd746, 0x5, 0x81, 0x7, 0x9, 0x0, 0x2, 0x8, 0x8000, 0x1, 0x2, 0x80000000, 0x1, 0xff, 0x3f, 0x3f, 0xff, 0x9, 0xa4d6, 0x20, 0x8000, 0x6e2e, 0x1, 0x5, 0x20, 0x4, 0x4, 0x8, 0x80000001, 0x80000000, 0x3, 0x6, 0x5, 0x81, 0x8000, 0xdf9, 0x3, 0x85, 0xb467, 0x0, 0x2, 0x6, 0x96, 0x0, 0x7, 0x5, 0x8, 0x0, 0x8d9, 0x6, 0x5, 0x3f, 0x0, 0x80, 0x400, 0x20, 0x1000, 0x0, 0x3, 0x8, 0x7, 0x1, 0x0, 0x400, 0x6, 0xede, 0x80000001, 0x0, 0x3, 0x8, 0x400, 0xfffffffd, 0x5, 0x0, 0x2efd, 0x1, 0x81, 0x7fffffff, 0x81, 0xfffffff7, 0x9, 0xfb76, 0x9, 0x23a, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x9, 0x7, 0x0, 0x7a, 0x7, 0x45, 0x4, 0x9, 0xfffffc01, 0x7, 0x8, 0x200, 0x1, 0x3, 0x200, 0x6, 0x4, 0xffffff00, 0x80000000, 0x80000000, 0x4, 0x0, 0x3, 0x2, 0x0, 0xffffccfe, 0x200, 0x283a, 0x37, 0xffff14ab, 0x7, 0x4, 0x20, 0x80, 0x40, 0x1ff, 0x7e8, 0xffff, 0xffffffff, 0x0, 0x9, 0x0, 0x4, 0x200, 0x0, 0x43, 0x400, 0x2, 0x8, 0x9, 0x80, 0x0, 0x2d1f, 0x8001, 0x3ff, 0x5d, 0x4, 0x10000, 0x6, 0x2, 0x1, 0x315da364, 0x4, 0x8, 0xd136, 0xd7f5, 0x6, 0x7, 0x1, 0x7fff, 0x66, 0xe000000, 0x0, 0xffff, 0x4, 0x4, 0x70, 0x8, 0xd79, 0x8, 0x7, 0x6, 0x5, 0x1, 0x1, 0x6, 0x3, 0xffffffc1, 0x6, 0xfffffff8, 0x0, 0x40, 0x400, 0x0, 0x1ff, 0x4, 0x380, 0x2, 0x2, 0x9a76, 0xff, 0x40, 0x9, 0x2, 0x0, 0x7, 0xbd, 0x2, 0x3a814ecb, 0x5, 0x1, 0x101, 0x0, 0x2, 0x4577, 0x7fffffff, 0xc8, 0x1, 0x400, 0x1, 0x10000, 0x7, 0x9, 0x5, 0x80, 0x200, 0x3925ecf4, 0x10000, 0x2, 0xffffff80, 0xcc1, 0x0, 0xc000, 0xb9d, 0x9, 0x10000, 0x6, 0x3, 0x0, 0xf, 0x10001, 0x10000, 0x5, 0x4982, 0x1, 0x3, 0x5, 0x20, 0x5, 0x7ff, 0x7fffffff, 0x8, 0x0, 0x0, 0x9, 0x6, 0x7, 0x1ff, 0x4a, 0x6, 0x3, 0x2, 0x400, 0x200000, 0x3, 0x1, 0x401, 0xfff, 0x6, 0x10001, 0x7fffffff, 0x7f, 0x7, 0x8, 0x9, 0x40, 0x5, 0x4, 0x6, 0x5, 0x4, 0xe33, 0x6, 0x3, 0x5b9e, 0x101, 0x6, 0x3ff, 0x0, 0x6, 0xfffffffa, 0x1, 0x800, 0x0, 0x1f, 0x80000000, 0x2, 0x5, 0x8, 0x4, 0x1000000, 0x48f6f8da, 0x7, 0x7, 0x5, 0xfffffff9, 0x10001, 0x8, 0x822f, 0x200, 0x8000, 0x8001, 0xeb9e, 0x11b, 0x2, 0x7, 0xff, 0x6e3f, 0x1, 0x7, 0x1, 0x6, 0x9e5, 0x9, 0x6, 0xc, 0x9, 0x4, 0x8, 0x7f0, 0xebb7, 0x30e7c820, 0x7, 0x8, 0x7fffffff, 0x2, 0xfffffffa, 0x4, 0x2, 0x5, 0x8000, 0xfffffff8, 0x0, 0x1, 0x9, 0x2, 0x5, 0x2, 0x3, 0x7, 0x10001, 0xff, 0x60, 0x5, 0x10000]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x80000000}]}, @TCA_CGROUP_ACT={0x120, 0x1, [@m_tunnel_key={0x11c, 0xb, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @local}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x1f, 0x2, 0x20000000, 0x8, 0x4a}, 0x2}}]}, {0xc8, 0x6, "ed59a64df2216ac2a8dbee0fcbc580b55b6235d8dfe85df4f9b6027a10535ec399a0b34b5d15bfe5075dc3d64a71072ffc2ef44c6c0cd86a289cfb3b3becfcbb52161963ccdbff91cfe2d6020b702a126db8ece7b2ba0959b873742c513fe3ce3e49e1c971fb4983880fe696b156c2b251fec0c23329aba4ebdccf55e2add255ff8923e07778ff4a52510b81d421b7414301af867c3f1bee7bf2e57975902083db335a3fe807be8b01fb4cfb03bd2e2e0ccfc0cc2848eb12c096faeb404bd1847728cde4"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x3f, 0x2}}, @filter_kind_options=@f_rsvp={{0x9}, {0x378, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @broadcast}, @TCA_RSVP_SRC={0x8, 0x3, @multicast1}, @TCA_RSVP_ACT={0x258, 0x6, [@m_ipt={0x254, 0x14, 0x0, 0x0, {{0x8}, {0x164, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_TARG={0x51, 0x6, {0x1ff, 'mangle\x00', 0x3f, 0x6, "2eeb5bf5d9810b3f19a18f44ef442b08797be53477add956cb7810f015501868bfd39950ecb50e"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_TARG={0x78, 0x6, {0x400, 'mangle\x00', 0x2, 0xfff, "87087629e55598b41d1cf97f5349514414f1b0ded3f0ac324a1b5ac749a9e036451b8e3e18553e264494ab8355b41f68029696fd35e7cebe657b00ef03623189677bce513658c3a3be8414e52f9e"}}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}]}, {0xcc, 0x6, "e9ebabf23ef7a706210004b8a10d59bf858b88af0755000dcd21c5ef713fbaa7d6715a59cf91c2440219055ab4ac8326921cbcba5248373e1881a28c90c748f3baa1707a1860dd0c0e476bfe18f7b00b115542ad414edd142eeff5d222332799189cffa66720bbdad1cec42208722fd51202adbac1e33bd9e4ccfb81acc483e6b2a971653a1b1f512a4f0dde4fca8e21e3f6da01230becb1e0241b27184db1656dae838580c21b7f852dbc0557ee8e42bc763f23e57bd9485af8249f797d8e174203dc5837dbc648"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}, @TCA_RSVP_ACT={0x10c, 0x6, [@m_vlan={0x108, 0x1e, 0x0, 0x0, {{0x9}, {0x3c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0xa4, 0x6, "ded5f2dcde73baa173034873f2e03d8dec410a9e99efff6aaf2c1716840e377e92e53a74f96de5c357dfd1f6dbbf52430f93a3eb9d6b378478593a69d3294c9961fd986945135017b95aa0015b90fb8bbc39279376961334e84400565544a49cf7bf35a94e6c00e1aa3bf19dc64a7052814a79212d17ffe65923eca31182010af66994053575709191719302c3eb74d9c04f7867153944f1069ba97fc505f8ff"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}]}, 0x25f8}, 0x1, 0x0, 0x0, 0x8000}, 0x40400d0) (async) 08:05:30 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000680)={@in6={{0xa, 0x4e20, 0x7ff, @mcast1, 0xfffff800}}, 0x0, 0x0, 0x4f, 0x0, "41f0305bdc836c0e4cdc799a4f5aee3593f72ab06398bdc6c85e1ecf79d95f1502924a011aba6f1d464a31a517dc99df044ae19c77bb21321398b2f4ebf3ce55949a6026d1d57d70c5a72596836c70a3"}, 0xd8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x27}, 0x14) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x4e20, @private=0xa010102}}, 0x0, 0x0, 0xd, 0x0, "d93e09265996c4b74abf5ba0a6bfb0508937ffc5728b293e30a72b04554b5eec8c4fe460c14e0a567c404228d94c66356435cc7733f2079d9e94987f08d86db15e8c0ffb03bce5d51734385e58e2bb09"}, 0xd8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x560, 0x490, 0xd0, 0x1c0, 0xd0, 0x2b0, 0x490, 0x490, 0x490, 0x490, 0x490, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x3, 0x2, 0x5}}}}, {{@ipv6={@remote, @remote, [0xff, 0xff, 0xffffffff, 0xffffffff], [0xff, 0xffffff00, 0xff000000, 0xffffff00], 'team_slave_1\x00', 'batadv_slave_0\x00', {}, {}, 0x32, 0x0, 0x3, 0x30}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@rand_addr=0x64010102, @ipv4=@multicast2, 0x6, 0x16, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv4=@private=0xa010102, 0xe, 0x14, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0, 0x40, 0x20, 0x2}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x29}, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3f, 0x24, 0x4}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000680)={@in6={{0xa, 0x4e20, 0x7ff, @mcast1, 0xfffff800}}, 0x0, 0x0, 0x4f, 0x0, "41f0305bdc836c0e4cdc799a4f5aee3593f72ab06398bdc6c85e1ecf79d95f1502924a011aba6f1d464a31a517dc99df044ae19c77bb21321398b2f4ebf3ce55949a6026d1d57d70c5a72596836c70a3"}, 0xd8) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x27}, 0x14) (async) socket(0x11, 0xa, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x4e20, @private=0xa010102}}, 0x0, 0x0, 0xd, 0x0, "d93e09265996c4b74abf5ba0a6bfb0508937ffc5728b293e30a72b04554b5eec8c4fe460c14e0a567c404228d94c66356435cc7733f2079d9e94987f08d86db15e8c0ffb03bce5d51734385e58e2bb09"}, 0xd8) (async) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x560, 0x490, 0xd0, 0x1c0, 0xd0, 0x2b0, 0x490, 0x490, 0x490, 0x490, 0x490, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x3, 0x2, 0x5}}}}, {{@ipv6={@remote, @remote, [0xff, 0xff, 0xffffffff, 0xffffffff], [0xff, 0xffffff00, 0xff000000, 0xffffff00], 'team_slave_1\x00', 'batadv_slave_0\x00', {}, {}, 0x32, 0x0, 0x3, 0x30}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@rand_addr=0x64010102, @ipv4=@multicast2, 0x6, 0x16, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv4=@private=0xa010102, 0xe, 0x14, 0x6}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0, 0x40, 0x20, 0x2}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x29}, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3f, 0x24, 0x4}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c0) (async) 08:05:30 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) 08:05:30 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0}, 0x10) (async) 08:05:30 executing program 4: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c310000000000000000"]}) 08:05:30 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000000)=""/39, &(0x7f0000000040)=0x27) 08:05:30 executing program 3: ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffffd) 08:05:30 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000000c0)="9d152bb962437c28010d472e84991b630022213b5af4be1c679390b48e884f2f94468f133ad91112694f40fb02994b432a2c8e609cabd02423b62a071efe79627e", 0x41) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x29, 0x81, 0x48, 0x0, 0xc6ee5c6bd40122aa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x8000, 0x700, 0x5b, 0x7fffffff}}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x4, 0x70bd27, 0x25dfdbff, {0x2, 0x1, 0x82, 0xff, r1}, [@IFA_RT_PRIORITY={0x8, 0x9, 0x9}, @IFA_LABEL={0x14, 0x3, 'veth0_to_batadv\x00'}]}, 0x34}}, 0x80) socket$nl_route(0x10, 0x3, 0x0) 08:05:30 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000000)=""/39, &(0x7f0000000040)=0x27) (async) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000000)=""/39, &(0x7f0000000040)=0x27) 08:05:30 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0}, 0x10) 08:05:30 executing program 3: ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffffd) 08:05:30 executing program 4: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:30 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000000)=""/39, &(0x7f0000000040)=0x27) socketpair(0x3, 0x0, 0xb87, 0x0) (async) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000000)=""/39, &(0x7f0000000040)=0x27) (async) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c310000000000000000"]}) 08:05:30 executing program 3: ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffffd) 08:05:30 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000000c0)="9d152bb962437c28010d472e84991b630022213b5af4be1c679390b48e884f2f94468f133ad91112694f40fb02994b432a2c8e609cabd02423b62a071efe79627e", 0x41) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x29, 0x81, 0x48, 0x0, 0xc6ee5c6bd40122aa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x8000, 0x700, 0x5b, 0x7fffffff}}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x4, 0x70bd27, 0x25dfdbff, {0x2, 0x1, 0x82, 0xff, r1}, [@IFA_RT_PRIORITY={0x8, 0x9, 0x9}, @IFA_LABEL={0x14, 0x3, 'veth0_to_batadv\x00'}]}, 0x34}}, 0x80) (async) socket$nl_route(0x10, 0x3, 0x0) 08:05:30 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x4, 0x10}, 0xc) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=r0, 0xffffffffffffffff, 0x1c, 0x1, r1}, 0x14) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:30 executing program 4: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:30 executing program 1: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x5, 0xff, 0x0, 0x0, 0xa, 0x100, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x1442, 0x80000000, 0x7, 0x2, 0x800, 0x0, 0xff, 0x0, 0x401, 0x0, 0x7}, r0, 0x5, 0xffffffffffffffff, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:30 executing program 3: r0 = syz_open_dev$ndb(0x0, 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) 08:05:30 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x4, 0x10}, 0xc) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=r0, 0xffffffffffffffff, 0x1c, 0x1, r1}, 0x14) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f4"]}) 08:05:30 executing program 1: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x5, 0xff, 0x0, 0x0, 0xa, 0x100, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x1442, 0x80000000, 0x7, 0x2, 0x800, 0x0, 0xff, 0x0, 0x401, 0x0, 0x7}, r0, 0x5, 0xffffffffffffffff, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) (async) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:30 executing program 3: r0 = syz_open_dev$ndb(0x0, 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) 08:05:30 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x4, 0x10}, 0xc) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x4, 0x10}, 0xc) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=r0, 0xffffffffffffffff, 0x1c, 0x1, r1}, 0x14) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:30 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 08:05:30 executing program 3: r0 = syz_open_dev$ndb(0x0, 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) 08:05:30 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000000c0)="9d152bb962437c28010d472e84991b630022213b5af4be1c679390b48e884f2f94468f133ad91112694f40fb02994b432a2c8e609cabd02423b62a071efe79627e", 0x41) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x29, 0x81, 0x48, 0x0, 0xc6ee5c6bd40122aa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x8000, 0x700, 0x5b, 0x7fffffff}}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x4, 0x70bd27, 0x25dfdbff, {0x2, 0x1, 0x82, 0xff, r1}, [@IFA_RT_PRIORITY={0x8, 0x9, 0x9}, @IFA_LABEL={0x14, 0x3, 'veth0_to_batadv\x00'}]}, 0x34}}, 0x80) (async) socket$nl_route(0x10, 0x3, 0x0) 08:05:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f4"]}) 08:05:30 executing program 1: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x5, 0xff, 0x0, 0x0, 0xa, 0x100, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x1442, 0x80000000, 0x7, 0x2, 0x800, 0x0, 0xff, 0x0, 0x401, 0x0, 0x7}, r0, 0x5, 0xffffffffffffffff, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) (async) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:30 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = accept$netrom(r0, &(0x7f0000000040)={{0x3, @netrom}, [@bcast, @default, @remote, @null, @netrom, @null, @bcast]}, &(0x7f00000000c0)=0x48) sendto$netrom(r1, 0x0, 0x0, 0x80, 0x0, 0x1f) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r3) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x8005) 08:05:30 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 08:05:31 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f4"]}) 08:05:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) 08:05:31 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = accept$netrom(r0, &(0x7f0000000040)={{0x3, @netrom}, [@bcast, @default, @remote, @null, @netrom, @null, @bcast]}, &(0x7f00000000c0)=0x48) sendto$netrom(r1, 0x0, 0x0, 0x80, 0x0, 0x1f) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r3) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r3) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x8005) 08:05:31 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 08:05:31 executing program 1: socketpair(0x26, 0x3, 0xb87, 0x0) socketpair(0x9, 0x1, 0x200, &(0x7f0000000000)) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@gettclass={0x24, 0x2a, 0x800, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x7, 0x7}, {0x3, 0x5}, {0xa}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x2000c044) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/cgroups\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000004000034ce089b43baf6dff10453f0ff0800004b4aae41000000000000"], &(0x7f00000000c0)='GPL\x00', 0x9, 0xa6, &(0x7f0000000100)=""/166, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0x1, r1]}, 0x80) 08:05:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) 08:05:31 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca"]}) 08:05:31 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r1 = accept$netrom(r0, &(0x7f0000000040)={{0x3, @netrom}, [@bcast, @default, @remote, @null, @netrom, @null, @bcast]}, &(0x7f00000000c0)=0x48) sendto$netrom(r1, 0x0, 0x0, 0x80, 0x0, 0x1f) (async) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r3) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x8005) 08:05:31 executing program 1: socketpair(0x26, 0x3, 0xb87, 0x0) socketpair(0x9, 0x1, 0x200, &(0x7f0000000000)) socketpair(0x26, 0x3, 0xb87, 0x0) (async) socketpair(0x9, 0x1, 0x200, &(0x7f0000000000)) (async) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@gettclass={0x24, 0x2a, 0x800, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x7, 0x7}, {0x3, 0x5}, {0xa}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x2000c044) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/cgroups\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000004000034ce089b43baf6dff10453f0ff0800004b4aae41000000000000"], &(0x7f00000000c0)='GPL\x00', 