last executing test programs: 3.913823714s ago: executing program 4 (id=5147): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x441, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000880)=ANY=[@ANYRESHEX=r1, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000000005900000003ed00858a5c3c977611b7650abbe42575fc385c2d05e781621d442d5b5c406dc2b0b1c4827ce749621da3b58c0c7af30c4cddcb4de57f7a6b7cbcd9f4a40988c97fab14fcb0"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x432}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000004000000f10000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000001000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES16=0x0, @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1808", @ANYBLOB="0000000000000000b702000014000000b70300"], 0x0, 0x10}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100010}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00 \x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000380), 0x12) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0200000004000000050000000200000000100000", @ANYRES32, @ANYBLOB="0000000007040000000000005f3cb4f1f6b47810eaf2582d0be97b80741c26fea878455187397e914ee9dae164c70000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg(r9, 0x0, 0x40fd) write$cgroup_int(r6, &(0x7f0000000040)=0x800000000000000, 0x1) 3.787485546s ago: executing program 4 (id=5148): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x7, 0x0, 0x10, 0xfc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x6531aa1a, 0xeb}, 0x0, 0xc8, 0x9, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x4, 0x0, 0x200000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000004000000001"], 0xfdef) 3.786795066s ago: executing program 4 (id=5149): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x10001, 0x1, 0x80, 0x4000, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000e1ffffff0000000000"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181213ae1b649895a70d750000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000009a34f8ff00000000bfa20000000000000702d51439698f942618e35a1d9dc40000f8ffffffb70800"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001dc0)={r2, 0xe0, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001b00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000001b40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa, &(0x7f0000001bc0)=[{}], 0x8, 0x10, &(0x7f0000001c00), &(0x7f0000001c40), 0x8, 0x1e, 0x8, 0x8, &(0x7f0000001c80)}}, 0x10) (rerun: 64) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001ac0)={@ifindex=r7, 0x31, 0x1, 0x81, &(0x7f00000019c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000001a00)=[0x0, 0x0, 0x0], &(0x7f0000001a40), &(0x7f0000001a80)}, 0x40) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r2, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@type_tag={0x8, 0x0, 0x0, 0x12, 0x4}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x5}, {0x3, 0x2}, {0xb, 0x2}, {0xb, 0x5}]}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x7e, 0x0, 0x13, 0x4}, @var={0x4, 0x0, 0x0, 0xe, 0x5, 0x2}]}, {0x0, [0x30, 0x2e, 0x0]}}, &(0x7f0000000900)=""/4096, 0x75, 0x1000, 0x0, 0xe42}, 0x28) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r4, @ANYBLOB="020003000000000000eeff000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000000000000200"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x19, 0x1, &(0x7f0000000580)=@raw=[@exit], &(0x7f00000005c0)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x70, '\x00', r8, @cgroup_sockopt=0x15, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x7, 0x637, 0x6}, 0x10, 0x0, r5, 0x4, &(0x7f0000000840)=[r3, r10, r4, r3, r4, r2, r3], &(0x7f0000000880)=[{0x4, 0x2, 0xd, 0xd}, {0x3, 0x2, 0x3, 0x6}, {0x1, 0x1, 0x8, 0xa}, {0x0, 0x4, 0x9}], 0x10, 0x7f}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) socketpair(0x23, 0x5, 0x1000, 0x0) (async) r11 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0), 0x2, 0x0) write$cgroup_type(r11, 0x0, 0x0) (async, rerun: 64) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 3.642678578s ago: executing program 4 (id=5151): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x101}, 0x8a8b, 0x0, 0x1000, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x101}, 0x8a8b, 0x0, 0x1000, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) close(r3) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r6}, 0x10) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r7, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000340)='syzkaller\x00', 0xf, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1bbf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r8}, 0x10) 3.324132864s ago: executing program 3 (id=5154): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280), 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000280)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 3.067890288s ago: executing program 3 (id=5155): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0xd, 0x0, 0x5, 0xffff, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0700000005000000f4ffffff0000010010000000", @ANYRES32=0x1, @ANYBLOB="0300"/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000050000000200"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x5, 0x9, 0x9, 0x48114, r4, 0xfffffffd, '\x00', r1, 0xffffffffffffffff, 0x2, 0x1, 0x4, 0xf, @value=r4}, 0x50) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000500)=ANY=[@ANYBLOB="1000000004000000040000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000006bbc846395086d5e69cb34af3dba5217cc3b05069c26bc31985ec38be62bc6153ce06129af93ab7593589afbeddd53cd645679290fad0f248834079b0278c349b20cfd5b993641ab1a09ad1aa666b3ed9b195b1b9d976b9cfbb0f5637bf704065fb04d4deb4a469e04bc6e02fcd47db565da171c86a209e4e8578d823cfa7d78cc1998609"], 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x22) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[@ANYBLOB="0763707573751400000000000009"], 0x17) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x8f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r10, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000000212000000", &(0x7f0000000300)=""/8, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000005c0), &(0x7f00000003c0)=""/79}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r11}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000340)={'macsec0\x00', @broadcast}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r12, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r4, 