0x9, 0xa6, &(0x7f0000000100)=""/166, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0x1, r1]}, 0x80) 08:05:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) 08:05:31 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca"]}) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "e24d5723c77c456c", "31948de3e0138d8d3c015de1d91f43fd", "d5f0684f", "6c00a1b4078a48da"}, 0x28) 08:05:31 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x10001, @empty, 0x5b1c}}}, 0x88) 08:05:31 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000dc0)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="7320e28b666c3100000000000000000024f43eca"]}) 08:05:31 executing program 1: socketpair(0x26, 0x3, 0xb87, 0x0) socketpair(0x9, 0x1, 0x200, &(0x7f0000000000)) socketpair(0x26, 0x3, 0xb87, 0x0) (async) socketpair(0x9, 0x1, 0x200, &(0x7f0000000000)) (async) 08:05:31 executing program 3: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffffd) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@gettclass={0x24, 0x2a, 0x800, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x7, 0x7}, {0x3, 0x5}, {0xa}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x2000c044) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/cgroups\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000004000034ce089b43baf6dff10453f0ff0800004b4aae41000000000000"], &(0x7f00000000c0)='GPL\x00', 0x9, 0xa6, &(0x7f0000000100)=""/166, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0x1, r1]}, 0x80) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "e24d5723c77c456c", "31948de3e0138d8d3c015de1d91f43fd", "d5f0684f", "6c00a1b4078a48da"}, 0x28) 08:05:31 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@gettclass={0x24, 0x2a, 0x800, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x7, 0x7}, {0x3, 0x5}, {0xa}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x2000c044) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/cgroups\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000004000034ce089b43baf6dff10453f0ff0800004b4aae41000000000000"], &(0x7f00000000c0)='GPL\x00', 0x9, 0xa6, &(0x7f0000000100)=""/166, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0x1, r1]}, 0x80) 08:05:31 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200040, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x1, 0x94b, 0x1, 0x3], 0x4, 0x800, 0x0, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, 0xfffffffffffffffe) sendmsg$AUDIT_USER(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x4000080}, 0x40000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x14) accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c, 0x80000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000500)={0x2}) getpeername$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @dev}, &(0x7f00000004c0)=0x1c) socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) 08:05:31 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @empty, 0x5b1c}}}, 0x88) 08:05:31 executing program 3: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffffd) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "e24d5723c77c456c", "31948de3e0138d8d3c015de1d91f43fd", "d5f0684f", "6c00a1b4078a48da"}, 0x28) (async) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "e24d5723c77c456c", "31948de3e0138d8d3c015de1d91f43fd", "d5f0684f", "6c00a1b4078a48da"}, 0x28) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x20, 0x53ac, 0x8001, 0x400, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x800, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x8, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x7d, &(0x7f0000000180)=""/125, 0x41000, 0xa, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xc, 0x7fff, 0x10001}, 0x10, 0x0, r1, 0x0, &(0x7f0000000280)=[0x1, 0x1, r2, 0x1, r3]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:31 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@gettclass={0x24, 0x2a, 0x800, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x7, 0x7}, {0x3, 0x5}, {0xa}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x2000c044) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/cgroups\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000004000034ce089b43baf6dff10453f0ff0800004b4aae41000000000000"], &(0x7f00000000c0)='GPL\x00', 0x9, 0xa6, &(0x7f0000000100)=""/166, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0x1, r1]}, 0x80) 08:05:31 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @empty}}}, 0x88) 08:05:31 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200040, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x1, 0x94b, 0x1, 0x3], 0x4, 0x800, 0x0, 0xffffffffffffffff}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, 0xfffffffffffffffe) sendmsg$AUDIT_USER(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x4000080}, 0x40000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x14) accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c, 0x80000) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000500)={0x2}) (rerun: 32) getpeername$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @dev}, &(0x7f00000004c0)=0x1c) (async) socket$nl_route(0x10, 0x3, 0x0) (async) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) 08:05:31 executing program 3: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0xfffffffffffffffd) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x20, 0x53ac, 0x8001, 0x400, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x800, 0x0, 0x0) (async) sendto$netrom(r2, 0x0, 0x0, 0x800, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x8, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x7d, &(0x7f0000000180)=""/125, 0x41000, 0xa, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xc, 0x7fff, 0x10001}, 0x10, 0x0, r1, 0x0, &(0x7f0000000280)=[0x1, 0x1, r2, 0x1, r3]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:31 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x20, 0x53ac, 0x8001, 0x400, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x800, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x8, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x7d, &(0x7f0000000180)=""/125, 0x41000, 0xa, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xc, 0x7fff, 0x10001}, 0x10, 0x0, r1, 0x0, &(0x7f0000000280)=[0x1, 0x1, r2, 0x1, r3]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:31 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 08:05:31 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200040, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x1, 0x94b, 0x1, 0x3], 0x4, 0x800, 0x0, 0xffffffffffffffff}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, 0xfffffffffffffffe) (async) sendmsg$AUDIT_USER(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x4000080}, 0x40000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x14) (async) accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c, 0x80000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000500)={0x2}) (async, rerun: 32) getpeername$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @dev}, &(0x7f00000004c0)=0x1c) socket$nl_route(0x10, 0x3, 0x0) (async) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) 08:05:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x0) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x20, 0x53ac, 0x8001, 0x400, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (rerun: 32) sendto$netrom(r2, 0x0, 0x0, 0x800, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x8, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x7d, &(0x7f0000000180)=""/125, 0x41000, 0xa, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xc, 0x7fff, 0x10001}, 0x10, 0x0, r1, 0x0, &(0x7f0000000280)=[0x1, 0x1, r2, 0x1, r3]}, 0x80) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (rerun: 32) 08:05:31 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 08:05:31 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x7ff, 0x141441) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r0, 0xc0984124, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:31 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x20, 0x53ac, 0x8001, 0x400, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x800, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x8, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x7d, &(0x7f0000000180)=""/125, 0x41000, 0xa, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xc, 0x7fff, 0x10001}, 0x10, 0x0, r1, 0x0, &(0x7f0000000280)=[0x1, 0x1, r2, 0x1, r3]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:31 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, r0}, 0x10) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0x4) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) 08:05:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:31 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 08:05:31 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x7ff, 0x141441) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r0, 0xc0984124, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) (async) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0x4) 08:05:31 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x20, 0x53ac, 0x8001, 0x400, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r2, 0x0, 0x0, 0x800, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x8, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x7d, &(0x7f0000000180)=""/125, 0x41000, 0xa, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xc, 0x7fff, 0x10001}, 0x10, 0x0, r1, 0x0, &(0x7f0000000280)=[0x1, 0x1, r2, 0x1, r3]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r1 = socket(0x11, 0xa, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, &(0x7f0000000440)) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001a00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000019c0)={&(0x7f00000000c0)=@newchain={0x18fc, 0x64, 0x200, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xffed, 0xa}, {0x9, 0x9}, {0x2, 0x10}}, [@TCA_CHAIN={0x8, 0xb, 0x5}, @filter_kind_options=@f_flower={{0xb}, {0x38, 0x2, [@TCA_FLOWER_KEY_IPV4_DST_MASK={0x8, 0xd, 0xffffffff}, @TCA_FLOWER_KEY_SCTP_SRC={0x6}, @TCA_FLOWER_KEY_ICMPV6_TYPE={0x5}, @TCA_FLOWER_KEY_IPV6_SRC={0x14, 0xe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @TCA_FLOWER_KEY_ARP_TIP={0x8, 0x3b, @empty}]}}, @filter_kind_options=@f_flow={{0x9}, {0x5a4, 0x2, [@TCA_FLOW_POLICE={0x458, 0xa, 0x0, 0x1, [@TCA_POLICE_TBF={0x3c, 0x1, {0xfffffff8, 0x3, 0x7, 0x200, 0x100000, {0x5, 0x1, 0x800, 0x8000, 0x9, 0x8cf}, {0x3, 0x1, 0xcf, 0x9, 0x1, 0xffffffff}, 0x0, 0x4, 0xfffffffa}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x0, 0x7, 0xf23d, 0x6, 0x9166, 0x3f, 0x6, 0x3, 0x6, 0xfffffffa, 0x1, 0x20, 0x0, 0x0, 0xfffffffd, 0x0, 0x8001, 0x4, 0x6, 0x0, 0x56, 0x9, 0x8001, 0x3, 0x81, 0x2, 0x5, 0x7, 0x9, 0x7, 0x5, 0x7, 0xff, 0x10001, 0x4, 0x5, 0x2, 0x400, 0x2, 0x7ff, 0x7, 0x7, 0x100, 0x8, 0x9, 0x100, 0x3, 0x8, 0x80000001, 0x0, 0x8, 0x400, 0x2724, 0x8, 0x4, 0x1000, 0x3dd7, 0x8, 0x81, 0x8000, 0x2, 0x1, 0x6, 0x2, 0x80000000, 0xff, 0x4, 0x101, 0x3f, 0x81, 0xfffffff7, 0xffff, 0xffff, 0x1, 0x100, 0x0, 0x0, 0x2c7, 0xff, 0x26, 0x4, 0x4, 0x5, 0x6, 0xf230, 0x2, 0x274, 0x30a, 0x3, 0x20, 0xc3, 0x7b83, 0xed, 0x7f, 0x8f3, 0x4, 0x8, 0x4, 0x8, 0x6, 0x80000001, 0x100, 0xffffffff, 0x8, 0x7, 0x0, 0x5, 0xf522, 0x45fa, 0x3f, 0x8001, 0x8, 0xffff, 0xffffffe0, 0xfffffff9, 0x1000, 0x0, 0xfff, 0x800, 0x40, 0x1, 0x0, 0x0, 0x401, 0x1, 0xffffffff, 0x6, 0x80, 0x9, 0x5, 0x6, 0x41, 0x0, 0x3, 0x101, 0x5, 0x2, 0x2, 0x10000000, 0x1, 0x4, 0xfffffffa, 0x8001, 0x7fffffff, 0x5, 0x1, 0x218962a, 0x5, 0x2, 0xf8, 0x7, 0x3, 0x10001, 0x1000, 0x6, 0x9, 0x8001, 0x2ec7, 0x8, 0x0, 0x2, 0x6, 0x1, 0x400, 0x1b9, 0x5, 0x7, 0x4000, 0x400, 0x1, 0x9, 0xfffffffa, 0x6, 0x7fff, 0x40, 0xe00, 0x1000, 0x100, 0x87d, 0x8, 0x9, 0xfffffffb, 0x20, 0x9, 0x6, 0x1, 0x1, 0x2, 0x9c7, 0x8, 0x5, 0xd65f, 0x10001, 0x8, 0x3, 0xffffffff, 0x6, 0x7, 0x8, 0x101, 0x101, 0x8, 0x2, 0x2, 0x101, 0x40, 0x9, 0x6, 0x1, 0x7fff, 0x2, 0x1, 0x5cf, 0x80, 0x35e5e7c5, 0x7, 0x6e06a031, 0x800, 0x2, 0x2, 0x2, 0x7, 0x7, 0x4, 0x4c, 0x5, 0xfffffffd, 0x8001, 0x3, 0x5, 0x400, 0xffffff81, 0x4d, 0x3ff, 0x6da, 0x8, 0x1, 0x1, 0x5, 0x3, 0x101, 0x61, 0x6, 0x8, 0x3, 0x2, 0x7, 0x4, 0x6e, 0x3033, 0xfffffffa, 0x7f, 0x1f, 0x1, 0x7]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x400}]}, @TCA_FLOW_ACT={0x138, 0x9, 0x0, 0x1, [@m_ct={0x134, 0x1a, 0x0, 0x0, {{0x7}, {0x28, 0x2, 0x0, 0x1, [@TCA_CT_LABELS_MASK={0x14, 0x8, "b3057a624815895b49663995e0586d53"}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e23}, @TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @empty}]}, {0xe5, 0x6, "e16d6c52ae01190a1dbb2b3ac34ebd28a6df6236d811d2d5b3808be7df9c3f05f8d7829c396e94def408ef744c2b0c810f4d4573a4a1e0a9e74f8fc421fdcfe0c286b6a4b614ee45c528860d5b23b747bf3e04166e4a4e13cbb432a9764d50e2bbad6a804631da8e078784dadd474153e7070798c2eb5b1f6ebb276e9c6aa2dff1a537beb873283f1604183824dabb375649e2b92fb3c41c4c7bd38be3261a4bc7d92e7c278705f8b16e89db294486f2e5057f9f48f21e4d8195464ac32805bbf1dc8419f4a50109046857a844ce31ac1369441d6944c4d02d921d4906e4feec5e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_FLOW_XOR={0x8, 0x7, 0x3}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xb, 0xfff1}}]}}, @TCA_RATE={0x6, 0x5, {0x7f, 0x5}}, @filter_kind_options=@f_fw={{0x7}, {0x12cc, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'geneve1\x00'}, @TCA_FW_ACT={0x12b4, 0x4, [@m_csum={0xf8, 0x1, 0x0, 0x0, {{0x9}, {0xac, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x6cf, 0x4, 0x6, 0x5, 0x4}, 0x32}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1f, 0x977, 0x2, 0x4, 0x2}, 0x6c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x20, 0x5, 0xffffffff, 0x9}, 0x14}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x6, 0x7, 0x4, 0x2}, 0x56}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x400, 0x0, 0x1, 0x1ff, 0x7}, 0x12}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x114, 0x3, 0x0, 0x4, 0xc0000000}, 0xf}}]}, {0x22, 0x6, "1e520aff1e08abb2f9f22d98a18ce4687cd77068af8d8f1da59fb7e8331c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3ab0b73e37cc5495, 0x1}}}}, @m_vlan={0x148, 0x11, 0x0, 0x0, {{0x9}, {0x74, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x2, 0x3, 0x0, 0x5}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xc6d}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x1ba, 0x5, 0x9a5}, 0x1}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}]}, {0xaa, 0x6, "3e025e5b27fb84ae82f1e2999aa01472683a0810747e7c04f61f87c4b394a2650fd271e4bd6facbb7633323c4f47e293f1115ffc8d711d57b80dbb4f5ad74fcb6573433b71ef76c91fc0b5ea93c9666835a8ad1f230e559eb1d40361c2a8d65cc2181f717e6d68b3d2330443ff70be74559fc58774cd45ddf8323521dbd639ea4a87cebb1f88172314a7d86770bdee3a0db43614d266be4375a652a7f7efea46fe85e6efa5ce"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_tunnel_key={0x1070, 0xa, 0x0, 0x0, {{0xf}, {0x40, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x10001}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @local}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e20}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x32}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @multicast1}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x18fc}, 0x1, 0x0, 0x0, 0x4000}, 0x4000090) 08:05:31 executing program 5: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0x4) (async) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0x4) 08:05:31 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x7ff, 0x141441) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r0, 0xc0984124, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) (async) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:31 executing program 4: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0xa8aa, {{0xa, 0x4e24, 0x10001, @empty, 0x5b1c}}}, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xa2000, 0x0) 08:05:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r1 = socket(0x11, 0xa, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, &(0x7f0000000440)) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001a00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000019c0)={&(0x7f00000000c0)=@newchain={0x18fc, 0x64, 0x200, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xffed, 0xa}, {0x9, 0x9}, {0x2, 0x10}}, [@TCA_CHAIN={0x8, 0xb, 0x5}, @filter_kind_options=@f_flower={{0xb}, {0x38, 0x2, [@TCA_FLOWER_KEY_IPV4_DST_MASK={0x8, 0xd, 0xffffffff}, @TCA_FLOWER_KEY_SCTP_SRC={0x6}, @TCA_FLOWER_KEY_ICMPV6_TYPE={0x5}, @TCA_FLOWER_KEY_IPV6_SRC={0x14, 0xe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @TCA_FLOWER_KEY_ARP_TIP={0x8, 0x3b, @empty}]}}, @filter_kind_options=@f_flow={{0x9}, {0x5a4, 0x2, [@TCA_FLOW_POLICE={0x458, 0xa, 0x0, 0x1, [@TCA_POLICE_TBF={0x3c, 0x1, {0xfffffff8, 0x3, 0x7, 0x200, 0x100000, {0x5, 0x1, 0x800, 0x8000, 0x9, 0x8cf}, {0x3, 0x1, 0xcf, 0x9, 0x1, 0xffffffff}, 0x0, 0x4, 0xfffffffa}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x0, 0x7, 0xf23d, 0x6, 0x9166, 0x3f, 0x6, 0x3, 0x6, 0xfffffffa, 0x1, 0x20, 0x0, 0x0, 0xfffffffd, 0x0, 0x8001, 0x4, 0x6, 0x0, 0x56, 0x9, 0x8001, 0x3, 0x81, 0x2, 0x5, 0x7, 0x9, 0x7, 0x5, 0x7, 0xff, 0x10001, 0x4, 0x5, 0x2, 0x400, 0x2, 0x7ff, 0x7, 0x7, 0x100, 0x8, 0x9, 0x100, 0x3, 0x8, 0x80000001, 0x0, 0x8, 0x400, 0x2724, 0x8, 0x4, 0x1000, 0x3dd7, 0x8, 0x81, 0x8000, 0x2, 0x1, 0x6, 0x2, 0x80000000, 0xff, 0x4, 0x101, 0x3f, 0x81, 0xfffffff7, 0xffff, 0xffff, 0x1, 0x100, 0x0, 0x0, 0x2c7, 0xff, 0x26, 0x4, 0x4, 0x5, 0x6, 0xf230, 0x2, 0x274, 0x30a, 0x3, 0x20, 0xc3, 0x7b83, 0xed, 0x7f, 0x8f3, 0x4, 0x8, 0x4, 0x8, 0x6, 0x80000001, 0x100, 0xffffffff, 0x8, 0x7, 0x0, 0x5, 0xf522, 0x45fa, 0x3f, 0x8001, 0x8, 0xffff, 0xffffffe0, 0xfffffff9, 0x1000, 0x0, 0xfff, 0x800, 0x40, 0x1, 0x0, 0x0, 0x401, 0x1, 0xffffffff, 0x6, 0x80, 0x9, 0x5, 0x6, 0x41, 0x0, 0x3, 0x101, 0x5, 0x2, 0x2, 0x10000000, 0x1, 0x4, 0xfffffffa, 0x8001, 0x7fffffff, 0x5, 0x1, 0x218962a, 0x5, 0x2, 0xf8, 0x7, 0x3, 0x10001, 0x1000, 0x6, 0x9, 0x8001, 0x2ec7, 0x8, 0x0, 0x2, 0x6, 0x1, 0x400, 0x1b9, 0x5, 0x7, 0x4000, 0x400, 0x1, 0x9, 0xfffffffa, 0x6, 0x7fff, 0x40, 0xe00, 0x1000, 0x100, 0x87d, 0x8, 0x9, 0xfffffffb, 0x20, 0x9, 0x6, 0x1, 0x1, 0x2, 0x9c7, 0x8, 0x5, 0xd65f, 0x10001, 0x8, 0x3, 0xffffffff, 0x6, 0x7, 0x8, 0x101, 0x101, 0x8, 0x2, 0x2, 0x101, 0x40, 0x9, 0x6, 0x1, 0x7fff, 0x2, 0x1, 0x5cf, 0x80, 0x35e5e7c5, 0x7, 0x6e06a031, 0x800, 0x2, 0x2, 0x2, 0x7, 0x7, 0x4, 0x4c, 0x5, 0xfffffffd, 0x8001, 0x3, 0x5, 0x400, 0xffffff81, 0x4d, 0x3ff, 0x6da, 0x8, 0x1, 0x1, 0x5, 0x3, 0x101, 0x61, 0x6, 0x8, 0x3, 0x2, 0x7, 0x4, 0x6e, 0x3033, 0xfffffffa, 0x7f, 0x1f, 0x1, 0x7]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x400}]}, @TCA_FLOW_ACT={0x138, 0x9, 0x0, 0x1, [@m_ct={0x134, 0x1a, 0x0, 0x0, {{0x7}, {0x28, 0x2, 0x0, 0x1, [@TCA_CT_LABELS_MASK={0x14, 0x8, "b3057a624815895b49663995e0586d53"}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e23}, @TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @empty}]}, {0xe5, 0x6, "e16d6c52ae01190a1dbb2b3ac34ebd28a6df6236d811d2d5b3808be7df9c3f05f8d7829c396e94def408ef744c2b0c810f4d4573a4a1e0a9e74f8fc421fdcfe0c286b6a4b614ee45c528860d5b23b747bf3e04166e4a4e13cbb432a9764d50e2bbad6a804631da8e078784dadd474153e7070798c2eb5b1f6ebb276e9c6aa2dff1a537beb873283f1604183824dabb375649e2b92fb3c41c4c7bd38be3261a4bc7d92e7c278705f8b16e89db294486f2e5057f9f48f21e4d8195464ac32805bbf1dc8419f4a50109046857a844ce31ac1369441d6944c4d02d921d4906e4feec5e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_FLOW_XOR={0x8, 0x7, 0x3}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xb, 0xfff1}}]}}, @TCA_RATE={0x6, 0x5, {0x7f, 0x5}}, @filter_kind_options=@f_fw={{0x7}, {0x12cc, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'geneve1\x00'}, @TCA_FW_ACT={0x12b4, 0x4, [@m_csum={0xf8, 0x1, 0x0, 0x0, {{0x9}, {0xac, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x6cf, 0x4, 0x6, 0x5, 0x4}, 0x32}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1f, 0x977, 0x2, 0x4, 0x2}, 0x6c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x20, 0x5, 0xffffffff, 0x9}, 0x14}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x6, 0x7, 0x4, 0x2}, 0x56}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x400, 0x0, 0x1, 0x1ff, 0x7}, 0x12}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x114, 0x3, 0x0, 0x4, 0xc0000000}, 0xf}}]}, {0x22, 0x6, "1e520aff1e08abb2f9f22d98a18ce4687cd77068af8d8f1da59fb7e8331c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3ab0b73e37cc5495, 0x1}}}}, @m_vlan={0x148, 0x11, 0x0, 0x0, {{0x9}, {0x74, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x2, 0x3, 0x0, 0x5}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xc6d}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x1ba, 0x5, 0x9a5}, 0x1}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}]}, {0xaa, 0x6, "3e025e5b27fb84ae82f1e2999aa01472683a0810747e7c04f61f87c4b394a2650fd271e4bd6facbb7633323c4f47e293f1115ffc8d711d57b80dbb4f5ad74fcb6573433b71ef76c91fc0b5ea93c9666835a8ad1f230e559eb1d40361c2a8d65cc2181f717e6d68b3d2330443ff70be74559fc58774cd45ddf8323521dbd639ea4a87cebb1f88172314a7d86770bdee3a0db43614d266be4375a652a7f7efea46fe85e6efa5ce"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_tunnel_key={0x1070, 0xa, 0x0, 0x0, {{0xf}, {0x40, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x10001}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @local}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e20}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x32}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @multicast1}]}, {0x1004, 0x6, "bf57f1428c532003a1f8a7c499f27c19a3251dee8066408277b466c9bf0847076b8bfb0325ecd82d782fe4ba6ac742c9f4a5962f53069d995f527d35d2a34f078d9b00ec62079ec4c02320d670f350383891a3c281ea419f483f3ff92843ea688f796d197b45bbb533bccfec945fa2bc42c5327705762ca8c29627f2e48310941abc0ddec73f0d17d1eda16c6d520685ba6c00e4c535345ba0d945e590739e6fa28613fd3af2de450805bbd2ba1da88e05af4c285229bde0b1a99d7578657ab6366d003edc17b203e599ba343a5a439b8a85e01243579a1152406eb2356c5ee41327326b1a48bf9bd044d61eeafab828c65483f62d01d00d6a7f0d4c298ce4b0ae2cca602aae2b536e7c0d9cbc2b4561b66e295ae718b6adffab29b517dda69d00ed5d678fa5b542830488386ffd0aa56392877fb1a8ddbbc612cff92dd2024ad9692313344926255d13e7209ae175c0eb4b0baca8d93bd000106a03696105b035c603c11a3af7fcefa3178fc58eb72da40069e4e29b0671a0c6853555ca0850dc65d48816b64b2f0a853ffe4ea79c2f06992a76919a72125ad05e60e0c3f2cc0d2f3945c1bd686a7c7cb07ecfdbfa6d2bc20f2b204e99b6ac78c3a90cc8d1dea3d7150b6cc7cf0f87a99988bc77ea60a6db3cae0ec4e65f97074831fb8e1a257ea65b8d942261bdde3818efeb3a9300bf220aa6d9ac6588b2c9618fb8e99bed661803da8f5e5b36f22af9a25fa0039d2375f9598046341f0f16e767de7dd620c19f944a347aa5f7ac6fda96a858b639bcb2fd3bd76999501c381d0e5e55747ef165b3a04ff6c9da0c9083089e899d931aa57036a49e8f85cc6da1d3907af83418dc8e97ffc8dddcc9a8d403f5e57aa8d553b583285abc6eb1556cd6980c9522b99f038ed0bbc87ea18581effd9793fdf57395288eb350aa8288ba11a19eae29cb06868d7d305e32357ba6ce5431fb2b5eb1f1ba2f025db1a9bc75d9c2b94389e798db8a70dc04cd727b655709af8513a3d64f1a81987092a6af9b7d0bcc0b041db3ba04ed1bdbb74d3973b6840214d5927f8a21c3c87d0297241da9628aaa3686d2204498b7f16d8e6d9b1bac6077a09cb34055034c3f0ddf90a07207da563a0b23b4d670324a1ab9c94a22c1211961a6a2b1d7a2cf8bf8371a211002073cca61ee1d188497046a95f3570708167d3ad2745be0a2200334591addad95823a4cbfe5059be5d0f1fd01d90a5dffd6dbaea3423675b0b675dd87f25debe09c837a9633ba4428dd9d4073398ddcd4a2b2f9b5411fb437ae768e91717eaec200e16c661987c972b4d8aebe6aa855f2165f9975d6b32e66b8005e429f7f103059e131f261720bf527ff4c54c14c3b6779e7e88a507cbe26774ea593f7b1ba2111006179785e66d1ccc87a18e5ade924a8fb129d48294b9e5f2d3687ac99547976cf2204cbc44bdf2b33fa7e47a2ed845cf7d5f895fd4193316d9ee65117a8e47e3e1b78b1bead1dd35cc7b678185ce9f13bfc1647d2c29a5692e12102fa46b0dc479707023045f9038d6a31500a0d4a9607fbed6c94f6c4e920b634f6820ff0a404e453d54eeb3ffd56f65e53bc3c4e99205dc1b83e86e219f00114e840e8dbd5f69d4e378c6bef55ad224c6289064497d63f2d946f92adc22eba789048eb324920a35e68e16faa0088831f15791d386093fc11d7502b67013aa41b5f3e39cfea4b7775036db3f64495c90616a375f6ab02b784a7e49b66b196b0a2c197e448fd9ca1888ddf4d79eef5ef2b15e7ae51b50ef6d50ea0ed1921774b03d2f64e88d2d1c61823d5a77bfc9262b22e7bee8575a22dd3f686f44e3cdcddb6f42065a6c8e6de6ed4206e1d97fedf194ba920586991e2f2c8cc40458d65027651f62428f5f559b0d04bbfde760edf1a94b87e49c5b1d9179223f30e7706248e4ef96c97f5cc8dce0db02dadb657ae24cf122f6f6845a097942b52377e0b3586fec5c417a4d32b81768faeb82c34a9cb5f0a020af4379d3fff0f2e3a7b4ee53d6d728b0d8161382e4aacf329b22dc3add0985102af84f218ba49848fae35e29dfcc20fa072ac53e1177235fb59fe3b7e25bd3d0fab99efb9ac791d696c211cbc64028411792699ea3fec0d7803f209e92f9e6c86faf651e2a74216fcf07d8760a9c4a9af332174105cd812a1f2d035b5ab28e965e76c479ccc513b607c5ad502323eab4866a6948f46027b1b4e89319e023087de8eb0702eea9347e56c3d92d7ca06ca3259ca0b5a502e9d0d0e087de7233b1bcc230793a1da1ce91f0cad958cb4e832f518e7b6a5dbde021f4171856b313b7ec88ecac523cb4e445e1b543eff3b78f6adae84be52564148259345c1ae9f5aaeb552a1e972533829054a0d55abc6a5bbdf518c3f9f6f440932c8e67f35477abd22147d4ea4c34171dd496961ba30df88f50693d8c867a58881e6a593355a3910a8c1d06d0c209d544fec5b1224bf0e98130648e72746176973168e6d7e456b471be8b8532d59d19ad0a6bd6b9a311bd0b6a69e54b9c417ed1784739d9cdac7fc09422f334b60874013db97eb95f3e5f7d3b15ee24a0a7f4880f54661eca5a734564a1d2b3c73e1682db1fe2bf236e778847a2f39fe0d380c35db5c68a8be795880404f9f19fb3e48bf84590b50de71c3ee9ee920b7768197e5b26f5fc407a26da79746bbac2ccf2c3ffc1f277a8b96e246af6c389a44396cdc5dfb6e8aa85cd0603f9176861e9787d68b95bb12a4c382a4abab51babe1317a0132a28ea6445ef81902ba3d1c363538038ec74ce2fb312b2efa24b5b55f0ef2734f78d31cc5f4ff13aa72a6cf3b9dc078c1c2b91fa1e51b57bec51e49bce5681839526722ec2188d4aa388e7367452e4c2fbcbdbf1d178c87c20e79dd94dfa4dfd6a6b3b33821d7f3a99b70e0248a79c4c6711995fe9686fb596114bbe958399121716115230f5a36da0188ec428e8b5a11102c6ee2ab9ae7de3086a28815a6c20bbe85b90a26d737acb12e0412434fdb362bd126c68288ca1b55ffcf10ddf3b8fba0eb778c7d7aa5ae586ec08b2e1144087719103b2ead44e2bd501aea7eb7ac82dbd2aaa137571f71f9b232d8b1ed819f0d23990738f292a4aecc7b5bca495de087dde4ebf90a6ab3e4c2bd6a732234da9b6dcd3963a076946d17fafc68295f2be58a60aae7ca07cb4c517a9994f0a7c73f7c9a9c30dfe75f8f981ae3cdf6f4c4ecacbeca9d4a456655fa41dc5d4a18ed941ed18eaa16a198942f72c3fa61aca41311255aef38d45cac5aade4a2a44b65e249b1abc78241212621eb38bca8d41df9c6cd36f91293f23a231e913e46ff5253bd61feb43fbec55c75fa62d9bff430f9047313645a166d010613bc351012a8b551a7660591411cf85d6f82f3bb97150fe97da68726bbbd501bf833121bbd37b4f029d709b88093c30906b5132d65aa2731739380935f2796748e317d59c79f41ff4122297f0a1301ea85c3ac1fa35819891b2e9f3d079ca64e705fd7c28eeea595c5011ae2e90cbf5c3ac6e8de593ad6dbe7e403ed24d24f2fd4fdc057fb41938e33dedf52b0db44e0a501675ac05eafd9f267a234d90ec7f181835126a0508616f8f6e4e7f4fa71f1db73465e7cbb7c3a532076c3296bd5b065a7fc0df073f1061c66860e22f91261a9ace715f3b448ff1fa6aadb2cb3d7f56d8909257a96d71978b25250d1690083e003f9468051c976a9837788e9e743cfed3f8125efa0fea8119aafec1c24e6deaaf36104e6b95c6899c94df93aec9de881f9fcb882082ea5d8142d72802cd21bf5507cb33d3e98da1329214082822cbf4b85306d3e85d686241f2e68619fae490ca3d84f557624fb0977f9612bbb3115fcd9037745cf29304fadb759585d8c656f5e5390ce3fda2d12327bc081416b7fe758e83ce6c043e707169158cfe2226a1a53a57ceac7244e2f7b25eec4ba8d87c956fee8e9cd8238d12b5a44e987cb334d4bccbf17283e7af2f1f14f9bd9cd2f6c5ea58b2908293963b6d0ed578673c0accdd14b29e5fe61a0f4209dc97f5a8d0b4e9d8eed2320d39b5086923abc5bf2d92b800dfa574385d415fc97b7375352503d5e023414609af553aa29118e16c693e7a13dca02c22402f0c37448c88f84c34da7ac6ad9030e14514b8f2a611e89214e92d0d68bdeebecd136c164ba5ff0ad33977c1580ebfac8d768d005ef081712154534ae379a59a9887944d572a5c1f531b3eaf81ad7cc510f094a8e2418a098e084aa8c55a8a6d6c6c47316b86984a8816a10c8832ff3f42beb0c54544a7224fa765de70e01c78a87a9f0705666b0ab87bd7d0c3cc6656058fa2ff1d695134b656692310346ad67606851d19fc64b83250e5badcccdf37c1dd4ea4c4b3607f6453cfeb60fe4012d7793f5cfa6b648ce6d25cc9ccd6432308046e1691e5fff9e62996ded8cfd233b4d855f90f2addd763a42206e706e3c7cc8fde19239293ed5a69bcacda04ec3cb6c16c384f73e7c6e8fe5a1a1cb08de8a88fee66d6b2a2931aa639b60a3d812b4cf2c784302567c122a641d67ad9547ae3f22182a754e3004967a17cddf07858e405052c749bef546a33b34d5acdfabe449748569bc5140b56646aaa4447361959f0834371c0c9a9a959906b2bafb70cb044944afe8c46ed51534a74f615d432d256c7d8e710386076567b4d3bd9425e6a8e01b802e9f635483d712f33127cfdd69ba15eb32fc81ec5edcbc516a43865b2ec9b0af6e0525a9e6b5dc8b77e9d025f7de562bb7cb1d50de7223cf09f6eb17bec063e7f210d0ac63da1093b11b93ad666f1b9bf6a629468d5b832b6fc5de5e85827ed75c35eb2942f969589ceb612e7e1889cb6f58959d7b21c4d2e6d9a28a9c597e59f8b7eb4a4fdb1f87a03cb9d2bb16c865b7e82577cf3940ce818763633b5167249ef53f9792386e64bb33795d9ad6e94f8dc79e7d52a8be3c3e7a0ce9386971d0ee0042dcf7e10537a7c0d2aca7bdcd5df931248e5d02a173a75297b2e12e329545952dd93d667f928196d851f1c5be0effe961927c815a383b6c261a9605626c968825ab5c9a15ec7e173dbe5fedb59e25f094a5186ecf2dcafd88ded6b4384a03d39572710969020a012a5d1fa1d06918f2bda703f77e5fbb7bee0c10f422ba7639f017d73c6921c0d17172c1af40ba4ea2cc6859e0e64d5a268bfc979660f22109e18ebd2f9c86721d3d4eb6d7641e9da7c900379e97261680677f035864d4f1675eeada79e7c4b6f8072a1e92192510418648601c77dcebd27d3a199c7fe6c5b77698012d16ddcba4b2a0f89ae259c27c6b79e9b296eed2e7b0325b7c691278cc9d35091d665e7af24568f00bee690f6a7ed2c29982d030764b5bab9e2b28781262dee1f863554bba1756ef596134fbb1a7584d4ade1d27d945177419e0234d3fee081c945f393fc0ea667ae8ccbc1b8bded8e6817fb2cc19fb8732e55771ef66b5faebb30313913c9327d71afb5446ae7e2b1b87bc140d8acc2ea66451c93d87d7d2ebbb36dfacfe9903689e82a3bdfc31558f8c0016c5e6b81a62ed3f7f59b207403f6cd4277529f3f5a6bd8193eeb2f6406b6980f6da08686c086786c213c341afb6042a1f0ff6b66f5d69841c901eb83d6cfe38e1bba21fc5fa727a1b35e0edea2270a028f88f7fe3a93538768ceefe03e38458869399f3483377623e8fbda5ae63430b23da44163e5ad547d87b0e5a1856cdf05d382d7cd1c27e65e720faa4cebdd221330cfa4906626403e310ad9a320822c6f4dcbf2d52a8468e002a3b5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x18fc}, 0x1, 0x0, 0x0, 0x4000}, 0x4000090) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) socket(0x11, 0xa, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) getsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, &(0x7f0000000440)) (async) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) (async) sendmsg$nl_route_sched(r1, &(0x7f0000001a00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000019c0)={&(0x7f00000000c0)=@newchain={0x18fc, 0x64, 0x200, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xffed, 0xa}, {0x9, 0x9}, {0x2, 0x10}}, [@TCA_CHAIN={0x8, 0xb, 0x5}, @filter_kind_options=@f_flower={{0xb}, {0x38, 0x2, [@TCA_FLOWER_KEY_IPV4_DST_MASK={0x8, 0xd, 0xffffffff}, @TCA_FLOWER_KEY_SCTP_SRC={0x6}, @TCA_FLOWER_KEY_ICMPV6_TYPE={0x5}, @TCA_FLOWER_KEY_IPV6_SRC={0x14, 0xe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @TCA_FLOWER_KEY_ARP_TIP={0x8, 0x3b, @empty}]}}, @filter_kind_options=@f_flow={{0x9}, {0x5a4, 0x2, [@TCA_FLOW_POLICE={0x458, 0xa, 0x0, 0x1, [@TCA_POLICE_TBF={0x3c, 0x1, {0xfffffff8, 0x3, 0x7, 0x200, 0x100000, {0x5, 0x1, 0x800, 0x8000, 0x9, 0x8cf}, {0x3, 0x1, 0xcf, 0x9, 0x1, 0xffffffff}, 0x0, 0x4, 0xfffffffa}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x0, 0x7, 0xf23d, 0x6, 0x9166, 0x3f, 0x6, 0x3, 0x6, 0xfffffffa, 0x1, 0x20, 0x0, 0x0, 0xfffffffd, 0x0, 0x8001, 0x4, 0x6, 0x0, 0x56, 0x9, 0x8001, 0x3, 0x81, 0x2, 0x5, 0x7, 0x9, 0x7, 0x5, 0x7, 0xff, 0x10001, 0x4, 0x5, 0x2, 0x400, 0x2, 0x7ff, 0x7, 0x7, 0x100, 0x8, 0x9, 0x100, 0x3, 0x8, 0x80000001, 0x0, 0x8, 0x400, 0x2724, 0x8, 0x4, 0x1000, 0x3dd7, 0x8, 0x81, 0x8000, 0x2, 0x1, 0x6, 0x2, 0x80000000, 0xff, 0x4, 0x101, 0x3f, 0x81, 0xfffffff7, 0xffff, 0xffff, 0x1, 0x100, 0x0, 0x0, 0x2c7, 0xff, 0x26, 0x4, 0x4, 0x5, 0x6, 0xf230, 0x2, 0x274, 0x30a, 0x3, 0x20, 0xc3, 0x7b83, 0xed, 0x7f, 0x8f3, 0x4, 0x8, 0x4, 0x8, 0x6, 0x80000001, 0x100, 0xffffffff, 0x8, 0x7, 0x0, 0x5, 0xf522, 0x45fa, 0x3f, 0x8001, 0x8, 0xffff, 0xffffffe0, 0xfffffff9, 0x1000, 0x0, 0xfff, 0x800, 0x40, 0x1, 0x0, 0x0, 0x401, 0x1, 0xffffffff, 0x6, 0x80, 0x9, 0x5, 0x6, 0x41, 0x0, 0x3, 0x101, 0x5, 0x2, 0x2, 0x10000000, 0x1, 0x4, 0xfffffffa, 0x8001, 0x7fffffff, 0x5, 0x1, 0x218962a, 0x5, 0x2, 0xf8, 0x7, 0x3, 0x10001, 0x1000, 0x6, 