0x58, &(0x7f0000000180)}, 0x10) 3.067457398s ago: executing program 0 (id=5156): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000340)='fsi_master_aspeed_opb_write\x00', r5, 0x0, 0x7}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 3.017382099s ago: executing program 2 (id=5157): perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x61, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1, 0x6, 0x400, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x28, 0x3, 0x1, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8941, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="260a0000000f000061111c0000000000180000000000000000000000000000009500000000000000aa096b82eb8d81f4aa28ff6bf420c617b286e2b3d2c8fe3463dfc4b2f536e2fa591ca7318d7a27e6f912ff830194b0ab9e37dacaa7a6dc1ff5133246e631437d27504fa466ffc66ab540c79f3b67d2ae8ad06197ab1bff0749216361e5f40615a7e5f1bf79e7b5d58a3f036de140cf98871c320f0e9888a616ada8bc3ed86a199ca05c63389ea894e279884d13c0b3c037"], &(0x7f0000000000)='GPL\x00'}, 0x80) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&\'&\t&&') ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x3890, 0xfffffffffffffffd}, 0x0, 0x102, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q#\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000b300000000000000030001009841f8ff01000000079f0800080000001858000006000000000000000000000085200000040000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x9ac, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xa, 0xa9d, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000740)=[{0x2, 0x3, 0x3, 0xb}, {0x2, 0x5, 0x8, 0x6}, {0x3, 0x3, 0xd}, {0x0, 0x3, 0xa, 0x6}], 0x10, 0x4}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{}, &(0x7f0000000a40), &(0x7f0000000a80)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x58, &(0x7f0000000d40)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.324253361s ago: executing program 0 (id=5159): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20002, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1b, 0x1e, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000e000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a54980e7a27d200100008500000083000000bf090000000000005509010000000000950000000000000018680000980c38e3bbb1f8ddff01000085100000feffffff1811000028c7defbc5bd20b9e71a9460f61629143bd22c4f0d2c31be54475f2b05ba8c2df33cfabfb7277975af1bd2985da590776bece888f3c2b808eca3d38f367eb5d8ed2df9a1bfc6c974f8bedc5eeb7d561d40491824c91fa3a80f5bae127ea39498fa0000000000000000", @ANYRES32=r2, @ANYRESOCT], &(0x7f0000000240)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) perf_event_open(&(0x7f0000001b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext={0x3}, 0x4920, 0x5, 0x8, 0x0, 0x0, 0x200000, 0x8004, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000300)='block_bio_complete\x00', 0xffffffffffffffff, 0x0, 0x10001}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='ext4_fc_commit_start\x00', r6, 0x0, 0x9}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 2.213337323s ago: executing program 2 (id=5161): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000040000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000198500000071000000850000005000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x24004000) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000eae2967200000000000000000000d56d5a4e80f2bacc577c8e14348f68dd7fdf53442a7fad6404285573582ef1b353c76d7051adae1918abb72d97d13d8ff368b1f0b9b165d044b03752c3500fa2fc47b1c02cafe3d6b31e5a962a366888d93d8ecb44e6a578fb64fdadf137ba103c3f193d600d96d69c2156ec5c74b4de2700d827ef66f669823a9bff6e5e66acc0c72791f259ecf271288ea524f5c24738d4"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000080)='module_request\x00', r6}, 0x6d) socketpair(0x0, 0x0, 0x0, &(0x7f0000001c00)) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) 2.120152854s ago: executing program 1 (id=5163): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00"/11], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x1, 0x5, 0x20, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x8}, 0x80030, 0x2, 0x8, 0x0, 0x9, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af68c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d8320000000000000060176dacba0ec503a37fae6b472ec369c79ee6a420c0fd8d8d82fe136d5af6c30bfeb0a7275babfdb96a127aa9386e0671c6454245a18c1c8c49552cff5d27b547cdc34c0858c77a47a9ff86ee9fbd9ceda428716a4218821176d8067997527230fa67d26950d3e4f2750fa7c872874ad3a2d11f9f6eb08e6d7b6fa257b04d8ce36360f524e3dfd2211641f3d2637d86b80681eca50ce0eecafdd22d41fa515c15591e70ded4b70efac3cb42fb352d82e8f7573e8ed8248da356fa91a252976d3a4d8c1843a8d5bb7f5f1028453a0562a3ea93117076dd4940b7df50d78289fe66197525f6095f8662d232970bef61b03fa83027963a1a2e07cfee30c0d0b4c5877f93b3637ca21eab5afcf5d4638dfe8f9202aaad51c979049dd76d65368cbd4187d9f74257c7c4a23ac4a34eec5aa17e78c5167216f5e72138d20f8325dd5f8f96c32189c904eaef580987f1ce601a7cdc35461db9981ac42f9e24b0699bbe4e3d986e38952b0b7938eefd9e7a292bbb66367ad77045fdc18855c81c031dedd185c723238373fc698d676791d04f1ff5f0825a6619e844882f31ed190233d58ecee949e310bf2b1a51b8a33ae65a06d2b6ad386bf8dc49dd328bcd75d1843a13d68560175a18af7efc3c0f20e32f84f6aaaf000000000000000000000013a6c66bce74a8fb9092023df695da2714a7933d699d42de2bc4a85e0a0e22228290a7a7553ab93a16e42553ed86869a02df2f47d4088fac1772d3cd955c81cbf91c2ca7942942f61723b558079b82547844f92df2499c4b2c2ef2539e5daa8d8727baaa6b5755e6f83bbfca000000000000000000000509619f5f0cbc72eebc653946d3552236f0dfe485cfa71bd69f4ded6e131128c3875b785875addfcbd5931c12adbef75535e694f3a19f28f9f99fa32e8ff66e7b1ff674434fb63ba0e28aadccf77d387525c98e81476058c958eaccfa7d251d0671222dc9d06485f7f690d3d4227bd21bd7ff8338617705b7faec47c86789a488b43d0fedf1b0ee05d65c677ced1e8214b2f6cb74d73886eb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x2, 0x8, 0x200, 0x5, 0x14, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) 2.012150326s ago: executing program 3 (id=5164): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000040000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000198500000071000000850000005000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x24004000) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000eae2967200000000000000000000d56d5a4e80f2bacc577c8e14348f68dd7fdf53442a7fad6404285573582ef1b353c76d7051adae1918abb72d97d13d8ff368b1f0b9b165d044b03752c3500fa2fc47b1c02cafe3d6b31e5a962a366888d93d8ecb44e6a578fb64fdadf137ba103c3f193d600d96d69c2156ec5c74b4de2700d827ef66f669823a9bff6e5e66acc0c72791f259ecf271288ea524f5c24738d4"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000080)='module_request\x00', r6}, 0x6d) socketpair(0x0, 0x0, 0x0, &(0x7f0000001c00)) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) 1.675828321s ago: executing program 0 (id=5165): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="010000000400000008000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) 1.660119902s ago: executing program 1 (id=5166): perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x61, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1, 0x6, 0x400, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x28, 0x3, 0x1, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8941, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="260a0000000f000061111c0000000000180000000000000000000000000000009500000000000000aa096b82eb8d81f4aa28ff6bf420c617b286e2b3d2c8fe3463dfc4b2f536e2fa591ca7318d7a27e6f912ff830194b0ab9e37dacaa7a6dc1ff5133246e631437d27504fa466ffc66ab540c79f3b67d2ae8ad06197ab1bff0749216361e5f40615a7e5f1bf79e7b5d58a3f036de140cf98871c320f0e9888a616ada8bc3ed86a199ca05c63389ea894e279884d"], &(0x7f0000000000)='GPL\x00'}, 0x94) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&\'&\t&&') ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x3890, 0xfffffffffffffffd}, 0x0, 0x102, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q#\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000b300000000000000030001009841f8ff01000000079f080008000000185800000600000000000000000000008520000004000000950000000000"], &(0x7f0000000640)='syzkaller\x00', 0x9ac, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xa, 0xa9d, 0x1}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000740)=[{0x2, 0x3, 0x3, 0xb}, {0x2, 0x5, 0x8, 0x6}, {0x3, 0x3, 0xd}], 0x10, 0x4}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{}, &(0x7f0000000a40), &(0x7f0000000a80)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x58, &(0x7f0000000d40)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.638035162s ago: executing program 0 (id=5167): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000300000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000002f000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20002, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000050d600"/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1b, 0x1e, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000e000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a54980e7a27d200100008500000083000000bf090000000000005509010000000000950000000000000018680000980c38e3bbb1f8ddff01000085100000feffffff1811000028c7defbc5bd20b9e71a9460f61629143bd22c4f0d2c31be54475f2b05ba8c2df33cfabfb7277975af1bd2985da590776bece888f3c2b808eca3d38f367eb5d8ed2df9a1bfc6c974f8bedc5eeb7d561d40491824c91fa3a80f5bae127ea39498fa0000000000000000", @ANYRES32=r2], &(0x7f0000000240)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) perf_event_open(&(0x7f0000001b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext={0x3}, 0x4920, 0x5, 0x8, 0x0, 0x0, 0x200000, 0x8004, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000300)='block_bio_complete\x00', 0xffffffffffffffff, 0x0, 0x10001}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='ext4_fc_commit_start\x00', r7, 0x0, 0x9}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.409141216s ago: executing program 0 (id=5168): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20002, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0100"/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000050d600"/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1b, 0x1e, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000e000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a54980e7a27d200100008500000083000000bf090000000000005509010000000000950000000000000018680000980c38e3bbb1f8ddff01000085100000feffffff1811000028c7defbc5bd20b9e71a9460f61629143bd22c4f0d2c31be54475f2b05ba8c2df33cfabfb7277975af1bd2985da590776bece888f3c2b808eca3d38f367eb5d8ed2df9a1bfc6c974f8bedc5eeb7d561d40491824c91fa3a80f5bae127ea39498fa0000000000000000", @ANYRES32=r2, @ANYRESOCT], &(0x7f0000000240)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) perf_event_open(&(0x7f0000001b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext={0x3}, 0x4920, 0x5, 0x8, 0x0, 0x0, 0x200000, 0x8004, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000300)='block_bio_complete\x00', 0xffffffffffffffff, 0x0, 0x10001}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='ext4_fc_commit_start\x00', r6, 0x0, 0x9}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.275786678s ago: executing program 2 (id=5169): perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x61, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1, 0x6, 0x400, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x28, 0x3, 0x1, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8941, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="260a0000000f000061111c0000000000180000000000000000000000000000009500000000000000aa096b82eb8d81f4aa28ff6bf420c617b286e2b3d2c8fe3463dfc4b2f536e2fa591ca7318d7a27e6f912ff830194b0ab9e37dacaa7a6dc1ff5133246e631437d27504fa466ffc66ab540c79f3b67d2ae8ad06197ab1bff0749216361e5f40615a7e5f1bf79e7b5d58a3f036de140cf98871c320f0e9888a616ada8bc3ed86a199ca05c63389ea894e279884d"], &(0x7f0000000000)='GPL\x00'}, 0x94) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&\'&\t&&') ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x3890, 0xfffffffffffffffd}, 0x0, 0x102, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q#\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000b300000000000000030001009841f8ff01000000079f080008000000185800000600000000000000000000008520000004000000950000000000"], &(0x7f0000000640)='syzkaller\x00', 