0x9, 0x8001, 0x2ec7, 0x8, 0x0, 0x2, 0x6, 0x1, 0x400, 0x1b9, 0x5, 0x7, 0x4000, 0x400, 0x1, 0x9, 0xfffffffa, 0x6, 0x7fff, 0x40, 0xe00, 0x1000, 0x100, 0x87d, 0x8, 0x9, 0xfffffffb, 0x20, 0x9, 0x6, 0x1, 0x1, 0x2, 0x9c7, 0x8, 0x5, 0xd65f, 0x10001, 0x8, 0x3, 0xffffffff, 0x6, 0x7, 0x8, 0x101, 0x101, 0x8, 0x2, 0x2, 0x101, 0x40, 0x9, 0x6, 0x1, 0x7fff, 0x2, 0x1, 0x5cf, 0x80, 0x35e5e7c5, 0x7, 0x6e06a031, 0x800, 0x2, 0x2, 0x2, 0x7, 0x7, 0x4, 0x4c, 0x5, 0xfffffffd, 0x8001, 0x3, 0x5, 0x400, 0xffffff81, 0x4d, 0x3ff, 0x6da, 0x8, 0x1, 0x1, 0x5, 0x3, 0x101, 0x61, 0x6, 0x8, 0x3, 0x2, 0x7, 0x4, 0x6e, 0x3033, 0xfffffffa, 0x7f, 0x1f, 0x1, 0x7]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x400}]}, @TCA_FLOW_ACT={0x138, 0x9, 0x0, 0x1, [@m_ct={0x134, 0x1a, 0x0, 0x0, {{0x7}, {0x28, 0x2, 0x0, 0x1, [@TCA_CT_LABELS_MASK={0x14, 0x8, "b3057a624815895b49663995e0586d53"}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e23}, @TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @empty}]}, {0xe5, 0x6, "e16d6c52ae01190a1dbb2b3ac34ebd28a6df6236d811d2d5b3808be7df9c3f05f8d7829c396e94def408ef744c2b0c810f4d4573a4a1e0a9e74f8fc421fdcfe0c286b6a4b614ee45c528860d5b23b747bf3e04166e4a4e13cbb432a9764d50e2bbad6a804631da8e078784dadd474153e7070798c2eb5b1f6ebb276e9c6aa2dff1a537beb873283f1604183824dabb375649e2b92fb3c41c4c7bd38be3261a4bc7d92e7c278705f8b16e89db294486f2e5057f9f48f21e4d8195464ac32805bbf1dc8419f4a50109046857a844ce31ac1369441d6944c4d02d921d4906e4feec5e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_FLOW_XOR={0x8, 0x7, 0x3}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xb, 0xfff1}}]}}, @TCA_RATE={0x6, 0x5, {0x7f, 0x5}}, @filter_kind_options=@f_fw={{0x7}, {0x12cc, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'geneve1\x00'}, @TCA_FW_ACT={0x12b4, 0x4, [@m_csum={0xf8, 0x1, 0x0, 0x0, {{0x9}, {0xac, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x6cf, 0x4, 0x6, 0x5, 0x4}, 0x32}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1f, 0x977, 0x2, 0x4, 0x2}, 0x6c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x20, 0x5, 0xffffffff, 0x9}, 0x14}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x6, 0x7, 0x4, 0x2}, 0x56}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x400, 0x0, 0x1, 0x1ff, 0x7}, 0x12}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x114, 0x3, 0x0, 0x4, 0xc0000000}, 0xf}}]}, {0x22, 0x6, "1e520aff1e08abb2f9f22d98a18ce4687cd77068af8d8f1da59fb7e8331c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3ab0b73e37cc5495, 0x1}}}}, @m_vlan={0x148, 0x11, 0x0, 0x0, {{0x9}, {0x74, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x2, 0x3, 0x0, 0x5}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xc6d}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x1ba, 0x5, 0x9a5}, 0x1}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}]}, {0xaa, 0x6, "3e025e5b27fb84ae82f1e2999aa01472683a0810747e7c04f61f87c4b394a2650fd271e4bd6facbb7633323c4f47e293f1115ffc8d711d57b80dbb4f5ad74fcb6573433b71ef76c91fc0b5ea93c9666835a8ad1f230e559eb1d40361c2a8d65cc2181f717e6d68b3d2330443ff70be74559fc58774cd45ddf8323521dbd639ea4a87cebb1f88172314a7d86770bdee3a0db43614d266be4375a652a7f7efea46fe85e6efa5ce"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_tunnel_key={0x1070, 0xa, 0x0, 0x0, {{0xf}, {0x40, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x10001}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @local}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e20}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x32}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @multicast1}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x18fc}, 0x1, 0x0, 0x0, 0x4000}, 0x4000090) (async) 08:05:31 executing program 5: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) 08:05:31 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x80000) r1 = socket(0x11, 0xa, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x2000208, 0x1) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE(r4, 0xab02, 0xf38) 08:05:31 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) 08:05:31 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_PRINT_DEBUG(r5, 0xab06) ioctl$NBD_DO_IT(r4, 0xab03) 08:05:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) ioctl$NBD_DO_IT(r0, 0xab03) 08:05:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r1 = socket(0x11, 0xa, 0x0) (async) r2 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, &(0x7f0000000440)) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001a00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000019c0)={&(0x7f00000000c0)=@newchain={0x18fc, 0x64, 0x200, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xffed, 0xa}, {0x9, 0x9}, {0x2, 0x10}}, [@TCA_CHAIN={0x8, 0xb, 0x5}, @filter_kind_options=@f_flower={{0xb}, {0x38, 0x2, [@TCA_FLOWER_KEY_IPV4_DST_MASK={0x8, 0xd, 0xffffffff}, @TCA_FLOWER_KEY_SCTP_SRC={0x6}, @TCA_FLOWER_KEY_ICMPV6_TYPE={0x5}, @TCA_FLOWER_KEY_IPV6_SRC={0x14, 0xe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @TCA_FLOWER_KEY_ARP_TIP={0x8, 0x3b, @empty}]}}, @filter_kind_options=@f_flow={{0x9}, {0x5a4, 0x2, [@TCA_FLOW_POLICE={0x458, 0xa, 0x0, 0x1, [@TCA_POLICE_TBF={0x3c, 0x1, {0xfffffff8, 0x3, 0x7, 0x200, 0x100000, {0x5, 0x1, 0x800, 0x8000, 0x9, 0x8cf}, {0x3, 0x1, 0xcf, 0x9, 0x1, 0xffffffff}, 0x0, 0x4, 0xfffffffa}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x0, 0x7, 0xf23d, 0x6, 0x9166, 0x3f, 0x6, 0x3, 0x6, 0xfffffffa, 0x1, 0x20, 0x0, 0x0, 0xfffffffd, 0x0, 0x8001, 0x4, 0x6, 0x0, 0x56, 0x9, 0x8001, 0x3, 0x81, 0x2, 0x5, 0x7, 0x9, 0x7, 0x5, 0x7, 0xff, 0x10001, 0x4, 0x5, 0x2, 0x400, 0x2, 0x7ff, 0x7, 0x7, 0x100, 0x8, 0x9, 0x100, 0x3, 0x8, 0x80000001, 0x0, 0x8, 0x400, 0x2724, 0x8, 0x4, 0x1000, 0x3dd7, 0x8, 0x81, 0x8000, 0x2, 0x1, 0x6, 0x2, 0x80000000, 0xff, 0x4, 0x101, 0x3f, 0x81, 0xfffffff7, 0xffff, 0xffff, 0x1, 0x100, 0x0, 0x0, 0x2c7, 0xff, 0x26, 0x4, 0x4, 0x5, 0x6, 0xf230, 0x2, 0x274, 0x30a, 0x3, 0x20, 0xc3, 0x7b83, 0xed, 0x7f, 0x8f3, 0x4, 0x8, 0x4, 0x8, 0x6, 0x80000001, 0x100, 0xffffffff, 0x8, 0x7, 0x0, 0x5, 0xf522, 0x45fa, 0x3f, 0x8001, 0x8, 0xffff, 0xffffffe0, 0xfffffff9, 0x1000, 0x0, 0xfff, 0x800, 0x40, 0x1, 0x0, 0x0, 0x401, 0x1, 0xffffffff, 0x6, 0x80, 0x9, 0x5, 0x6, 0x41, 0x0, 0x3, 0x101, 0x5, 0x2, 0x2, 0x10000000, 0x1, 0x4, 0xfffffffa, 0x8001, 0x7fffffff, 0x5, 0x1, 0x218962a, 0x5, 0x2, 0xf8, 0x7, 0x3, 0x10001, 0x1000, 0x6, 0x9, 0x8001, 0x2ec7, 0x8, 0x0, 0x2, 0x6, 0x1, 0x400, 0x1b9, 0x5, 0x7, 0x4000, 0x400, 0x1, 0x9, 0xfffffffa, 0x6, 0x7fff, 0x40, 0xe00, 0x1000, 0x100, 0x87d, 0x8, 0x9, 0xfffffffb, 0x20, 0x9, 0x6, 0x1, 0x1, 0x2, 0x9c7, 0x8, 0x5, 0xd65f, 0x10001, 0x8, 0x3, 0xffffffff, 0x6, 0x7, 0x8, 0x101, 0x101, 0x8, 0x2, 0x2, 0x101, 0x40, 0x9, 0x6, 0x1, 0x7fff, 0x2, 0x1, 0x5cf, 0x80, 0x35e5e7c5, 0x7, 0x6e06a031, 0x800, 0x2, 0x2, 0x2, 0x7, 0x7, 0x4, 0x4c, 0x5, 0xfffffffd, 0x8001, 0x3, 0x5, 0x400, 0xffffff81, 0x4d, 0x3ff, 0x6da, 0x8, 0x1, 0x1, 0x5, 0x3, 0x101, 0x61, 0x6, 0x8, 0x3, 0x2, 0x7, 0x4, 0x6e, 0x3033, 0xfffffffa, 0x7f, 0x1f, 0x1, 0x7]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x400}]}, @TCA_FLOW_ACT={0x138, 0x9, 0x0, 0x1, [@m_ct={0x134, 0x1a, 0x0, 0x0, {{0x7}, {0x28, 0x2, 0x0, 0x1, [@TCA_CT_LABELS_MASK={0x14, 0x8, "b3057a624815895b49663995e0586d53"}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e23}, @TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @empty}]}, {0xe5, 0x6, "e16d6c52ae01190a1dbb2b3ac34ebd28a6df6236d811d2d5b3808be7df9c3f05f8d7829c396e94def408ef744c2b0c810f4d4573a4a1e0a9e74f8fc421fdcfe0c286b6a4b614ee45c528860d5b23b747bf3e04166e4a4e13cbb432a9764d50e2bbad6a804631da8e078784dadd474153e7070798c2eb5b1f6ebb276e9c6aa2dff1a537beb873283f1604183824dabb375649e2b92fb3c41c4c7bd38be3261a4bc7d92e7c278705f8b16e89db294486f2e5057f9f48f21e4d8195464ac32805bbf1dc8419f4a50109046857a844ce31ac1369441d6944c4d02d921d4906e4feec5e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_FLOW_XOR={0x8, 0x7, 0x3}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xb, 0xfff1}}]}}, @TCA_RATE={0x6, 0x5, {0x7f, 0x5}}, @filter_kind_options=@f_fw={{0x7}, {0x12cc, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'geneve1\x00'}, @TCA_FW_ACT={0x12b4, 0x4, [@m_csum={0xf8, 0x1, 0x0, 0x0, {{0x9}, {0xac, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x6cf, 0x4, 0x6, 0x5, 0x4}, 0x32}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1f, 0x977, 0x2, 0x4, 0x2}, 0x6c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x20, 0x5, 0xffffffff, 0x9}, 0x14}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x6, 0x7, 0x4, 0x2}, 0x56}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x400, 0x0, 0x1, 0x1ff, 0x7}, 0x12}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x114, 0x3, 0x0, 0x4, 0xc0000000}, 0xf}}]}, {0x22, 0x6, "1e520aff1e08abb2f9f22d98a18ce4687cd77068af8d8f1da59fb7e8331c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3ab0b73e37cc5495, 0x1}}}}, @m_vlan={0x148, 0x11, 0x0, 0x0, {{0x9}, {0x74, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x2, 0x3, 0x0, 0x5}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xc6d}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x1ba, 0x5, 0x9a5}, 0x1}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}]}, {0xaa, 0x6, "3e025e5b27fb84ae82f1e2999aa01472683a0810747e7c04f61f87c4b394a2650fd271e4bd6facbb7633323c4f47e293f1115ffc8d711d57b80dbb4f5ad74fcb6573433b71ef76c91fc0b5ea93c9666835a8ad1f230e559eb1d40361c2a8d65cc2181f717e6d68b3d2330443ff70be74559fc58774cd45ddf8323521dbd639ea4a87cebb1f88172314a7d86770bdee3a0db43614d266be4375a652a7f7efea46fe85e6efa5ce"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_tunnel_key={0x1070, 0xa, 0x0, 0x0, {{0xf}, {0x40, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x10001}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @local}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e20}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x32}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @multicast1}]}, {0x1004, 0x6, "bf57f1428c532003a1f8a7c499f27c19a3251dee8066408277b466c9bf0847076b8bfb0325ecd82d782fe4ba6ac742c9f4a5962f53069d995f527d35d2a34f078d9b00ec62079ec4c02320d670f350383891a3c281ea419f483f3ff92843ea688f796d197b45bbb533bccfec945fa2bc42c5327705762ca8c29627f2e48310941abc0ddec73f0d17d1eda16c6d520685ba6c00e4c535345ba0d945e590739e6fa28613fd3af2de450805bbd2ba1da88e05af4c285229bde0b1a99d7578657ab6366d003edc17b203e599ba343a5a439b8a85e01243579a1152406eb2356c5ee41327326b1a48bf9bd044d61eeafab828c65483f62d01d00d6a7f0d4c298ce4b0ae2cca602aae2b536e7c0d9cbc2b4561b66e295ae718b6adffab29b517dda69d00ed5d678fa5b542830488386ffd0aa56392877fb1a8ddbbc612cff92dd2024ad9692313344926255d13e7209ae175c0eb4b0baca8d93bd000106a03696105b035c603c11a3af7fcefa3178fc58eb72da40069e4e29b0671a0c6853555ca0850dc65d48816b64b2f0a853ffe4ea79c2f06992a76919a72125ad05e60e0c3f2cc0d2f3945c1bd686a7c7cb07ecfdbfa6d2bc20f2b204e99b6ac78c3a90cc8d1dea3d7150b6cc7cf0f87a99988bc77ea60a6db3cae0ec4e65f97074831fb8e1a257ea65b8d942261bdde3818efeb3a9300bf220aa6d9ac6588b2c9618fb8e99bed661803da8f5e5b36f22af9a25fa0039d2375f9598046341f0f16e767de7dd620c19f944a347aa5f7ac6fda96a858b639bcb2fd3bd76999501c381d0e5e55747ef165b3a04ff6c9da0c9083089e899d931aa57036a49e8f85cc6da1d3907af83418dc8e97ffc8dddcc9a8d403f5e57aa8d553b583285abc6eb1556cd6980c9522b99f038ed0bbc87ea18581effd9793fdf57395288eb350aa8288ba11a19eae29cb06868d7d305e32357ba6ce5431fb2b5eb1f1ba2f025db1a9bc75d9c2b94389e798db8a70dc04cd727b655709af8513a3d64f1a81987092a6af9b7d0bcc0b041db3ba04ed1bdbb74d3973b6840214d5927f8a21c3c87d0297241da9628aaa3686d2204498b7f16d8e6d9b1bac6077a09cb34055034c3f0ddf90a07207da563a0b23b4d670324a1ab9c94a22c1211961a6a2b1d7a2cf8bf8371a211002073cca61ee1d188497046a95f3570708167d3ad2745be0a2200334591addad95823a4cbfe5059be5d0f1fd01d90a5dffd6dbaea3423675b0b675dd87f25debe09c837a9633ba4428dd9d4073398ddcd4a2b2f9b5411fb437ae768e91717eaec200e16c661987c972b4d8aebe6aa855f2165f9975d6b32e66b8005e429f7f103059e131f261720bf527ff4c54c14c3b6779e7e88a507cbe26774ea593f7b1ba2111006179785e66d1ccc87a18e5ade924a8fb129d48294b9e5f2d3687ac99547976cf2204cbc44bdf2b33fa7e47a2ed845cf7d5f895fd4193316d9ee65117a8e47e3e1b78b1bead1dd35cc7b678185ce9f13bfc1647d2c29a5692e12102fa46b0dc479707023045f9038d6a31500a0d4a9607fbed6c94f6c4e920b634f6820ff0a404e453d54eeb3ffd56f65e53bc3c4e99205dc1b83e86e219f00114e840e8dbd5f69d4e378c6bef55ad224c6289064497d63f2d946f92adc22eba789048eb324920a35e68e16faa0088831f15791d386093fc11d7502b67013aa41b5f3e39cfea4b7775036db3f64495c90616a375f6ab02b784a7e49b66b196b0a2c197e448fd9ca1888ddf4d79eef5ef2b15e7ae51b50ef6d50ea0ed1921774b03d2f64e88d2d1c61823d5a77bfc9262b22e7bee8575a22dd3f686f44e3cdcddb6f42065a6c8e6de6ed4206e1d97fedf194ba920586991e2f2c8cc40458d65027651f62428f5f559b0d04bbfde760edf1a94b87e49c5b1d9179223f30e7706248e4ef96c97f5cc8dce0db02dadb657ae24cf122f6f6845a097942b52377e0b3586fec5c417a4d32b81768faeb82c34a9cb5f0a020af4379d3fff0f2e3a7b4ee53d6d728b0d8161382e4aacf329b22dc3add0985102af84f218ba49848fae35e29dfcc20fa072ac53e1177235fb59fe3b7e25bd3d0fab99efb9ac791d696c211cbc64028411792699ea3fec0d7803f209e92f9e6c86faf651e2a74216fcf07d8760a9c4a9af332174105cd812a1f2d035b5ab28e965e76c479ccc513b607c5ad502323eab4866a6948f46027b1b4e89319e023087de8eb0702eea9347e56c3d92d7ca06ca3259ca0b5a502e9d0d0e087de7233b1bcc230793a1da1ce91f0cad958cb4e832f518e7b6a5dbde021f4171856b313b7ec88ecac523cb4e445e1b543eff3b78f6adae84be52564148259345c1ae9f5aaeb552a1e972533829054a0d55abc6a5bbdf518c3f9f6f440932c8e67f35477abd22147d4ea4c34171dd496961ba30df88f50693d8c867a58881e6a593355a3910a8c1d06d0c209d544fec5b1224bf0e98130648e72746176973168e6d7e456b471be8b8532d59d19ad0a6bd6b9a311bd0b6a69e54b9c417ed1784739d9cdac7fc09422f334b60874013db97eb95f3e5f7d3b15ee24a0a7f4880f54661eca5a734564a1d2b3c73e1682db1fe2bf236e778847a2f39fe0d380c35db5c68a8be795880404f9f19fb3e48bf84590b50de71c3ee9ee920b7768197e5b26f5fc407a26da79746bbac2ccf2c3ffc1f277a8b96e246af6c389a44396cdc5dfb6e8aa85cd0603f9176861e9787d68b95bb12a4c382a4abab51babe1317a0132a28ea6445ef81902ba3d1c363538038ec74ce2fb312b2efa24b5b55f0ef2734f78d31cc5f4ff13aa72a6cf3b9dc078c1c2b91fa1e51b57bec51e49bce5681839526722ec2188d4aa388e7367452e4c2fbcbdbf1d178c87c20e79dd94dfa4dfd6a6b3b33821d7f3a99b70e0248a79c4c6711995fe9686fb596114bbe958399121716115230f5a36da0188ec428e8b5a11102c6ee2ab9ae7de3086a28815a6c20bbe85b90a26d737acb12e0412434fdb362bd126c68288ca1b55ffcf10ddf3b8fba0eb778c7d7aa5ae586ec08b2e1144087719103b2ead44e2bd501aea7eb7ac82dbd2aaa137571f71f9b232d8b1ed819f0d23990738f292a4aecc7b5bca495de087dde4ebf90a6ab3e4c2bd6a732234da9b6dcd3963a076946d17fafc68295f2be58a60aae7ca07cb4c517a9994f0a7c73f7c9a9c30dfe75f8f981ae3cdf6f4c4ecacbeca9d4a456655fa41dc5d4a18ed941ed18eaa16a198942f72c3fa61aca41311255aef38d45cac5aade4a2a44b65e249b1abc78241212621eb38bca8d41df9c6cd36f91293f23a231e913e46ff5253bd61feb43fbec55c75fa62d9bff430f9047313645a166d010613bc351012a8b551a7660591411cf85d6f82f3bb97150fe97da68726bbbd501bf833121bbd37b4f029d709b88093c30906b5132d65aa2731739380935f2796748e317d59c79f41ff4122297f0a1301ea85c3ac1fa35819891b2e9f3d079ca64e705fd7c28eeea595c5011ae2e90cbf5c3ac6e8de593ad6dbe7e403ed24d24f2fd4fdc057fb41938e33dedf52b0db44e0a501675ac05eafd9f267a234d90ec7f181835126a0508616f8f6e4e7f4fa71f1db73465e7cbb7c3a532076c3296bd5b065a7fc0df073f1061c66860e22f91261a9ace715f3b448ff1fa6aadb2cb3d7f56d8909257a96d71978b25250d1690083e003f9468051c976a9837788e9e743cfed3f8125efa0fea8119aafec1c24e6deaaf36104e6b95c6899c94df93aec9de881f9fcb882082ea5d8142d72802cd21bf5507cb33d3e98da1329214082822cbf4b85306d3e85d686241f2e68619fae490ca3d84f557624fb0977f9612bbb3115fcd9037745cf29304fadb759585d8c656f5e5390ce3fda2d12327bc081416b7fe758e83ce6c043e707169158cfe2226a1a53a57ceac7244e2f7b25eec4ba8d87c956fee8e9cd8238d12b5a44e987cb334d4bccbf17283e7af2f1f14f9bd9cd2f6c5ea58b2908293963b6d0ed578673c0accdd14b29e5fe61a0f4209dc97f5a8d0b4e9d8eed2320d39b5086923abc5bf2d92b800dfa574385d415fc97b7375352503d5e023414609af553aa29118e16c693e7a13dca02c22402f0c37448c88f84c34da7ac6ad9030e14514b8f2a611e89214e92d0d68bdeebecd136c164ba5ff0ad33977c1580ebfac8d768d005ef081712154534ae379a59a9887944d572a5c1f531b3eaf81ad7cc510f094a8e2418a098e084aa8c55a8a6d6c6c47316b86984a8816a10c8832ff3f42beb0c54544a7224fa765de70e01c78a87a9f0705666b0ab87bd7d0c3cc6656058fa2ff1d695134b656692310346ad67606851d19fc64b83250e5badcccdf37c1dd4ea4c4b3607f6453cfeb60fe4012d7793f5cfa6b648ce6d25cc9ccd6432308046e1691e5fff9e62996ded8cfd233b4d855f90f2addd763a42206e706e3c7cc8fde19239293ed5a69bcacda04ec3cb6c16c384f73e7c6e8fe5a1a1cb08de8a88fee66d6b2a2931aa639b60a3d812b4cf2c784302567c122a641d67ad9547ae3f22182a754e3004967a17cddf07858e405052c749bef546a33b34d5acdfabe449748569bc5140b56646aaa4447361959f0834371c0c9a9a959906b2bafb70cb044944afe8c46ed51534a74f615d432d256c7d8e710386076567b4d3bd9425e6a8e01b802e9f635483d712f33127cfdd69ba15eb32fc81ec5edcbc516a43865b2ec9b0af6e0525a9e6b5dc8b77e9d025f7de562bb7cb1d50de7223cf09f6eb17bec063e7f210d0ac63da1093b11b93ad666f1b9bf6a629468d5b832b6fc5de5e85827ed75c35eb2942f969589ceb612e7e1889cb6f58959d7b21c4d2e6d9a28a9c597e59f8b7eb4a4fdb1f87a03cb9d2bb16c865b7e82577cf3940ce818763633b5167249ef53f9792386e64bb33795d9ad6e94f8dc79e7d52a8be3c3e7a0ce9386971d0ee0042dcf7e10537a7c0d2aca7bdcd5df931248e5d02a173a75297b2e12e329545952dd93d667f928196d851f1c5be0effe961927c815a383b6c261a9605626c968825ab5c9a15ec7e173dbe5fedb59e25f094a5186ecf2dcafd88ded6b4384a03d39572710969020a012a5d1fa1d06918f2bda703f77e5fbb7bee0c10f422ba7639f017d73c6921c0d17172c1af40ba4ea2cc6859e0e64d5a268bfc979660f22109e18ebd2f9c86721d3d4eb6d7641e9da7c900379e97261680677f035864d4f1675eeada79e7c4b6f8072a1e92192510418648601c77dcebd27d3a199c7fe6c5b77698012d16ddcba4b2a0f89ae259c27c6b79e9b296eed2e7b0325b7c691278cc9d35091d665e7af24568f00bee690f6a7ed2c29982d030764b5bab9e2b28781262dee1f863554bba1756ef596134fbb1a7584d4ade1d27d945177419e0234d3fee081c945f393fc0ea667ae8ccbc1b8bded8e6817fb2cc19fb8732e55771ef66b5faebb30313913c9327d71afb5446ae7e2b1b87bc140d8acc2ea66451c93d87d7d2ebbb36dfacfe9903689e82a3bdfc31558f8c0016c5e6b81a62ed3f7f59b207403f6cd4277529f3f5a6bd8193eeb2f6406b6980f6da08686c086786c213c341afb6042a1f0ff6b66f5d69841c901eb83d6cfe38e1bba21fc5fa727a1b35e0edea2270a028f88f7fe3a93538768ceefe03e38458869399f3483377623e8fbda5ae63430b23da44163e5ad547d87b0e5a1856cdf05d382d7cd1c27e65e720faa4cebdd221330cfa4906626403e310ad9a320822c6f4dcbf2d52a8468e002a3b5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x18fc}, 