0x9ac, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x3, 0xa, 0xa9d, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000740)=[{0x2, 0x3, 0x3, 0xb}, {0x2, 0x5, 0x8, 0x6}, {0x3, 0x3, 0xd}, {0x0, 0x3, 0xa, 0x6}], 0x10, 0x4}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{}, &(0x7f0000000a40), &(0x7f0000000a80)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x58, &(0x7f0000000d40)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.1934722s ago: executing program 4 (id=5170): r0 = syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYRESDEC=0x0, @ANYRES32=0x0, @ANYRESHEX=r5, @ANYRES16=r7, @ANYRES32=r1, @ANYRESOCT=r3, @ANYRESOCT=r0, @ANYRESHEX=r7, @ANYRES32=r2, @ANYRESHEX=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1c, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd], {0x95, 0x0, 0x7000}}, 0x0, 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x18}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x6, 0x104800}, 0x4dc6, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffc000000002, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg$tipc(r9, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) r10 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$TUNSETNOCSUM(r10, 0xb703, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.16472198s ago: executing program 3 (id=5171): perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x61, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1, 0x6, 0x400, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x28, 0x3, 0x1, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8941, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="260a0000000f000061111c0000000000180000000000000000000000000000009500000000000000aa096b82eb8d81f4aa28ff6bf420c617b286e2b3d2c8fe3463dfc4b2f536e2fa591ca7318d7a27e6f912ff830194b0ab9e37dacaa7a6dc1ff5133246e631437d27504fa466ffc66ab540c79f3b67d2ae8ad06197ab1bff0749216361e5f40615a7e5f1bf79e7b5d58a3f036de140cf98871c320f0e9888a616ada8bc3ed86a199ca05c63389ea894e279884d13c0b3c037"], &(0x7f0000000000)='GPL\x00'}, 0x80) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&\'&\t&&') ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x3890, 0xfffffffffffffffd}, 0x0, 0x102, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q#\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000b300000000000000030001009841f8ff01000000079f0800080000001858000006000000000000000000000085200000040000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x9ac, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xa, 0xa9d, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000740)=[{0x2, 0x3, 0x3, 0xb}, {0x2, 0x5, 0x8, 0x6}, {0x3, 0x3, 0xd}, {0x0, 0x3, 0xa, 0x6}], 0x10, 0x4}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{}, &(0x7f0000000a40), &(0x7f0000000a80)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x58, &(0x7f0000000d40)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.139362321s ago: executing program 0 (id=5172): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000", @ANYBLOB], 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$MAP_CREATE(0x800000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB="1900000004000000040000000200fa0000000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x48) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x50) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="a836", 0x2}], 0x1}, 0x4040001) (async) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="a836", 0x2}], 0x1}, 0x4040001) recvmsg$unix(r1, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/109, 0x6d}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000440)=@raw=[@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x9) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x5f8, 0x12) 1.050502422s ago: executing program 1 (id=5173): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 1.028771402s ago: executing program 1 (id=5174): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0xd, 0x0, 0x5, 0xffff, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0700000005000000f4ffffff0000010010000000", @ANYRES32=0x1, @ANYBLOB="0300"/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000050000000200"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x5, 0x9, 0x9, 0x48114, r4, 0xfffffffd, '\x00', r1, 0xffffffffffffffff, 0x2, 0x1, 0x4, 0xf, @value=r4}, 0x50) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000500)=ANY=[@ANYBLOB="1000000004000000040000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000006bbc846395086d5e69cb34af3dba5217cc3b05069c26bc31985ec38be62bc6153ce06129af93ab7593589afbeddd53cd645679290fad0f248834079b0278c349b20cfd5b993641ab1a09ad1aa666b3ed9b195b1b9d976b9cfbb0f5637bf704065fb04d4deb4a469e04bc6e02fcd47db565da171c86a209e4e8578d823cfa7d78cc1998609"], 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x22) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[@ANYBLOB="0763707573751400000000000009"], 0x17) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x8f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r10, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000000212000000", &(0x7f0000000300)=""/8, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000005c0), &(0x7f00000003c0)=""/79}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r11}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000340)={'macsec0\x00', @broadcast}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r12, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r4, 0x58, &(0x7f0000000180)}, 0x10) 909.759485ms ago: executing program 3 (id=5175): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) mkdir(0x0, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) r4 = openat$cgroup_ro(r3, 0x0, 0x275a, 0x0) write$cgroup_int(r4, 0x0, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r6}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f0000000000)='./file0\x00', r6}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000580)='GPL\x00', 0x3ff, 0x56, &(0x7f0000000b00)=""/86, 0x41000, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000bc0)={0x4, 0xc, 0x7, 0x334d16fc}, 0x10, 0x2620a, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000040)=[{0x5, 0x3, 0xe, 0x2}, {0x3, 0x5, 0x4, 0x1}, {0x4, 0x1, 0xe}], 0x10, 