0x1, 0x0, 0x0, 0x4000}, 0x4000090) 08:05:31 executing program 5: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) [ 221.316751] [ 221.318414] ====================================================== [ 221.324716] WARNING: possible circular locking dependency detected [ 221.331022] 4.14.307-syzkaller #0 Not tainted [ 221.335506] ------------------------------------------------------ [ 221.341812] syz-executor.1/11918 is trying to acquire lock: [ 221.347505] (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1b/0x40 [ 221.356003] [ 221.356003] but task is already holding lock: [ 221.363181] (&nbd->config_lock){+.+.}, at: [] nbd_ioctl+0x11f/0xad0 [ 221.371240] [ 221.371240] which lock already depends on the new lock. [ 221.371240] [ 221.379543] [ 221.379543] the existing dependency chain (in reverse order) is: [ 221.387151] [ 221.387151] -> #2 (&nbd->config_lock){+.+.}: [ 221.393051] __mutex_lock+0xc4/0x1310 [ 221.397372] nbd_open+0x1ac/0x370 [ 221.401338] __blkdev_get+0x306/0x1090 [ 221.407046] blkdev_get+0x88/0x890 [ 221.411103] blkdev_open+0x1cc/0x250 [ 221.415329] do_dentry_open+0x44b/0xec0 [ 221.419826] vfs_open+0x105/0x220 [ 221.423792] path_openat+0x628/0x2970 [ 221.428105] do_filp_open+0x179/0x3c0 [ 221.432415] do_sys_open+0x296/0x410 [ 221.436641] do_syscall_64+0x1d5/0x640 [ 221.441046] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 221.446738] [ 221.446738] -> #1 (nbd_index_mutex){+.+.}: [ 221.452453] __mutex_lock+0xc4/0x1310 [ 221.456763] nbd_open+0x1e/0x370 [ 221.460628] __blkdev_get+0x306/0x1090 [ 221.465040] blkdev_get+0x88/0x890 [ 221.469081] blkdev_open+0x1cc/0x250 [ 221.473295] do_dentry_open+0x44b/0xec0 [ 221.477772] vfs_open+0x105/0x220 [ 221.481719] path_openat+0x628/0x2970 [ 221.486020] do_filp_open+0x179/0x3c0 [ 221.490314] do_sys_open+0x296/0x410 [ 221.494524] do_syscall_64+0x1d5/0x640 [ 221.498906] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 221.504585] [ 221.504585] -> #0 (&bdev->bd_mutex){+.+.}: [ 221.510280] lock_acquire+0x170/0x3f0 [ 221.514587] __mutex_lock+0xc4/0x1310 [ 221.518892] blkdev_reread_part+0x1b/0x40 [ 221.523530] nbd_ioctl+0x802/0xad0 [ 221.527561] blkdev_ioctl+0x540/0x1830 [ 221.531943] block_ioctl+0xd9/0x120 [ 221.536064] do_vfs_ioctl+0x75a/0xff0 [ 221.540355] SyS_ioctl+0x7f/0xb0 [ 221.544223] do_syscall_64+0x1d5/0x640 [ 221.548612] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 221.554296] [ 221.554296] other info that might help us debug this: [ 221.554296] [ 221.562404] Chain exists of: [ 221.562404] &bdev->bd_mutex --> nbd_index_mutex --> &nbd->config_lock [ 221.562404] [ 221.574778] Possible unsafe locking scenario: [ 221.574778] [ 221.580816] CPU0 CPU1 [ 221.585454] ---- ---- [ 221.590091] lock(&nbd->config_lock); [ 221.595163] lock(nbd_index_mutex); [ 221.601368] lock(&nbd->config_lock); [ 221.607746] lock(&bdev->bd_mutex); [ 221.611441] [ 221.611441] *** DEADLOCK *** [ 221.611441] [ 221.617472] 1 lock held by syz-executor.1/11918: [ 221.622197] #0: (&nbd->config_lock){+.+.}, at: [] nbd_ioctl+0x11f/0xad0 [ 221.630670] [ 221.630670] stack backtrace: [ 221.635145] CPU: 0 PID: 11918 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 221.643003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 221.652345] Call Trace: [ 221.654920] dump_stack+0x1b2/0x281 [ 221.658544] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 221.664352] __lock_acquire+0x2e0e/0x3f20 [ 221.668497] ? trace_hardirqs_on+0x10/0x10 [ 221.672728] ? add_lock_to_list.constprop.0+0x17d/0x330 [ 221.678076] ? save_trace+0xd6/0x290 [ 221.681800] lock_acquire+0x170/0x3f0 [ 221.685589] ? blkdev_reread_part+0x1b/0x40 [ 221.689897] ? blkdev_reread_part+0x1b/0x40 [ 221.694213] __mutex_lock+0xc4/0x1310 [ 221.698026] ? blkdev_reread_part+0x1b/0x40 [ 221.702462] ? __get_super.part.0+0xbb/0x390 [ 221.706882] ? blkdev_reread_part+0x1b/0x40 [ 221.711229] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 221.716669] ? lock_downgrade+0x740/0x740 [ 221.721254] ? nbd_ioctl+0x7e7/0xad0 [ 221.724950] ? lock_downgrade+0x740/0x740 [ 221.729092] blkdev_reread_part+0x1b/0x40 [ 221.733236] nbd_ioctl+0x802/0xad0 [ 221.736758] ? trace_hardirqs_on+0x10/0x10 [ 221.740980] ? trace_hardirqs_on+0x10/0x10 [ 221.745196] ? nbd_disconnect_and_put+0x140/0x140 [ 221.750041] ? __lock_acquire+0x5fc/0x3f20 [ 221.754251] ? do_futex+0x127/0x1570 [ 221.757942] ? nbd_disconnect_and_put+0x140/0x140 [ 221.762762] blkdev_ioctl+0x540/0x1830 [ 221.766623] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 221.772051] ? blkpg_ioctl+0x8d0/0x8d0 [ 221.775912] ? trace_hardirqs_on+0x10/0x10 [ 221.780127] ? __lockdep_init_map+0x100/0x560 [ 221.784611] ? futex_exit_release+0x220/0x220 [ 221.789097] ? lock_acquire+0x170/0x3f0 [ 221.793187] block_ioctl+0xd9/0x120 [ 221.796802] ? blkdev_fallocate+0x3a0/0x3a0 [ 221.801101] do_vfs_ioctl+0x75a/0xff0 [ 221.805042] ? lock_acquire+0x170/0x3f0 [ 221.809005] ? ioctl_preallocate+0x1a0/0x1a0 [ 221.813424] ? __fget+0x265/0x3e0 [ 221.816854] ? do_vfs_ioctl+0xff0/0xff0 [ 221.820817] ? security_file_ioctl+0x83/0xb0 [ 221.825201] SyS_ioctl+0x7f/0xb0 [ 221.828571] ? do_vfs_ioctl+0xff0/0xff0 [ 221.832529] do_syscall_64+0x1d5/0x640 [ 221.836395] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 221.841559] RIP: 0033:0x7f8c2bf4e0f9 [ 221.845242] RSP: 002b:00007f8c2a4c0168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 221.852941] RAX: ffffffffffffffda RBX: 00007f8c2c06df80 RCX: 00007f8c2bf4e0f9 [ 221.860903] RDX: 0000000000000000 RSI: 000000000000ab04 RDI: 0000000000000003 08:05:32 executing program 5: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) 08:05:32 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) (rerun: 32) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async, rerun: 32) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (rerun: 32) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$NBD_PRINT_DEBUG(r5, 0xab06) (rerun: 64) ioctl$NBD_DO_IT(r4, 0xab03) 08:05:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_PRINT_DEBUG(r5, 0xab06) ioctl$NBD_DO_IT(r4, 0xab03) 08:05:32 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffffffd) 08:05:32 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x444, 0x3f3, 0x400, 0x70bd25, 0x25dfdbfb, {0x10, 0x1, 0x22, [0x7, 0x3ff, 0x4, 0x6, 0x3f, 0x8000, 0x7, 0x5, 0x8, 0xfff, 0x5, 0xffffffff, 0xffff, 0xcea, 0x3, 0x10000, 0x0, 0x101, 0x5, 0x800, 0xe6e, 0x4, 0x3694, 0x3, 0x0, 0x8f, 0x7, 0x4, 0x3f, 0x2, 0x92bb, 0x8001, 0xba4a, 0x1, 0x1c88, 0x5b94, 0x4, 0xffffffff, 0xff, 0x74, 0x8001, 0x21e8e7e7, 0x9, 0x3f, 0x4f07e747, 0x0, 0xffffffff, 0xffff, 0x80000000, 0xffffffe1, 0x6, 0xa7, 0x2, 0xc5c, 0x2a7, 0x3, 0x9b2, 0x100, 0x7, 0x8, 0x3, 0x24c0000, 0x7, 0x7], [0x4a, 0x6, 0x2, 0xffffffff, 0xfffffff8, 0x6, 0xef64, 0xb61, 0xfff, 0x5, 0x20, 0x1, 0x5, 0x18, 0x9, 0x4, 0xef5, 0xffffffff, 0x72, 0x9, 0x6, 0x7, 0x697, 0x4, 0xffffff01, 0x8001, 0x5, 0x78b6, 0xb1c0, 0x7, 0xb2, 0x46, 0x3f, 0x6, 0x1f, 0x1f, 0x10000, 0x7f, 0x5, 0x1, 0x80000000, 0xff, 0x800, 0x8, 0xfffff5e4, 0x7, 0xfffffff7, 0x401, 0x5, 0x20, 0xd768, 0x5, 0x101, 0x7ff, 0x5ddb, 0x8a3, 0x1ff, 0x7, 0x7, 0x4, 0xfffffffc, 0x40, 0x9, 0x3], [0xff, 0x80000001, 0x760, 0x4e8, 0x1, 0x8, 0x3, 0x4, 0x0, 0x4, 0x9, 0x1, 0x3, 0x200, 0x7, 0x5, 0x7ff, 0x40, 0x18, 0x371ad7eb, 0x7fffffff, 0x0, 0xffff, 0x3, 0x9, 0x7, 0x4c4, 0x80, 0x1, 0x9, 0x9, 0x2, 0x3, 0x6, 0x3f, 0x7ff, 0x825, 0x6, 0x1ff, 0x7, 0x5, 0x2, 0x8, 0x9, 0x9, 0x0, 0x8000, 0x0, 0x1, 0x9, 0x4, 0x0, 0x5, 0x9, 0x7f, 0x80000000, 0x9, 0x200, 0x82cc, 0x33b8, 0xfb2e, 0x83, 0x129f, 0x3], [0x267e, 0x10001, 0x7fffffff, 0x4, 0x9, 0x7f, 0x9, 0x2, 0x4, 0x2, 0x879, 0x4, 0x400, 0x1f, 0x100, 0x5, 0x2, 0x2, 0x7, 0x40, 0x8, 0x3f, 0xf59, 0xdcf, 0x2c74, 0x5a8d, 0x1, 0x7, 0xfffffffc, 0xff, 0x4, 0x0, 0x53400, 0x1ea9d357, 0x5, 0xd92, 0x800, 0x3ff, 0x5, 0x3, 0xc1, 0x1, 0x1, 0x0, 0x3, 0x30, 0x0, 0x9, 0x3d9d, 0x1, 0x2, 0x6, 0x3ca, 0x1, 0x0, 0x2, 0x8, 0x5, 0xffff, 0x4, 0x7, 0xffffffff, 0x6, 0xfffffffd], 0x21, ['&-\\.\x8f]!-+@/)@\x00', '/proc/cgroups\x00', '\x00', '*D)\x00']}, ["", "", "", "", "", "", "", ""]}, 0x444}, 0x1, 0x0, 0x0, 0x40880}, 0x4000004) [ 221.868161] RBP: 00007f8c2bfa9ae9 R08: 0000000000000000 R09: 0000000000000000 [ 221.875415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 221.882662] R13: 00007ffefa3cde2f R14: 00007f8c2a4c0300 R15: 0000000000022000 08:05:32 executing program 5: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) 08:05:32 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x80000) r1 = socket(0x11, 0xa, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) (async) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) (async, rerun: 64) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) (async, rerun: 64) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x2000208, 0x1) (async) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) (async, rerun: 64) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (rerun: 64) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE(r4, 0xab02, 0xf38) 08:05:32 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x444, 0x3f3, 0x400, 0x70bd25, 0x25dfdbfb, {0x10, 0x1, 0x22, [0x7, 0x3ff, 0x4, 0x6, 0x3f, 0x8000, 0x7, 0x5, 0x8, 0xfff, 0x5, 0xffffffff, 0xffff, 0xcea, 0x3, 0x10000, 0x0, 0x101, 0x5, 0x800, 0xe6e, 0x4, 0x3694, 0x3, 0x0, 0x8f, 0x7, 0x4, 0x3f, 0x2, 0x92bb, 0x8001, 0xba4a, 0x1, 0x1c88, 0x5b94, 0x4, 0xffffffff, 0xff, 0x74, 0x8001, 0x21e8e7e7, 0x9, 0x3f, 0x4f07e747, 0x0, 0xffffffff, 0xffff, 0x80000000, 0xffffffe1, 0x6, 0xa7, 0x2, 0xc5c, 0x2a7, 0x3, 0x9b2, 0x100, 0x7, 0x8, 0x3, 0x24c0000, 0x7, 0x7], [0x4a, 0x6, 0x2, 0xffffffff, 0xfffffff8, 0x6, 0xef64, 0xb61, 0xfff, 0x5, 0x20, 0x1, 0x5, 0x18, 0x9, 0x4, 0xef5, 0xffffffff, 0x72, 0x9, 0x6, 0x7, 0x697, 0x4, 0xffffff01, 0x8001, 0x5, 0x78b6, 0xb1c0, 0x7, 0xb2, 0x46, 0x3f, 0x6, 0x1f, 0x1f, 0x10000, 0x7f, 0x5, 0x1, 0x80000000, 0xff, 0x800, 0x8, 0xfffff5e4, 0x7, 0xfffffff7, 0x401, 0x5, 0x20, 0xd768, 0x5, 0x101, 0x7ff, 0x5ddb, 0x8a3, 0x1ff, 0x7, 0x7, 0x4, 0xfffffffc, 0x40, 0x9, 0x3], [0xff, 0x80000001, 0x760, 0x4e8, 0x1, 0x8, 0x3, 0x4, 0x0, 0x4, 0x9, 0x1, 0x3, 0x200, 0x7, 0x5, 0x7ff, 0x40, 0x18, 0x371ad7eb, 0x7fffffff, 0x0, 0xffff, 0x3, 0x9, 0x7, 0x4c4, 0x80, 0x1, 0x9, 0x9, 0x2, 0x3, 0x6, 0x3f, 0x7ff, 0x825, 0x6, 0x1ff, 0x7, 0x5, 0x2, 0x8, 0x9, 0x9, 0x0, 0x8000, 0x0, 0x1, 0x9, 0x4, 0x0, 0x5, 0x9, 0x7f, 0x80000000, 0x9, 0x200, 0x82cc, 0x33b8, 0xfb2e, 0x83, 0x129f, 0x3], [0x267e, 0x10001, 0x7fffffff, 0x4, 0x9, 0x7f, 0x9, 0x2, 0x4, 0x2, 0x879, 0x4, 0x400, 0x1f, 0x100, 0x5, 0x2, 0x2, 0x7, 0x40, 0x8, 0x3f, 0xf59, 0xdcf, 0x2c74, 0x5a8d, 0x1, 0x7, 0xfffffffc, 0xff, 0x4, 0x0, 0x53400, 0x1ea9d357, 0x5, 0xd92, 0x800, 0x3ff, 0x5, 0x3, 0xc1, 0x1, 0x1, 0x0, 0x3, 0x30, 0x0, 0x9, 0x3d9d, 0x1, 0x2, 0x6, 0x3ca, 0x1, 0x0, 0x2, 0x8, 0x5, 0xffff, 0x4, 0x7, 0xffffffff, 0x6, 0xfffffffd], 0x21, ['&-\\.\x8f]!-+@/)@\x00', '/proc/cgroups\x00', '\x00', '*D)\x00']}, ["", "", "", "", "", "", "", ""]}, 0x444}, 0x1, 0x0, 0x0, 0x40880}, 0x4000004) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x444, 0x3f3, 0x400, 0x70bd25, 0x25dfdbfb, {0x10, 0x1, 0x22, [0x7, 0x3ff, 0x4, 0x6, 0x3f, 0x8000, 0x7, 0x5, 0x8, 0xfff, 0x5, 0xffffffff, 0xffff, 0xcea, 0x3, 0x10000, 0x0, 0x101, 0x5, 0x800, 0xe6e, 0x4, 0x3694, 0x3, 0x0, 0x8f, 0x7, 0x4, 0x3f, 0x2, 0x92bb, 0x8001, 0xba4a, 0x1, 0x1c88, 0x5b94, 0x4, 0xffffffff, 0xff, 0x74, 0x8001, 0x21e8e7e7, 0x9, 0x3f, 0x4f07e747, 0x0, 0xffffffff, 0xffff, 0x80000000, 0xffffffe1, 0x6, 0xa7, 0x2, 0xc5c, 0x2a7, 0x3, 0x9b2, 0x100, 0x7, 0x8, 0x3, 0x24c0000, 0x7, 0x7], [0x4a, 0x6, 0x2, 0xffffffff, 0xfffffff8, 0x6, 0xef64, 0xb61, 0xfff, 0x5, 0x20, 0x1, 0x5, 0x18, 0x9, 0x4, 0xef5, 0xffffffff, 0x72, 0x9, 0x6, 0x7, 0x697, 0x4, 0xffffff01, 0x8001, 0x5, 0x78b6, 0xb1c0, 0x7, 0xb2, 0x46, 0x3f, 0x6, 0x1f, 0x1f, 0x10000, 0x7f, 0x5, 0x1, 0x80000000, 0xff, 0x800, 0x8, 0xfffff5e4, 0x7, 0xfffffff7, 0x401, 0x5, 0x20, 0xd768, 0x5, 0x101, 0x7ff, 0x5ddb, 0x8a3, 0x1ff, 0x7, 0x7, 0x4, 0xfffffffc, 0x40, 0x9, 0x3], [0xff, 0x80000001, 0x760, 0x4e8, 0x1, 0x8, 0x3, 0x4, 0x0, 0x4, 0x9, 0x1, 0x3, 0x200, 0x7, 0x5, 0x7ff, 0x40, 0x18, 0x371ad7eb, 0x7fffffff, 0x0, 0xffff, 0x3, 0x9, 0x7, 0x4c4, 0x80, 0x1, 0x9, 0x9, 0x2, 0x3, 0x6, 0x3f, 0x7ff, 0x825, 0x6, 0x1ff, 0x7, 0x5, 0x2, 0x8, 0x9, 0x9, 0x0, 0x8000, 0x0, 0x1, 0x9, 0x4, 0x0, 0x5, 0x9, 0x7f, 0x80000000, 0x9, 0x200, 0x82cc, 0x33b8, 0xfb2e, 0x83, 0x129f, 0x3], [0x267e, 0x10001, 0x7fffffff, 0x4, 0x9, 0x7f, 0x9, 0x2, 0x4, 0x2, 0x879, 0x4, 0x400, 0x1f, 0x100, 0x5, 0x2, 0x2, 0x7, 0x40, 0x8, 0x3f, 0xf59, 0xdcf, 0x2c74, 0x5a8d, 0x1, 0x7, 0xfffffffc, 0xff, 0x4, 0x0, 0x53400, 0x1ea9d357, 0x5, 0xd92, 0x800, 0x3ff, 0x5, 0x3, 0xc1, 0x1, 0x1, 0x0, 0x3, 0x30, 0x0, 0x9, 0x3d9d, 0x1, 0x2, 0x6, 0x3ca, 0x1, 0x0, 0x2, 0x8, 0x5, 0xffff, 0x4, 0x7, 0xffffffff, 0x6, 0xfffffffd], 0x21, ['&-\\.\x8f]!