0x2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0xe) 383.810264ms ago: executing program 2 (id=5176): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20002, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1b, 0x1e, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000e000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a54980e7a27d200100008500000083000000bf090000000000005509010000000000950000000000000018680000980c38e3bbb1f8ddff01000085100000feffffff1811000028c7defbc5bd20b9e71a9460f61629143bd22c4f0d2c31be54475f2b05ba8c2df33cfabfb7277975af1bd2985da590776bece888f3c2b808eca3d38f367eb5d8ed2df9a1bfc6c974f8bedc5eeb7d561d40491824c91fa3a80f5bae127ea39498fa0000000000000000", @ANYRES32=r2, @ANYRESOCT], &(0x7f0000000240)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) perf_event_open(&(0x7f0000001b40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext={0x3}, 0x4920, 0x5, 0x8, 0x0, 0x0, 0x200000, 0x8004, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000300)='block_bio_complete\x00', 0xffffffffffffffff, 0x0, 0x10001}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='ext4_fc_commit_start\x00', r6, 0x0, 0x9}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 376.267494ms ago: executing program 1 (id=5186): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = gettid() perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x2, 0xff, 0xf9, 0x0, 0x90, 0x12580, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x2, 0x10}, 0x114, 0x5, 0xa, 0x8, 0x0, 0x1, 0x7, 0x0, 0xffffffff, 0x0, 0x2}, r1, 0x5, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x10c10d, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x2000000000000090, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r7}, &(0x7f0000000580), &(0x7f00000005c0)=r8}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x101200, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000007c0)=""/259, 0x103}], 0x1}, 0x0) close(r9) sendmsg$tipc(r10, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x58}, 0x10) gettid() 143.905957ms ago: executing program 2 (id=5177): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) close(r0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) write$cgroup_subtree(r0, 0x0, 0x0) write$cgroup_devices(r0, &(0x7f0000000680)={'c', ' *:* ', 'w\x00'}, 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) close(0x3) r4 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x2, 0xb2, 0x0, 0x0, 0x8, 0x80000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x9}, 0x4, 0x8000000000000000, 0x7fff, 0x1, 0x0, 0x3, 0x200, 0x0, 0x10001, 0x0, 0xbac6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xba, 0x96, 0x2, 0x10, 0x0, 0x4, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x9, 0xfffffffffffffffa}, 0x10011, 0x6, 0x1, 0x7, 0xfffffffeffffffff, 0x0, 0x8, 0x0, 0x40, 0x0, 0xc00b}, 0x0, 0x8, r4, 0x10) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r5, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r10}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x1) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0xd, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x4}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @tail_call, @alu={0x4, 0x0, 0x2, 0xa, 0x7, 0x100, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f00000005c0)='GPL\x00', 0xdf5, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x0, 0x6, 0x100}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000300)=[{0x5, 0x2, 0x5, 0xc}, {0x0, 0x3, 0x4, 0xa}, {0x5, 0x2, 0x4, 0x9}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@fallback=r4, 0xb, 0x1, 0x1, &(0x7f0000000400)=[0x0], 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 134.466778ms ago: executing program 4 (id=5178): perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x61, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1, 0x6, 0x400, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x28, 0x3, 0x1, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8941, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="260a0000000f000061111c0000000000180000000000000000000000000000009500000000000000aa096b82eb8d81f4aa28ff6bf420c617b286e2b3d2c8fe3463dfc4b2f536e2fa591ca7318d7a27e6f912ff830194b0ab9e37dacaa7a6dc1ff5133246e631437d27504fa466ffc66ab540c79f3b67d2ae8ad06197ab1bff0749216361e5f40615a7e5f1bf79e7b5d58a3f036de140cf98871c320f0e9888a616ada8bc3ed86a199ca05c63389ea894e279884d"], &(0x7f0000000000)='GPL\x00'}, 0x94) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&\'&\t&&') ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x3890, 0xfffffffffffffffd}, 0x0, 0x102, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00q#\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000b300000000000000030001009841f8ff01000000079f080008000000185800000600000000000000000000008520000004000000950000000000"], &(0x7f0000000640)='syzkaller\x00', 0x9ac, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xa, 0xa9d, 0x1}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000740)=[{0x2, 0x3, 0x3, 0xb}, {0x2, 0x5, 0x8, 0x6}, {0x0, 0x3, 0xa, 0x6}], 0x10, 0x4}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{}, &(0x7f0000000a40), &(0x7f0000000a80)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x58, &(0x7f0000000d40)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 74.590019ms ago: executing program 1 (id=5179): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000040000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000198500000071000000850000005000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x24004000) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000eae2967200000000000000000000d56d5a4e80f2bacc577c8e14348f68dd7fdf53442a7fad6404285573582ef1b353c76d7051adae1918abb72d97d13d8ff368b1f0b9b165d044b03752c3500fa2fc47b1c02cafe3d6b31e5a962a366888d93d8ecb44e6a578fb64fdadf137ba103c3f193d600d96d69c2156ec5c74b4de2700d827ef66f669823a9bff6e5e66acc0c72791f259ecf271288ea524f5c24738d4"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000080)='module_request\x00', r6}, 0x6d) socketpair(0x0, 0x0, 0x0, &(0x7f0000001c00)) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) 1.99392ms ago: executing program 3 (id=5180): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x13, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) 