-+@/)@\x00', '/proc/cgroups\x00', '\x00', '*D)\x00']}, ["", "", "", "", "", "", "", ""]}, 0x444}, 0x1, 0x0, 0x0, 0x40880}, 0x4000004) (async) 08:05:32 executing program 3: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x801) 08:05:32 executing program 5: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) 08:05:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_PRINT_DEBUG(r5, 0xab06) ioctl$NBD_DO_IT(r4, 0xab03) 08:05:32 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) (async, rerun: 64) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) (async) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$NBD_PRINT_DEBUG(r5, 0xab06) ioctl$NBD_DO_IT(r4, 0xab03) 08:05:32 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x444, 0x3f3, 0x400, 0x70bd25, 0x25dfdbfb, {0x10, 0x1, 0x22, [0x7, 0x3ff, 0x4, 0x6, 0x3f, 0x8000, 0x7, 0x5, 0x8, 0xfff, 0x5, 0xffffffff, 0xffff, 0xcea, 0x3, 0x10000, 0x0, 0x101, 0x5, 0x800, 0xe6e, 0x4, 0x3694, 0x3, 0x0, 0x8f, 0x7, 0x4, 0x3f, 0x2, 0x92bb, 0x8001, 0xba4a, 0x1, 0x1c88, 0x5b94, 0x4, 0xffffffff, 0xff, 0x74, 0x8001, 0x21e8e7e7, 0x9, 0x3f, 0x4f07e747, 0x0, 0xffffffff, 0xffff, 0x80000000, 0xffffffe1, 0x6, 0xa7, 0x2, 0xc5c, 0x2a7, 0x3, 0x9b2, 0x100, 0x7, 0x8, 0x3, 0x24c0000, 0x7, 0x7], [0x4a, 0x6, 0x2, 0xffffffff, 0xfffffff8, 0x6, 0xef64, 0xb61, 0xfff, 0x5, 0x20, 0x1, 0x5, 0x18, 0x9, 0x4, 0xef5, 0xffffffff, 0x72, 0x9, 0x6, 0x7, 0x697, 0x4, 0xffffff01, 0x8001, 0x5, 0x78b6, 0xb1c0, 0x7, 0xb2, 0x46, 0x3f, 0x6, 0x1f, 0x1f, 0x10000, 0x7f, 0x5, 0x1, 0x80000000, 0xff, 0x800, 0x8, 0xfffff5e4, 0x7, 0xfffffff7, 0x401, 0x5, 0x20, 0xd768, 0x5, 0x101, 0x7ff, 0x5ddb, 0x8a3, 0x1ff, 0x7, 0x7, 0x4, 0xfffffffc, 0x40, 0x9, 0x3], [0xff, 0x80000001, 0x760, 0x4e8, 0x1, 0x8, 0x3, 0x4, 0x0, 0x4, 0x9, 0x1, 0x3, 0x200, 0x7, 0x5, 0x7ff, 0x40, 0x18, 0x371ad7eb, 0x7fffffff, 0x0, 0xffff, 0x3, 0x9, 0x7, 0x4c4, 0x80, 0x1, 0x9, 0x9, 0x2, 0x3, 0x6, 0x3f, 0x7ff, 0x825, 0x6, 0x1ff, 0x7, 0x5, 0x2, 0x8, 0x9, 0x9, 0x0, 0x8000, 0x0, 0x1, 0x9, 0x4, 0x0, 0x5, 0x9, 0x7f, 0x80000000, 0x9, 0x200, 0x82cc, 0x33b8, 0xfb2e, 0x83, 0x129f, 0x3], [0x267e, 0x10001, 0x7fffffff, 0x4, 0x9, 0x7f, 0x9, 0x2, 0x4, 0x2, 0x879, 0x4, 0x400, 0x1f, 0x100, 0x5, 0x2, 0x2, 0x7, 0x40, 0x8, 0x3f, 0xf59, 0xdcf, 0x2c74, 0x5a8d, 0x1, 0x7, 0xfffffffc, 0xff, 0x4, 0x0, 0x53400, 0x1ea9d357, 0x5, 0xd92, 0x800, 0x3ff, 0x5, 0x3, 0xc1, 0x1, 0x1, 0x0, 0x3, 0x30, 0x0, 0x9, 0x3d9d, 0x1, 0x2, 0x6, 0x3ca, 0x1, 0x0, 0x2, 0x8, 0x5, 0xffff, 0x4, 0x7, 0xffffffff, 0x6, 0xfffffffd], 0x21, ['&-\\.\x8f]!-+@/)@\x00', '/proc/cgroups\x00', '\x00', '*D)\x00']}, ["", "", "", "", "", "", "", ""]}, 0x444}, 0x1, 0x0, 0x0, 0x40880}, 0x4000004) 08:05:32 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x801) 08:05:32 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x80000) r1 = socket(0x11, 0xa, 0x0) r2 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x2000208, 0x1) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE(r4, 0xab02, 0xf38) syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x80000) (async) socket(0x11, 0xa, 0x0) (async) socket(0x11, 0xa, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) (async) socket(0x11, 0xa, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) (async) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x2000208, 0x1) (async) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$NBD_SET_SIZE(r4, 0xab02, 0xf38) (async) 08:05:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x444, 0x3f3, 0x400, 0x70bd25, 0x25dfdbfb, {0x10, 0x1, 0x22, [0x7, 0x3ff, 0x4, 0x6, 0x3f, 0x8000, 0x7, 0x5, 0x8, 0xfff, 0x5, 0xffffffff, 0xffff, 0xcea, 0x3, 0x10000, 0x0, 0x101, 0x5, 0x800, 0xe6e, 0x4, 0x3694, 0x3, 0x0, 0x8f, 0x7, 0x4, 0x3f, 0x2, 0x92bb, 0x8001, 0xba4a, 0x1, 0x1c88, 0x5b94, 0x4, 0xffffffff, 0xff, 0x74, 0x8001, 0x21e8e7e7, 0x9, 0x3f, 0x4f07e747, 0x0, 0xffffffff, 0xffff, 0x80000000, 0xffffffe1, 0x6, 0xa7, 0x2, 0xc5c, 0x2a7, 0x3, 0x9b2, 0x100, 0x7, 0x8, 0x3, 0x24c0000, 0x7, 0x7], [0x4a, 0x6, 0x2, 0xffffffff, 0xfffffff8, 0x6, 0xef64, 0xb61, 0xfff, 0x5, 0x20, 0x1, 0x5, 0x18, 0x9, 0x4, 0xef5, 0xffffffff, 0x72, 0x9, 0x6, 0x7, 0x697, 0x4, 0xffffff01, 0x8001, 0x5, 0x78b6, 0xb1c0, 0x7, 0xb2, 0x46, 0x3f, 0x6, 0x1f, 0x1f, 0x10000, 0x7f, 0x5, 0x1, 0x80000000, 0xff, 0x800, 0x8, 0xfffff5e4, 0x7, 0xfffffff7, 0x401, 0x5, 0x20, 0xd768, 0x5, 0x101, 0x7ff, 0x5ddb, 0x8a3, 0x1ff, 0x7, 0x7, 0x4, 0xfffffffc, 0x40, 0x9, 0x3], [0xff, 0x80000001, 0x760, 0x4e8, 0x1, 0x8, 0x3, 0x4, 0x0, 0x4, 0x9, 0x1, 0x3, 0x200, 0x7, 0x5, 0x7ff, 0x40, 0x18, 0x371ad7eb, 0x7fffffff, 0x0, 0xffff, 0x3, 0x9, 0x7, 0x4c4, 0x80, 0x1, 0x9, 0x9, 0x2, 0x3, 0x6, 0x3f, 0x7ff, 0x825, 0x6, 0x1ff, 0x7, 0x5, 0x2, 0x8, 0x9, 0x9, 0x0, 0x8000, 0x0, 0x1, 0x9, 0x4, 0x0, 0x5, 0x9, 0x7f, 0x80000000, 0x9, 0x200, 0x82cc, 0x33b8, 0xfb2e, 0x83, 0x129f, 0x3], [0x267e, 0x10001, 0x7fffffff, 0x4, 0x9, 0x7f, 0x9, 0x2, 0x4, 0x2, 0x879, 0x4, 0x400, 0x1f, 0x100, 0x5, 0x2, 0x2, 0x7, 0x40, 0x8, 0x3f, 0xf59, 0xdcf, 0x2c74, 0x5a8d, 0x1, 0x7, 0xfffffffc, 0xff, 0x4, 0x0, 0x53400, 0x1ea9d357, 0x5, 0xd92, 0x800, 0x3ff, 0x5, 0x3, 0xc1, 0x1, 0x1, 0x0, 0x3, 0x30, 0x0, 0x9, 0x3d9d, 0x1, 0x2, 0x6, 0x3ca, 0x1, 0x0, 0x2, 0x8, 0x5, 0xffff, 0x4, 0x7, 0xffffffff, 0x6, 0xfffffffd], 0x21, ['&-\\.\x8f]!-+@/)@\x00', '/proc/cgroups\x00', '\x00', '*D)\x00']}, ["", "", "", "", "", "", "", ""]}, 0x444}, 0x1, 0x0, 0x0, 0x40880}, 0x4000004) 08:05:32 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x801) 08:05:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_PRINT_DEBUG(r5, 0xab06) ioctl$NBD_DO_IT(r4, 0xab03) 08:05:32 executing program 0: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x3f9, 0xa02, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x18}}, 0x20000800) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r0 = socket(0x2c, 0x80000, 0xe24a) ioctl$SIOCGETSGCNT_IN6(r0, 0x89e1, &(0x7f0000000040)={@local, @private1}) 08:05:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x444, 0x3f3, 0x400, 0x70bd25, 0x25dfdbfb, {0x10, 0x1, 0x22, [0x7, 0x3ff, 0x4, 0x6, 0x3f, 0x8000, 0x7, 0x5, 0x8, 0xfff, 0x5, 0xffffffff, 0xffff, 0xcea, 0x3, 0x10000, 0x0, 0x101, 0x5, 0x800, 0xe6e, 0x4, 0x3694, 0x3, 0x0, 0x8f, 0x7, 0x4, 0x3f, 0x2, 0x92bb, 0x8001, 0xba4a, 0x1, 0x1c88, 0x5b94, 0x4, 0xffffffff, 0xff, 0x74, 0x8001, 0x21e8e7e7, 0x9, 0x3f, 0x4f07e747, 0x0, 0xffffffff, 0xffff, 0x80000000, 0xffffffe1, 0x6, 0xa7, 0x2, 0xc5c, 0x2a7, 0x3, 0x9b2, 0x100, 0x7, 0x8, 0x3, 0x24c0000, 0x7, 0x7], [0x4a, 0x6, 0x2, 0xffffffff, 0xfffffff8, 0x6, 0xef64, 0xb61, 0xfff, 0x5, 0x20, 0x1, 0x5, 0x18, 0x9, 0x4, 0xef5, 0xffffffff, 0x72, 0x9, 0x6, 0x7, 0x697, 0x4, 0xffffff01, 0x8001, 0x5, 0x78b6, 0xb1c0, 0x7, 0xb2, 0x46, 0x3f, 0x6, 0x1f, 0x1f, 0x10000, 0x7f, 0x5, 0x1, 0x80000000, 0xff, 0x800, 0x8, 0xfffff5e4, 0x7, 0xfffffff7, 0x401, 0x5, 0x20, 0xd768, 0x5, 0x101, 0x7ff, 0x5ddb, 0x8a3, 0x1ff, 0x7, 0x7, 0x4, 0xfffffffc, 0x40, 0x9, 0x3], [0xff, 0x80000001, 0x760, 0x4e8, 0x1, 0x8, 0x3, 0x4, 0x0, 0x4, 0x9, 0x1, 0x3, 0x200, 0x7, 0x5, 0x7ff, 0x40, 0x18, 0x371ad7eb, 0x7fffffff, 0x0, 0xffff, 0x3, 0x9, 0x7, 0x4c4, 0x80, 0x1, 0x9, 0x9, 0x2, 0x3, 0x6, 0x3f, 0x7ff, 0x825, 0x6, 0x1ff, 0x7, 0x5, 0x2, 0x8, 0x9, 0x9, 0x0, 0x8000, 0x0, 0x1, 0x9, 0x4, 0x0, 0x5, 0x9, 0x7f, 0x80000000, 0x9, 0x200, 0x82cc, 0x33b8, 0xfb2e, 0x83, 0x129f, 0x3], [0x267e, 0x10001, 0x7fffffff, 0x4, 0x9, 0x7f, 0x9, 0x2, 0x4, 0x2, 0x879, 0x4, 0x400, 0x1f, 0x100, 0x5, 0x2, 0x2, 0x7, 0x40, 0x8, 0x3f, 0xf59, 0xdcf, 0x2c74, 0x5a8d, 0x1, 0x7, 0xfffffffc, 0xff, 0x4, 0x0, 0x53400, 0x1ea9d357, 0x5, 0xd92, 0x800, 0x3ff, 0x5, 0x3, 0xc1, 0x1, 0x1, 0x0, 0x3, 0x30, 0x0, 0x9, 0x3d9d, 0x1, 0x2, 0x6, 0x3ca, 0x1, 0x0, 0x2, 0x8, 0x5, 0xffff, 0x4, 0x7, 0xffffffff, 0x6, 0xfffffffd], 0x21, ['&-\\.\x8f]!-+@/)@\x00', '/proc/cgroups\x00', '\x00', '*D)\x00']}, ["", "", "", "", "", "", "", ""]}, 0x444}, 0x1, 0x0, 0x0, 0x40880}, 0x4000004) 08:05:32 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x801) 08:05:32 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) 08:05:32 executing program 1: socketpair(0x3, 0x2, 0x80000b87, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_PRINT_DEBUG(r4, 0xab06) 08:05:32 executing program 3: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) 08:05:32 executing program 0: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x3f9, 0xa02, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x18}}, 0x20000800) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) r0 = socket(0x2c, 0x80000, 0xe24a) ioctl$SIOCGETSGCNT_IN6(r0, 0x89e1, &(0x7f0000000040)={@local, @private1}) 08:05:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000080)={0x444, 0x3f3, 0x400, 0x70bd25, 0x25dfdbfb, {0x10, 0x1, 0x22, [0x7, 0x3ff, 0x4, 0x6, 0x3f, 0x8000, 0x7, 0x5, 0x8, 0xfff, 0x5, 0xffffffff, 0xffff, 0xcea, 0x3, 0x10000, 0x0, 0x101, 0x5, 0x800, 0xe6e, 0x4, 0x3694, 0x3, 0x0, 0x8f, 0x7, 0x4, 0x3f, 0x2, 0x92bb, 0x8001, 0xba4a, 0x1, 0x1c88, 0x5b94, 0x4, 0xffffffff, 0xff, 0x74, 0x8001, 0x21e8e7e7, 0x9, 0x3f, 0x4f07e747, 0x0, 0xffffffff, 0xffff, 0x80000000, 0xffffffe1, 0x6, 0xa7, 0x2, 0xc5c, 0x2a7, 0x3, 0x9b2, 0x100, 0x7, 0x8, 0x3, 0x24c0000, 0x7, 0x7], [0x4a, 0x6, 0x2, 0xffffffff, 0xfffffff8, 0x6, 0xef64, 0xb61, 0xfff, 0x5, 0x20, 0x1, 0x5, 0x18, 0x9, 0x4, 0xef5, 0xffffffff, 0x72, 0x9, 0x6, 0x7, 0x697, 0x4, 0xffffff01, 0x8001, 0x5, 0x78b6, 0xb1c0, 0x7, 0xb2, 0x46, 0x3f, 0x6, 0x1f, 0x1f, 0x10000, 0x7f, 0x5, 0x1, 0x80000000, 0xff, 0x800, 0x8, 0xfffff5e4, 0x7, 0xfffffff7, 0x401, 0x5, 0x20, 0xd768, 0x5, 0x101, 0x7ff, 0x5ddb, 0x8a3, 0x1ff, 0x7, 0x7, 0x4, 0xfffffffc, 0x40, 0x9, 0x3], [0xff, 0x80000001, 0x760, 0x4e8, 0x1, 0x8, 0x3, 0x4, 0x0, 0x4, 0x9, 0x1, 0x3, 0x200, 0x7, 0x5, 0x7ff, 0x40, 0x18, 0x371ad7eb, 0x7fffffff, 0x0, 0xffff, 0x3, 0x9, 0x7, 0x4c4, 0x80, 0x1, 0x9, 0x9, 0x2, 0x3, 0x6, 0x3f, 0x7ff, 0x825, 0x6, 0x1ff, 0x7, 0x5, 0x2, 0x8, 0x9, 0x9, 0x0, 0x8000, 0x0, 0x1, 0x9, 0x4, 0x0, 0x5, 0x9, 0x7f, 0x80000000, 0x9, 0x200, 0x82cc, 0x33b8, 0xfb2e, 0x83, 0x129f, 0x3], [0x267e, 0x10001, 0x7fffffff, 0x4, 0x9, 0x7f, 0x9, 0x2, 0x4, 0x2, 0x879, 0x4, 0x400, 0x1f, 0x100, 0x5, 0x2, 0x2, 0x7, 0x40, 0x8, 0x3f, 0xf59, 0xdcf, 0x2c74, 0x5a8d, 0x1, 0x7, 0xfffffffc, 0xff, 0x4, 0x0, 0x53400, 0x1ea9d357, 0x5, 0xd92, 0x800, 0x3ff, 0x5, 0x3, 0xc1, 0x1, 0x1, 0x0, 0x3, 0x30, 0x0, 0x9, 0x3d9d, 0x1, 0x2, 0x6, 0x3ca, 0x1, 0x0, 0x2, 0x8, 0x5, 0xffff, 0x4, 0x7, 0xffffffff, 0x6, 0xfffffffd], 0x21, ['&-\\.\x8f]!-+@/)@\x00', '/proc/cgroups\x00', '\x00', '*D)\x00']}, ["", "", "", "", "", "", "", ""]}, 0x444}, 0x1, 0x0, 0x0, 0x40880}, 0x4000004) 08:05:32 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) (async) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) 08:05:32 executing program 3: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) 08:05:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) 08:05:32 executing program 1: socketpair(0x3, 0x2, 0x80000b87, 0x0) (async) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:32 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:32 executing program 0: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x3f9, 0xa02, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x18}}, 0x20000800) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r0 = socket(0x2c, 0x80000, 0xe24a) ioctl$SIOCGETSGCNT_IN6(r0, 0x89e1, &(0x7f0000000040)={@local, @private1}) 08:05:32 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) 08:05:32 executing program 3: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) 08:05:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) 08:05:32 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:32 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_DEL_MFC(r3, 0x0, 0xcd, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffffffffffff, "059d46d2655c0d35f88e7d552c762f85408d147ebca99e896d958ddedfc57bb9", 0x5, 0x2, 0x3, 0x3}, 0x3c) 08:05:32 executing program 1: socketpair(0x3, 0x2, 0x80000b87, 0x0) (async) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:32 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={0xffffffffffffffff, r3}, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:32 executing program 3: socketpair(0x3, 0x2, 0x80000b87, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:32 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:32 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) (rerun: 64) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) r3 = socket(0x11, 0xa, 0x0) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) (async) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$MRT_DEL_MFC(r3, 0x0, 0xcd, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffffffffffff, "059d46d2655c0d35f88e7d552c762f85408d147ebca99e896d958ddedfc57bb9", 0x5, 0x2, 0x3, 0x3}, 0x3c) 08:05:32 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async, rerun: 64) r0 = socket(0x11, 0xa, 0x0) (rerun: 64) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:32 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:33 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000780), 0x800, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000880)={0x1}, 0x8) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0xd, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x236, 0x0, 0x0, 0x0, 0x200}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0xfc, 0xe, 0x0, 0x8, 0x8}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}]}, &(0x7f0000000380)='syzkaller\x00', 0x6, 0x3e, &(0x7f00000003c0)=""/62, 0x40f00, 0x3, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0x0, 0x8, 0x677}, 0x10, r0, r2, 0x0, &(0x7f00000007c0)=[r3]}, 0x80) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 3: socketpair(0x3, 0x2, 0x80000b87, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async, rerun: 64) r3 = socket(0x11, 0xa, 0x0) (rerun: 64) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) (async) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) (async) setsockopt$MRT_DEL_MFC(r3, 0x0, 0xcd, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffffffffffff, "059d46d2655c0d35f88e7d552c762f85408d147ebca99e896d958ddedfc57bb9", 0x5, 0x2, 0x3, 0x3}, 0x3c) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) socket(0x11, 0xa, 0x0) (async) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_DEL_MFC(r3, 0x0, 0xcd, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffffffffffff, "059d46d2655c0d35f88e7d552c762f85408d147ebca99e896d958ddedfc57bb9", 0x5, 0x2, 0x3, 0x3}, 0x3c) 08:05:33 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000780), 0x800, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000780), 0x800, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000880)={0x1}, 0x8) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0xd, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x236, 0x0, 0x0, 0x0, 0x200}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0xfc, 0xe, 0x0, 0x8, 0x8}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}]}, &(0x7f0000000380)='syzkaller\x00', 0x6, 0x3e, &(0x7f00000003c0)=""/62, 0x40f00, 0x3, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0x0, 0x8, 0x677}, 0x10, r0, r2, 0x0, &(0x7f00000007c0)=[r3]}, 0x80) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x6, &(0x7f00000000c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x1}, @alu={0x7, 0x1, 0xc, 0x3, 0x1, 0xffffffffffffff38, 0x8}, @generic={0x5, 0x6, 0x2, 0xca48, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000100)='GPL\x00', 0x10000, 0x83, &(0x7f0000000140)=""/131, 0x41100, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x3, 0x40000, 0x81}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1b, 0x8, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @generic={0x7f, 0x7, 0x8, 0x6, 0x6}]}, &(0x7f00000003c0)='GPL\x00', 0x80, 0x6d, &(0x7f0000000400)=""/109, 0x40f00, 0x15, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000480)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xd, 0x843, 0x7}, 0x10, 0x0, r0}, 0x80) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000340)=r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$igmp(0x2, 0x3, 0x2) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_DEL_MFC(r3, 0x0, 0xcd, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffffffffffff, "059d46d2655c0d35f88e7d552c762f85408d147ebca99e896d958ddedfc57bb9", 0x5, 0x2, 0x3, 0x3}, 0x3c) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c272f07", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf250100000006001b004e210000"], 0x1c}, 0x1, 0x0, 0x0, 0x8051}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 3: socketpair(0x3, 0x2, 0x80000b87, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 0: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x400000) 08:05:33 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000780), 0x800, 0x0) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000880)={0x1}, 0x8) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0xd, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x236, 0x0, 0x0, 0x0, 0x200}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0xfc, 0xe, 0x0, 0x8, 0x8}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}]}, &(0x7f0000000380)='syzkaller\x00', 0x6, 0x3e, &(0x7f00000003c0)=""/62, 0x40f00, 0x3, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0x0, 0x8, 0x677}, 0x10, r0, r2, 0x0, &(0x7f00000007c0)=[r3]}, 0x80) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) setsockopt$MRT_DEL_MFC(r3, 0x0, 0xcd, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffffffffffff, "059d46d2655c0d35f88e7d552c762f85408d147ebca99e896d958ddedfc57bb9", 0x5, 0x2, 0x3, 0x3}, 0x3c) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x6, &(0x7f00000000c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x1}, @alu={0x7, 0x1, 0xc, 0x3, 0x1, 0xffffffffffffff38, 0x8}, @generic={0x5, 0x6, 0x2, 0xca48, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000100)='GPL\x00', 0x10000, 0x83, &(0x7f0000000140)=""/131, 0x41100, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x3, 0x40000, 0x81}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1b, 0x8, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @generic={0x7f, 0x7, 0x8, 0x6, 0x6}]}, &(0x7f00000003c0)='GPL\x00', 0x80, 0x6d, &(0x7f0000000400)=""/109, 0x40f00, 0x15, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000480)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xd, 0x843, 0x7}, 0x10, 0x0, r0}, 0x80) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000340)=r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$igmp(0x2, 0x3, 0x2) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 0: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x400000) 08:05:33 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r0}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) socketpair(0x3, 0x0, 0xb87, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000140)=[0x0, 0x7f, 0x9, 0x0, 0x8, 0x1e, 0x10001, 0x1, 0xd6e, 0x2000000, 0xbf95, 0x4], 0xc, 0x80c00, 0x0, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x250, 0x320, 0x320, 0x320, 0x0, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x8], 0x5, 0x1, 0x2}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast2, @ipv6=@loopback, 0x15, 0x1, 0x40}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x21}, [0xffffff00, 0xff, 0xffffffff], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'veth1_vlan\x00', 'team0\x00', {}, {}, 0x1, 0x5, 0xe}, 0x0, 0xd0, 0x108, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x6}, {0x2, 0x1, 0x2}, {0x2, 0x0, 0x5}, 0x20, 0xffffff00}}}, {{@ipv6={@mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, [0xffffff, 0xff, 0xff, 0xffffff], [0x0, 0xffffff00, 0xff000000, 0xff], 'veth0\x00', 'pim6reg1\x00', {0xff}, {0xff}, 0x84, 0x0, 0x1, 0x18}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@frag={{0x30}, {[0xc967, 0x8], 0x3f, 0x26, 0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@dev={0xac, 0x14, 0x14, 0x23}, @ipv6=@empty, 0xe, 0x11}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private2={0xfc, 0x2, '\x00', 0x1}, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0xf, 0x12, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) r3 = socket(0x11, 0xa, 0x0) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) 08:05:33 executing program 3: socketpair(0x3, 0x2, 0x80000b87, 0x0) r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@private1}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000340)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x6, &(0x7f00000000c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x1}, @alu={0x7, 0x1, 0xc, 0x3, 0x1, 0xffffffffffffff38, 0x8}, @generic={0x5, 0x6, 0x2, 0xca48, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000100)='GPL\x00', 0x10000, 0x83, &(0x7f0000000140)=""/131, 0x41100, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x3, 0x40000, 0x81}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1b, 0x8, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @generic={0x7f, 0x7, 0x8, 0x6, 0x6}]}, &(0x7f00000003c0)='GPL\x00', 0x80, 0x6d, &(0x7f0000000400)=""/109, 0x40f00, 0x15, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000480)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xd, 0x843, 0x7}, 0x10, 0x0, r0}, 0x80) (async, rerun: 32) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000340)=r1) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socket$igmp(0x2, 0x3, 0x2) 08:05:33 executing program 0: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x400000) 08:05:33 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r0}) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) (async, rerun: 32) socketpair(0x3, 0x0, 0xb87, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000140)=[0x0, 0x7f, 0x9, 0x0, 0x8, 0x1e, 0x10001, 0x1, 0xd6e, 0x2000000, 0xbf95, 0x4], 0xc, 0x80c00, 0x0, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x250, 0x320, 0x320, 0x320, 0x0, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x8], 0x5, 0x1, 0x2}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast2, @ipv6=@loopback, 0x15, 0x1, 0x40}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x21}, [0xffffff00, 0xff, 0xffffffff], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'veth1_vlan\x00', 'team0\x00', {}, {}, 0x1, 0x5, 0xe}, 0x0, 0xd0, 0x108, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x6}, {0x2, 0x1, 0x2}, {0x2, 0x0, 0x5}, 0x20, 0xffffff00}}}, {{@ipv6={@mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, [0xffffff, 0xff, 0xff, 0xffffff], [0x0, 0xffffff00, 0xff000000, 0xff], 'veth0\x00', 'pim6reg1\x00', {0xff}, {0xff}, 0x84, 0x0, 0x1, 0x18}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@frag={{0x30}, {[0xc967, 0x8], 0x3f, 0x26, 0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@dev={0xac, 0x14, 0x14, 0x23}, @ipv6=@empty, 0xe, 0x11}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private2={0xfc, 0x2, '\x00', 0x1}, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0xf, 0x12, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) socket(0x11, 0xa, 0x0) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) socket$nl_generic(0x10, 0x3, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x27}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:33 executing program 3: socketpair(0x3, 0x2, 0x80000b87, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 0: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x1c) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x80281) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000080)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) socket(0x11, 0xa, 0x0) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x11, 0xa, 0x0) (async) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r0}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) socketpair(0x3, 0x0, 0xb87, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000140)=[0x0, 0x7f, 0x9, 0x0, 0x8, 0x1e, 0x10001, 0x1, 0xd6e, 0x2000000, 0xbf95, 0x4], 0xc, 0x80c00, 0x0, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x250, 0x320, 0x320, 0x320, 0x0, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x8], 0x5, 0x1, 0x2}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast2, @ipv6=@loopback, 0x15, 0x1, 0x40}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x21}, [0xffffff00, 0xff, 0xffffffff], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'veth1_vlan\x00', 'team0\x00', {}, {}, 0x1, 0x5, 0xe}, 0x0, 0xd0, 0x108, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x6}, {0x2, 0x1, 0x2}, {0x2, 0x0, 0x5}, 0x20, 0xffffff00}}}, {{@ipv6={@mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, [0xffffff, 0xff, 0xff, 0xffffff], [0x0, 0xffffff00, 0xff000000, 0xff], 'veth0\x00', 'pim6reg1\x00', {0xff}, {0xff}, 0x84, 0x0, 0x1, 0x18}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@frag={{0x30}, {[0xc967, 0x8], 0x3f, 0x26, 0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@dev={0xac, 0x14, 0x14, 0x23}, @ipv6=@empty, 0xe, 0x11}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private2={0xfc, 0x2, '\x00', 0x1}, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0xf, 0x12, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) (async) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x250, 0x320, 0x320, 0x320, 0x0, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x8], 0x5, 0x1, 0x2}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast2, @ipv6=@loopback, 0x15, 0x1, 0x40}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x21}, [0xffffff00, 0xff, 0xffffffff], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'veth1_vlan\x00', 'team0\x00', {}, {}, 0x1, 0x5, 0xe}, 0x0, 0xd0, 0x108, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x6}, {0x2, 0x1, 0x2}, {0x2, 0x0, 0x5}, 0x20, 0xffffff00}}}, {{@ipv6={@mcast2, @dev={0xfe, 0x80, '\x00', 0x35}, [0xffffff, 0xff, 0xff, 0xffffff], [0x0, 0xffffff00, 0xff000000, 0xff], 'veth0\x00', 'pim6reg1\x00', {0xff}, {0xff}, 0x84, 0x0, 0x1, 0x18}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@frag={{0x30}, {[0xc967, 0x8], 0x3f, 0x26, 0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@dev={0xac, 0x14, 0x14, 0x23}, @ipv6=@empty, 0xe, 0x11}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private2={0xfc, 0x2, '\x00', 0x1}, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0xf, 0x12, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x27}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 3: socketpair(0x3, 0x2, 0x80000b87, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 0: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x1c) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x80281) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000080)) (async) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000080)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:33 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x1}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) sendto$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={r0}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x81000) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000100)={0x0, 0x4, 0x2, 0x8000, @vifc_lcl_ifindex=r1, @multicast1}, 0x10) 08:05:33 executing program 3: socketpair(0x3, 0x2, 0x80000b87, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x27}, 0x14) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x27}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:33 executing program 0: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x1c) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x80281) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000080)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x1c) (async) syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x80281) (async) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000080)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) 08:05:33 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (async) sendto$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={r0}) (async) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x81000) 08:05:33 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) 08:05:33 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 2: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x81}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000340)=0x1, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, r0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xbf}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}]}, 0x6c}, 0x1, 0x0, 0x0, 0x6044885}, 0x24008001) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)=@getlink={0x134, 0x12, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x41044, 0x2085}, [@IFLA_BROADCAST={0xa}, @IFLA_PORT_SELF={0x88, 0x19, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "0af99ddcd9f86d08a42e6e1cc0114da8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6093dbf5ff0e28462d610a590e1d1588"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4917ab10d17adef9876d0a89cf0d51c6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a298083ac512c43a4d1aa5fa09c4b411"}, @IFLA_PORT_VF={0x8, 0x1, 0x8001}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2ed37d9c0e02a1b87398762a9470921e"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_CARRIER={0x5, 0x21, 0x5}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, @IFLA_PORT_SELF={0x6c, 0x19, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "3b3b7fbc8ee9d6c02abaad06fdbf768f"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "90fa3e96faa5c2e3f6322319cd237ca7"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "21dfd907161ecf6c9c16908cbcc4623f"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8b}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4eafc0a2d20e80f9da8b88f3bf2ec038"}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x80480c1) 08:05:33 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) sendto$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={r0}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x81000) (async) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x81000) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c, 0x80000) 08:05:33 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, r1}) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c, 0x80000) 08:05:33 executing program 2: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x81}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4) (async, rerun: 64) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000340)=0x1, 0x4) (async, rerun: 64) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async, rerun: 64) r1 = socket(0x11, 0xa, 0x0) (rerun: 64) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) (async, rerun: 64) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, r0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xbf}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}]}, 0x6c}, 0x1, 0x0, 0x0, 0x6044885}, 0x24008001) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)=@getlink={0x134, 0x12, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x41044, 0x2085}, [@IFLA_BROADCAST={0xa}, @IFLA_PORT_SELF={0x88, 0x19, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "0af99ddcd9f86d08a42e6e1cc0114da8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6093dbf5ff0e28462d610a590e1d1588"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4917ab10d17adef9876d0a89cf0d51c6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a298083ac512c43a4d1aa5fa09c4b411"}, @IFLA_PORT_VF={0x8, 0x1, 0x8001}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2ed37d9c0e02a1b87398762a9470921e"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_CARRIER={0x5, 0x21, 0x5}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, @IFLA_PORT_SELF={0x6c, 0x19, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "3b3b7fbc8ee9d6c02abaad06fdbf768f"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "90fa3e96faa5c2e3f6322319cd237ca7"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "21dfd907161ecf6c9c16908cbcc4623f"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8b}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4eafc0a2d20e80f9da8b88f3bf2ec038"}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x80480c1) 08:05:33 executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x4, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @exit, @jmp={0x5, 0x1, 0x5, 0x9, 0xa, 0x4, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000010c0)={0x5, 0xb, 0x400, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001100)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000011c0)={@cgroup, r0, 0xb, 0x0, r1}, 0x14) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:33 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c, 0x80000) (async) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c, 0x80000) 08:05:33 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x4, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @exit, @jmp={0x5, 0x1, 0x5, 0x9, 0xa, 0x4, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000010c0)={0x5, 0xb, 0x400, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001100)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000011c0)={@cgroup, r0, 0xb, 0x0, r1}, 0x14) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:33 