0s ago: executing program 2 (id=5181): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000012c0)={0xffffffffffffffff, 0xe0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000400)=[0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], 0x0, 0x4b, &(0x7f00000010c0)=[{}], 0x8, 0x10, &(0x7f0000001100), &(0x7f0000001140), 0x8, 0x59, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x2, 0xf, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffbfffff}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="660a00000000df0061114c000000000085000000540000009500e400000000000313133bb9bfcc40e24cfa10c5df11b4c4b418de246f1ebed76df30c0011e1c3d19d86658dc73eaed31cec8f412698643d46fbd5f1c6890000f7fdc04a0ee1d7fdc3df546d7f94ff38e95f73c49e33011ed1354ee592f4ad150ae9c64d51c0b23699070200008e544a4daa7b2fc60f0fcc8ac10ad4676663153204ea7247df9b8d0c8eb698a115a6d42e371d9efdbe62b0e52153eb91c1a80f908e3dbcea695c06"], &(0x7f0000000000)='GPL\x00'}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000001300)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) kernel console output (not intermixed with test programs): ity_file_permission+0x83/0xa0 [ 441.736852][T11765] kernel_clone+0x23f/0x940 [ 441.741356][T11765] ? create_io_thread+0x130/0x130 [ 441.746383][T11765] ? __kasan_check_write+0x14/0x20 [ 441.751497][T11765] ? mutex_unlock+0x89/0x220 [ 441.756078][T11765] __x64_sys_clone+0x176/0x1d0 [ 441.760832][T11765] ? __kasan_check_write+0x14/0x20 [ 441.765936][T11765] ? __ia32_sys_vfork+0xf0/0xf0 [ 441.770795][T11765] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 441.776857][T11765] x64_sys_call+0x41f/0x9a0 [ 441.781351][T11765] do_syscall_64+0x4c/0xa0 [ 441.785758][T11765] ? clear_bhb_loop+0x50/0xa0 [ 441.790426][T11765] ? clear_bhb_loop+0x50/0xa0 [ 441.795101][T11765] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 441.800989][T11765] RIP: 0033:0x7ff536839929 [ 441.805400][T11765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.824997][T11765] RSP: 002b:00007ff534ea1fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 441.833407][T11765] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff536839929 [ 441.841370][T11765] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 441.849330][T11765] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 441.857295][T11765] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 441.865264][T11765] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 441.873239][T11765] [ 441.884446][T11769] device sit0 left promiscuous mode [ 442.025107][T11769] device sit0 entered promiscuous mode [ 442.203609][T11786] device sit0 left promiscuous mode [ 442.525072][T11792] device sit0 left promiscuous mode [ 442.584784][T11797] device sit0 entered promiscuous mode [ 442.604405][T11789] device sit0 entered promiscuous mode [ 442.898079][T11814] FAULT_INJECTION: forcing a failure. [ 442.898079][T11814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 442.914647][T11814] CPU: 1 PID: 11814 Comm: syz.2.4032 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 442.924641][T11814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 442.934687][T11814] Call Trace: [ 442.937945][T11814] [ 442.940851][T11814] __dump_stack+0x21/0x30 [ 442.945157][T11814] dump_stack_lvl+0xee/0x150 [ 442.949718][T11814] ? show_regs_print_info+0x20/0x20 [ 442.954892][T11814] dump_stack+0x15/0x20 [ 442.959019][T11814] should_fail+0x3c1/0x510 [ 442.963408][T11814] should_fail_alloc_page+0x55/0x80 [ 442.968585][T11814] prepare_alloc_pages+0x156/0x600 [ 442.973681][T11814] ? __alloc_pages_bulk+0xab0/0xab0 [ 442.978849][T11814] ? irqentry_exit+0x37/0x40 [ 442.983413][T11814] ? exc_page_fault+0x5e/0xb0 [ 442.988065][T11814] __alloc_pages+0x10a/0x440 [ 442.992625][T11814] ? prep_new_page+0x110/0x110 [ 442.997363][T11814] ? copy_user_enhanced_fast_string+0xe/0x40 [ 443.003317][T11814] pipe_write+0x570/0x18d0 [ 443.007706][T11814] ? pipe_write+0x151/0x18d0 [ 443.012269][T11814] ? pipe_read+0xfe0/0xfe0 [ 443.016656][T11814] ? selinux_file_permission+0x3f4/0x510 [ 443.022382][T11814] ? memset+0x35/0x40 [ 443.026350][T11814] ? iov_iter_init+0xbc/0x180 [ 443.031010][T11814] vfs_write+0x802/0xf70 [ 443.035229][T11814] ? file_end_write+0x1b0/0x1b0 [ 443.040054][T11814] ? __fget_files+0x2c4/0x320 [ 443.044707][T11814] ? __fdget_pos+0x1f7/0x380 [ 443.049270][T11814] ? ksys_write+0x71/0x240 [ 443.053668][T11814] ksys_write+0x140/0x240 [ 443.057971][T11814] ? __ia32_sys_read+0x90/0x90 [ 443.062706][T11814] ? debug_smp_processor_id+0x17/0x20 [ 443.068053][T11814] ? perf_trace_sys_enter+0x30/0x150 [ 443.073309][T11814] __x64_sys_write+0x7b/0x90 [ 443.077878][T11814] x64_sys_call+0x8ef/0x9a0 [ 443.082579][T11814] do_syscall_64+0x4c/0xa0 [ 443.086983][T11814] ? clear_bhb_loop+0x50/0xa0 [ 443.091643][T11814] ? clear_bhb_loop+0x50/0xa0 [ 443.096409][T11814] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 443.102287][T11814] RIP: 0033:0x7ff1cd64c929 [ 443.106682][T11814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.126261][T11814] RSP: 002b:00007ff1cbc94038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 443.134648][T11814] RAX: ffffffffffffffda RBX: 00007ff1cd874080 RCX: 00007ff1cd64c929 [ 443.142595][T11814] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 443.150542][T11814] RBP: 00007ff1cbc94090 R08: 0000000000000000 R09: 0000000000000000 [ 443.158487][T11814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 443.166430][T11814] R13: 0000000000000000 R14: 00007ff1cd874080 R15: 00007ffdfd2a6768 [ 443.174381][T11814] [ 443.408317][T11823] device sit0 left promiscuous mode [ 443.508033][T11828] device sit0 entered promiscuous mode [ 443.933668][T11839] device sit0 left promiscuous mode [ 444.219696][T11837] device sit0 entered promiscuous mode [ 444.586632][T11845] device sit0 left promiscuous mode [ 444.699856][T11852] FAULT_INJECTION: forcing a failure. [ 444.699856][T11852] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 444.735841][T11852] CPU: 0 PID: 11852 Comm: syz.4.4046 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 444.745829][T11852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 444.755877][T11852] Call Trace: [ 444.759146][T11852] [ 444.762070][T11852] __dump_stack+0x21/0x30 [ 444.766398][T11852] dump_stack_lvl+0xee/0x150 [ 444.770977][T11852] ? show_regs_print_info+0x20/0x20 [ 444.776163][T11852] ? _raw_spin_lock+0x8e/0xe0 [ 444.780830][T11852] ? _raw_spin_trylock_bh+0x130/0x130 [ 444.786183][T11852] dump_stack+0x15/0x20 [ 444.790316][T11852] should_fail+0x3c1/0x510 [ 444.794711][T11852] should_fail_alloc_page+0x55/0x80 [ 444.799887][T11852] prepare_alloc_pages+0x156/0x600 [ 444.804975][T11852] ? __alloc_pages_bulk+0xab0/0xab0 [ 444.810153][T11852] ? fault_around_bytes_set+0xc0/0xc0 [ 444.815501][T11852] ? debug_smp_processor_id+0x17/0x20 [ 444.820852][T11852] __alloc_pages+0x10a/0x440 [ 444.825421][T11852] ? prep_new_page+0x110/0x110 [ 444.830164][T11852] shmem_alloc_and_acct_page+0x42b/0x870 [ 444.835777][T11852] ? shmem_swapin_page+0x14c0/0x14c0 [ 444.841045][T11852] ? xas_load+0x2ea/0x300 [ 444.845352][T11852] ? pagecache_get_page+0xcbd/0xda0 [ 444.850529][T11852] ? page_cache_prev_miss+0x270/0x270 [ 444.855890][T11852] shmem_getpage_gfp+0xfe5/0x2310 [ 444.860898][T11852] shmem_write_begin+0xce/0x1b0 [ 444.865725][T11852] generic_perform_write+0x2ad/0x670 [ 444.870996][T11852] ? grab_cache_page_write_begin+0xb0/0xb0 [ 444.876797][T11852] ? file_remove_privs+0x590/0x590 [ 444.881888][T11852] ? rwsem_write_trylock+0x130/0x300 [ 444.887154][T11852] ? sysvec_irq_work+0x61/0xc0 [ 444.891906][T11852] ? clear_nonspinnable+0x60/0x60 [ 444.896918][T11852] ? avc_policy_seqno+0x1b/0x70 [ 444.901746][T11852] __generic_file_write_iter+0x268/0x480 [ 444.907357][T11852] generic_file_write_iter+0xa9/0x1d0 [ 444.912704][T11852] vfs_write+0x802/0xf70 [ 444.916928][T11852] ? file_end_write+0x1b0/0x1b0 [ 444.921752][T11852] ? bpf_send_signal_common+0x2b2/0x420 [ 444.927276][T11852] ? wait_for_completion_killable_timeout+0x10/0x10 [ 444.933845][T11852] ? __fget_files+0x2c4/0x320 [ 444.938503][T11852] ? __fdget_pos+0x2d2/0x380 [ 444.943069][T11852] ? ksys_write+0x71/0x240 [ 444.947463][T11852] ksys_write+0x140/0x240 [ 444.951775][T11852] ? __ia32_sys_read+0x90/0x90 [ 444.956528][T11852] ? debug_smp_processor_id+0x17/0x20 [ 444.961897][T11852] __x64_sys_write+0x7b/0x90 [ 444.966469][T11852] x64_sys_call+0x8ef/0x9a0 [ 444.970957][T11852] do_syscall_64+0x4c/0xa0 [ 444.975358][T11852] ? clear_bhb_loop+0x50/0xa0 [ 444.980019][T11852] ? clear_bhb_loop+0x50/0xa0 [ 444.984677][T11852] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 444.990552][T11852] RIP: 0033:0x7fe850715929 [ 444.994947][T11852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 445.014527][T11852] RSP: 002b:00007fe84ed7e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 445.022926][T11852] RAX: ffffffffffffffda RBX: 00007fe85093cfa0 RCX: 00007fe850715929 [ 445.030878][T11852] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 445.038829][T11852] RBP: 00007fe84ed7e090 R08: 0000000000000000 R09: 0000000000000000 [ 445.046781][T11852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 445.054732][T11852] R13: 0000000000000000 R14: 00007fe85093cfa0 R15: 00007ffd1e74c338 [ 445.062686][T11852] [ 446.189727][T11881] device sit0 left promiscuous mode [ 446.251444][T11882] device sit0 entered promiscuous mode [ 446.356131][ T30] audit: type=1400 audit(1751739399.754:139): avc: denied { create } for pid=11894 comm="syz.4.4059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 446.429194][T11898] ªªªªªª: renamed from vlan0 [ 446.627295][T11901] device sit0 left promiscuous mode [ 447.038668][T11904] device sit0 entered promiscuous mode [ 447.360867][T11918] device sit0 left promiscuous mode [ 447.430248][T11928] device sit0 entered promiscuous mode [ 447.443047][T11925] device veth0_vlan left promiscuous mode [ 447.451598][T11925] device veth0_vlan entered promiscuous mode [ 447.458346][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 447.466590][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 447.474388][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 448.603001][T11982] device sit0 entered promiscuous mode [ 448.941154][T11992] device sit0 left promiscuous mode [ 449.221597][T11994] device sit0 left promiscuous mode [ 449.309231][T11988] device sit0 entered promiscuous mode [ 449.745793][T12013] device sit0 left promiscuous mode [ 450.027055][T12016] device sit0 entered promiscuous mode [ 450.649272][T12038] device sit0 left promiscuous mode [ 450.717759][T12041] FAULT_INJECTION: forcing a failure. [ 450.717759][T12041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 450.816596][T12036] device sit0 entered promiscuous mode [ 450.823725][T12041] CPU: 0 PID: 12041 Comm: syz.3.4110 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 450.833701][T12041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 450.843744][T12041] Call Trace: [ 450.847012][T12041] [ 450.849935][T12041] __dump_stack+0x21/0x30 [ 450.854261][T12041] dump_stack_lvl+0xee/0x150 [ 450.858862][T12041] ? show_regs_print_info+0x20/0x20 [ 450.864060][T12041] ? stack_trace_save+0x98/0xe0 [ 450.868910][T12041] ? __stack_depot_save+0x34/0x480 [ 450.874021][T12041] dump_stack+0x15/0x20 [ 450.878174][T12041] should_fail+0x3c1/0x510 [ 450.882596][T12041] should_fail_usercopy+0x1a/0x20 [ 450.887619][T12041] _copy_from_user+0x20/0xd0 [ 450.892204][T12041] __copy_msghdr_from_user+0xaf/0x5e0 [ 450.897563][T12041] ? _kstrtoull+0x3c0/0x4d0 [ 450.902055][T12041] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 450.907320][T12041] ? kstrtouint_from_user+0x1a0/0x200 [ 450.912671][T12041] ___sys_sendmsg+0x156/0x260 [ 450.917328][T12041] ? __sys_sendmsg+0x250/0x250 [ 450.922064][T12041] ? native_apic_msr_write+0x39/0x50 [ 450.927333][T12041] ? __fdget+0x1a1/0x230 [ 450.931556][T12041] __x64_sys_sendmsg+0x1e2/0x2a0 [ 450.936472][T12041] ? ___sys_sendmsg+0x260/0x260 [ 450.941296][T12041] ? ksys_write+0x1eb/0x240 [ 450.945778][T12041] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 450.951829][T12041] x64_sys_call+0x4b/0x9a0 [ 450.956234][T12041] do_syscall_64+0x4c/0xa0 [ 450.960626][T12041] ? clear_bhb_loop+0x50/0xa0 [ 450.965282][T12041] ? clear_bhb_loop+0x50/0xa0 [ 450.969932][T12041] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 450.975798][T12041] RIP: 0033:0x7ff536839929 [ 450.980191][T12041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 450.999774][T12041] RSP: 