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:05:33 executing program 2: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x81}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4) (async) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000340)=0x1, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) r1 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, r0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xbf}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}]}, 0x6c}, 0x1, 0x0, 0x0, 0x6044885}, 0x24008001) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)=@getlink={0x134, 0x12, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x41044, 0x2085}, [@IFLA_BROADCAST={0xa}, @IFLA_PORT_SELF={0x88, 0x19, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "0af99ddcd9f86d08a42e6e1cc0114da8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6093dbf5ff0e28462d610a590e1d1588"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4917ab10d17adef9876d0a89cf0d51c6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a298083ac512c43a4d1aa5fa09c4b411"}, @IFLA_PORT_VF={0x8, 0x1, 0x8001}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2ed37d9c0e02a1b87398762a9470921e"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_CARRIER={0x5, 0x21, 0x5}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, @IFLA_PORT_SELF={0x6c, 0x19, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "3b3b7fbc8ee9d6c02abaad06fdbf768f"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "90fa3e96faa5c2e3f6322319cd237ca7"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "21dfd907161ecf6c9c16908cbcc4623f"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8b}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4eafc0a2d20e80f9da8b88f3bf2ec038"}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x80480c1) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 08:05:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x4, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @exit, @jmp={0x5, 0x1, 0x5, 0x9, 0xa, 0x4, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000010c0)={0x5, 0xb, 0x400, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001100)=[0x1, 0xffffffffffffffff]}, 0x80) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000011c0)={@cgroup, r0, 0xb, 0x0, r1}, 0x14) (async) socketpair(0x3, 0x0, 0xb87, 0x0) 08:05:33 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180), 0x9, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r2, 0x40184152, &(0x7f0000000780)={0x0, &(0x7f0000000740)=[&(0x7f0000000240)="b208c1754ddd5c32c3af67b9aa1f8de368fb6ac92cb040a3baf819fc3dfffd1c0dcfade7c7a61b3995bf90b94a422b6beec88ee0226d3fd95dcf951a567b5d56104e2e71b49b80ddfaaedc90bcd49fa683c7685c9654a01dd812e38a0390431edf3125116c46dcd35efc4bf238439834ced8936d8e924357b8accc408dfbba78b0b69ac3b4ac04346f0959dea4dc10451aef57278a1ab83795e3da028d797badc11b86283fa96a0599ad90fe", &(0x7f0000000380)="1947308a5ea711d1d604f2e3c4732b4308f7de587b278e77a19de646e8afef960926fd00ff5112ad107e6e76e4456304600bc6a67cf468455453bff253f7aff09103c6ee412565c9c8e96fe56fb56fd026192790071db73997ffd033550f40db86ca6a6fe0ab7edc", &(0x7f0000000400)="e115cc7c6c322e857956f84e57dadb81c40d1eea27a0e9db55ff91e9f44a83e2b99032429994732b5c38253f2dc32ab238a10a4f058a8559037368fcc1ae6d917dec3737dce739a3115ab2f0819e204f98b1f728c5c104d1b2f094239aa8602474b1adbc404929256d1eb36da4e5bce6f5eecaf6a96856098e688bfe4c8b86920036392c4e00f10b7d70a48638c5f05e414ab87e45a275f54321bb01dc31bddb48394e4b8779325414a27c924cc95002315ae5ba04993a1272814ea93adac2d485", &(0x7f0000000500)="801ae9dadc616b94741315535319f6d8d9d04b25503e37757143"], 0xb2}) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x6, 0x18, &(0x7f0000000140)=""/24, 0x40f00, 0x1, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x9, 0x7ff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x80) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 08:05:33 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 1: socketpair(0x3, 0x6, 0x5, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180), 0x9, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r2, 0x40184152, &(0x7f0000000780)={0x0, &(0x7f0000000740)=[&(0x7f0000000240)="b208c1754ddd5c32c3af67b9aa1f8de368fb6ac92cb040a3baf819fc3dfffd1c0dcfade7c7a61b3995bf90b94a422b6beec88ee0226d3fd95dcf951a567b5d56104e2e71b49b80ddfaaedc90bcd49fa683c7685c9654a01dd812e38a0390431edf3125116c46dcd35efc4bf238439834ced8936d8e924357b8accc408dfbba78b0b69ac3b4ac04346f0959dea4dc10451aef57278a1ab83795e3da028d797badc11b86283fa96a0599ad90fe", &(0x7f0000000380)="1947308a5ea711d1d604f2e3c4732b4308f7de587b278e77a19de646e8afef960926fd00ff5112ad107e6e76e4456304600bc6a67cf468455453bff253f7aff09103c6ee412565c9c8e96fe56fb56fd026192790071db73997ffd033550f40db86ca6a6fe0ab7edc", &(0x7f0000000400)="e115cc7c6c322e857956f84e57dadb81c40d1eea27a0e9db55ff91e9f44a83e2b99032429994732b5c38253f2dc32ab238a10a4f058a8559037368fcc1ae6d917dec3737dce739a3115ab2f0819e204f98b1f728c5c104d1b2f094239aa8602474b1adbc404929256d1eb36da4e5bce6f5eecaf6a96856098e688bfe4c8b86920036392c4e00f10b7d70a48638c5f05e414ab87e45a275f54321bb01dc31bddb48394e4b8779325414a27c924cc95002315ae5ba04993a1272814ea93adac2d485", &(0x7f0000000500)="801ae9dadc616b94741315535319f6d8d9d04b25503e37757143"], 0xb2}) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x6, 0x18, &(0x7f0000000140)=""/24, 0x40f00, 0x1, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x9, 0x7ff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x80) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) syz_open_dev$sndpcmp(&(0x7f0000000180), 0x9, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r2, 0x40184152, &(0x7f0000000780)={0x0, &(0x7f0000000740)=[&(0x7f0000000240)="b208c1754ddd5c32c3af67b9aa1f8de368fb6ac92cb040a3baf819fc3dfffd1c0dcfade7c7a61b3995bf90b94a422b6beec88ee0226d3fd95dcf951a567b5d56104e2e71b49b80ddfaaedc90bcd49fa683c7685c9654a01dd812e38a0390431edf3125116c46dcd35efc4bf238439834ced8936d8e924357b8accc408dfbba78b0b69ac3b4ac04346f0959dea4dc10451aef57278a1ab83795e3da028d797badc11b86283fa96a0599ad90fe", &(0x7f0000000380)="1947308a5ea711d1d604f2e3c4732b4308f7de587b278e77a19de646e8afef960926fd00ff5112ad107e6e76e4456304600bc6a67cf468455453bff253f7aff09103c6ee412565c9c8e96fe56fb56fd026192790071db73997ffd033550f40db86ca6a6fe0ab7edc", &(0x7f0000000400)="e115cc7c6c322e857956f84e57dadb81c40d1eea27a0e9db55ff91e9f44a83e2b99032429994732b5c38253f2dc32ab238a10a4f058a8559037368fcc1ae6d917dec3737dce739a3115ab2f0819e204f98b1f728c5c104d1b2f094239aa8602474b1adbc404929256d1eb36da4e5bce6f5eecaf6a96856098e688bfe4c8b86920036392c4e00f10b7d70a48638c5f05e414ab87e45a275f54321bb01dc31bddb48394e4b8779325414a27c924cc95002315ae5ba04993a1272814ea93adac2d485", &(0x7f0000000500)="801ae9dadc616b94741315535319f6d8d9d04b25503e37757143"], 0xb2}) (async) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x6, 0x18, &(0x7f0000000140)=""/24, 0x40f00, 0x1, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x9, 0x7ff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x80) (async) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) 08:05:33 executing program 4: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 1: socketpair(0x3, 0x6, 0x5, 0x0) (async) socketpair(0x3, 0x6, 0x5, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) 08:05:33 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/timer_list\x00', 0x0, 0x0) (async) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180), 0x9, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r2, 0x40184152, &(0x7f0000000780)={0x0, &(0x7f0000000740)=[&(0x7f0000000240)="b208c1754ddd5c32c3af67b9aa1f8de368fb6ac92cb040a3baf819fc3dfffd1c0dcfade7c7a61b3995bf90b94a422b6beec88ee0226d3fd95dcf951a567b5d56104e2e71b49b80ddfaaedc90bcd49fa683c7685c9654a01dd812e38a0390431edf3125116c46dcd35efc4bf238439834ced8936d8e924357b8accc408dfbba78b0b69ac3b4ac04346f0959dea4dc10451aef57278a1ab83795e3da028d797badc11b86283fa96a0599ad90fe", &(0x7f0000000380)="1947308a5ea711d1d604f2e3c4732b4308f7de587b278e77a19de646e8afef960926fd00ff5112ad107e6e76e4456304600bc6a67cf468455453bff253f7aff09103c6ee412565c9c8e96fe56fb56fd026192790071db73997ffd033550f40db86ca6a6fe0ab7edc", &(0x7f0000000400)="e115cc7c6c322e857956f84e57dadb81c40d1eea27a0e9db55ff91e9f44a83e2b99032429994732b5c38253f2dc32ab238a10a4f058a8559037368fcc1ae6d917dec3737dce739a3115ab2f0819e204f98b1f728c5c104d1b2f094239aa8602474b1adbc404929256d1eb36da4e5bce6f5eecaf6a96856098e688bfe4c8b86920036392c4e00f10b7d70a48638c5f05e414ab87e45a275f54321bb01dc31bddb48394e4b8779325414a27c924cc95002315ae5ba04993a1272814ea93adac2d485", &(0x7f0000000500)="801ae9dadc616b94741315535319f6d8d9d04b25503e37757143"], 0xb2}) sendto$netrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x6, 0x18, &(0x7f0000000140)=""/24, 0x40f00, 0x1, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x9, 0x7ff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x80) (async) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x7fffffff, 0x4) 08:05:33 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 4: socket(0x0, 0xa, 0x0) 08:05:33 executing program 1: socketpair(0x3, 0x6, 0x5, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) socketpair(0x3, 0x6, 0x5, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) (async) 08:05:33 executing program 2: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_1\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040004) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:33 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x7fffffff, 0x4) 08:05:33 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 4: socket(0x0, 0x0, 0x0) 08:05:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x7fffffff, 0x4) 08:05:33 executing program 2: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_1\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040004) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:33 executing program 1: socketpair(0x22, 0xa, 0xb87, 0x0) 08:05:33 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 5: r0 = socket(0x0, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@delqdisc={0x34, 0x25, 0x800, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x3, 0x8}, {0x5, 0xa}, {0xfff3, 0xe}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x74}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004044}, 0x40) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:33 executing program 2: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_1\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040004) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:33 executing program 1: socketpair(0x22, 0xa, 0xb87, 0x0) 08:05:33 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:33 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x1, 0xf8ad, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x40, 0x3, 0xffff8049}}) 08:05:33 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@delqdisc={0x34, 0x25, 0x800, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x3, 0x8}, {0x5, 0xa}, {0xfff3, 0xe}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x74}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004044}, 0x40) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) 08:05:33 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 08:05:34 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x401, 0x6, 0x4, 0x104, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x2, 0xe}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:34 executing program 1: socketpair(0x22, 0xa, 0xb87, 0x0) 08:05:34 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@delqdisc={0x34, 0x25, 0x800, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x3, 0x8}, {0x5, 0xa}, {0xfff3, 0xe}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x74}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004044}, 0x40) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@delqdisc={0x34, 0x25, 0x800, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x3, 0x8}, {0x5, 0xa}, {0xfff3, 0xe}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x74}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004044}, 0x40) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) (async) 08:05:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 08:05:34 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x401, 0x6, 0x4, 0x104, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x2, 0xe}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0xc) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:34 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 08:05:34 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:34 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) r0 = socket$inet6(0xa, 0x6, 0xff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x44, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xd0}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0xc885}, 0xc004000) 08:05:34 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20088}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f5, 0x200, 0x70bd25, 0x25dfdbfb, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d4) 08:05:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 08:05:34 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 08:05:34 executing program 5: r0 = socket(0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:34 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x401, 0x6, 0x4, 0x104, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x2, 0xe}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0xc) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:34 executing program 5: socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:34 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20088}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f5, 0x200, 0x70bd25, 0x25dfdbfb, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d4) 08:05:34 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) 08:05:34 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 08:05:34 executing program 5: socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 08:05:34 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map}, 0x14) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@ldst={0x0, 0x2, 0x1, 0x0, 0x6, 0x100, 0xffffffffffffffff}, @exit, @exit, @jmp={0x5, 0x0, 0xb, 0x8, 0x7, 0x3d, 0x8}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x17, &(0x7f0000000140)=""/23, 0x40f00, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x6, 0x7fffffff, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x3c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x80}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8084}, 0x884) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0xb4, 0xc5, &(0x7f00000002c0)="1a0446e3c4617085e16da1bda1f6868a9bd301403460a2ba7c3dbe30a97bbee47610d8a5a6eb6b0b0eb5000889bddd3e61257ade643ce451ec563a8e51a686b1a6edb5e9bb69383b0f5fd815fb902ef30991c4d438e73a641fe4e181ec99f2b68a12e70b5287a0f139f5130af87426e7f9b52b433e15d1fb643c5fa27ac2b3fc33674d9b3770f5645b8efe564b8baa3a7a7160279d5d7a27fe8d32a98fc89260aec50d5a07963dfd81bc70a6504893d67bece408", &(0x7f0000000380)=""/197, 0x7, 0x0, 0x8e, 0xe, &(0x7f0000000480)="a5c8018a6d601d99b5006bb6fe0c4d0fd2e29a14c503177bb2e053ded5c97e2a220dc5d480902fc363b8812b0113501e4ff9597f0e3ba3846be9fa9597274618e20b48a86f4a171e22df5c1f0f2ba2b1e218be0d99827afead4635d6b1744e53af00214b3031a8253d61ae5465ed4361814f706857da5bf8ecb6753602babf0d3820426d02c117c75fa15cc52a0c", &(0x7f0000000540)="9a76ec91c6c28f537d170bfcfee8", 0x1, 0x20}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000880)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000740)={{{@in=@private, @in6=@remote}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 08:05:34 executing program 1: socketpair(0x3, 0x0, 0xb87, 0x0) (async) r0 = socket$inet6(0xa, 0x6, 0xff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x44, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xd0}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0xc885}, 0xc004000) 08:05:34 execu