002b:00007ff534ea2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 451.008163][T12041] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff536839929 [ 451.016114][T12041] RDX: 0000000004040086 RSI: 0000200000000440 RDI: 0000000000000003 [ 451.024066][T12041] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 451.032014][T12041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 451.039962][T12041] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 451.047914][T12041] [ 451.230362][T12052] FAULT_INJECTION: forcing a failure. [ 451.230362][T12052] name failslab, interval 1, probability 0, space 0, times 0 [ 451.248742][T12052] CPU: 0 PID: 12052 Comm: syz.3.4113 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 451.258738][T12052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 451.268786][T12052] Call Trace: [ 451.272060][T12052] [ 451.274978][T12052] __dump_stack+0x21/0x30 [ 451.279303][T12052] dump_stack_lvl+0xee/0x150 [ 451.283890][T12052] ? show_regs_print_info+0x20/0x20 [ 451.289087][T12052] dump_stack+0x15/0x20 [ 451.293238][T12052] should_fail+0x3c1/0x510 [ 451.297655][T12052] ? skb_ensure_writable+0x2e7/0x460 [ 451.303033][T12052] __should_failslab+0xa4/0xe0 [ 451.307798][T12052] should_failslab+0x9/0x20 [ 451.312293][T12052] slab_pre_alloc_hook+0x3b/0xe0 [ 451.317220][T12052] ? skb_ensure_writable+0x2e7/0x460 [ 451.322496][T12052] ? skb_ensure_writable+0x2e7/0x460 [ 451.327775][T12052] __kmalloc_track_caller+0x6c/0x2c0 [ 451.333060][T12052] ? skb_ensure_writable+0x2e7/0x460 [ 451.338352][T12052] ? skb_ensure_writable+0x2e7/0x460 [ 451.343630][T12052] pskb_expand_head+0x11b/0x11d0 [ 451.348559][T12052] ? __copy_skb_header+0x437/0x600 [ 451.353666][T12052] ? __kasan_check_write+0x14/0x20 [ 451.358772][T12052] ? __skb_clone+0x47a/0x790 [ 451.363360][T12052] skb_ensure_writable+0x2e7/0x460 [ 451.368467][T12052] bpf_clone_redirect+0x10b/0x380 [ 451.373504][T12052] bpf_prog_5af0f20e2961581c+0x56/0xb38 [ 451.379042][T12052] ? __kasan_slab_alloc+0xcf/0xf0 [ 451.384055][T12052] ? __kasan_slab_alloc+0xbd/0xf0 [ 451.389068][T12052] ? slab_post_alloc_hook+0x4f/0x2b0 [ 451.394340][T12052] ? kmem_cache_alloc+0xf7/0x260 [ 451.399267][T12052] ? __build_skb+0x2d/0x310 [ 451.403761][T12052] ? build_skb+0x24/0x200 [ 451.408085][T12052] ? bpf_prog_test_run_skb+0x279/0x1150 [ 451.413623][T12052] ? bpf_prog_test_run+0x3d5/0x620 [ 451.418724][T12052] ? __sys_bpf+0x52c/0x730 [ 451.423133][T12052] ? __x64_sys_bpf+0x7c/0x90 [ 451.427711][T12052] ? x64_sys_call+0x4b9/0x9a0 [ 451.432377][T12052] ? do_syscall_64+0x4c/0xa0 [ 451.436964][T12052] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 451.443026][T12052] ? __kasan_check_read+0x11/0x20 [ 451.448042][T12052] ? bpf_test_timer_continue+0x146/0x4a0 [ 451.453672][T12052] bpf_test_run+0x33d/0x8d0 [ 451.458173][T12052] ? convert___skb_to_skb+0x4f0/0x4f0 [ 451.463543][T12052] ? eth_get_headlen+0x1f0/0x1f0 [ 451.468483][T12052] ? convert___skb_to_skb+0x41/0x4f0 [ 451.473776][T12052] bpf_prog_test_run_skb+0x9ec/0x1150 [ 451.479144][T12052] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 451.485029][T12052] bpf_prog_test_run+0x3d5/0x620 [ 451.489962][T12052] ? bpf_prog_query+0x230/0x230 [ 451.494800][T12052] ? selinux_bpf+0xce/0xf0 [ 451.499209][T12052] ? security_bpf+0x82/0xa0 [ 451.503705][T12052] __sys_bpf+0x52c/0x730 [ 451.507939][T12052] ? bpf_link_show_fdinfo+0x310/0x310 [ 451.513305][T12052] ? debug_smp_processor_id+0x17/0x20 [ 451.518671][T12052] __x64_sys_bpf+0x7c/0x90 [ 451.523082][T12052] x64_sys_call+0x4b9/0x9a0 [ 451.527590][T12052] do_syscall_64+0x4c/0xa0 [ 451.532006][T12052] ? clear_bhb_loop+0x50/0xa0 [ 451.536680][T12052] ? clear_bhb_loop+0x50/0xa0 [ 451.541352][T12052] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 451.547238][T12052] RIP: 0033:0x7ff536839929 [ 451.551646][T12052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 451.571242][T12052] RSP: 002b:00007ff534ea2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 451.579649][T12052] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff536839929 [ 451.587609][T12052] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 451.595569][T12052] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 451.603534][T12052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 451.611498][T12052] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 451.619465][T12052] [ 452.030607][T12060] device sit0 entered promiscuous mode [ 452.054512][T12062] device sit0 left promiscuous mode [ 452.095697][T12059] device sit0 entered promiscuous mode [ 453.033492][T12079] device syzkaller0 entered promiscuous mode [ 453.613534][T12100] device sit0 left promiscuous mode [ 453.946294][T12103] device sit0 entered promiscuous mode [ 454.091659][T12112] device sit0 left promiscuous mode [ 454.523425][T12117] device sit0 entered promiscuous mode [ 454.536141][T12129] FAULT_INJECTION: forcing a failure. [ 454.536141][T12129] name failslab, interval 1, probability 0, space 0, times 0 [ 454.558726][T12129] CPU: 1 PID: 12129 Comm: syz.0.4138 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 454.568715][T12129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 454.578758][T12129] Call Trace: [ 454.582030][T12129] [ 454.584950][T12129] __dump_stack+0x21/0x30 [ 454.589273][T12129] dump_stack_lvl+0xee/0x150 [ 454.593841][T12129] ? show_regs_print_info+0x20/0x20 [ 454.599014][T12129] ? sysvec_irq_work+0x61/0xc0 [ 454.603755][T12129] ? asm_sysvec_irq_work+0x1b/0x20 [ 454.608846][T12129] dump_stack+0x15/0x20 [ 454.612973][T12129] should_fail+0x3c1/0x510 [ 454.617366][T12129] __should_failslab+0xa4/0xe0 [ 454.622105][T12129] should_failslab+0x9/0x20 [ 454.626584][T12129] slab_pre_alloc_hook+0x3b/0xe0 [ 454.631497][T12129] __kmalloc+0x6d/0x2c0 [ 454.635628][T12129] ? kernfs_fop_write_iter+0x156/0x400 [ 454.641064][T12129] kernfs_fop_write_iter+0x156/0x400 [ 454.646325][T12129] ? iov_iter_init+0xbc/0x180 [ 454.650977][T12129] vfs_write+0x802/0xf70 [ 454.655198][T12129] ? irqentry_exit+0x37/0x40 [ 454.659767][T12129] ? file_end_write+0x1b0/0x1b0 [ 454.664592][T12129] ? wait_for_completion_killable_timeout+0x10/0x10 [ 454.671162][T12129] ? __fdget_pos+0x2d2/0x380 [ 454.675732][T12129] ? ksys_write+0x71/0x240 [ 454.680120][T12129] ksys_write+0x140/0x240 [ 454.684425][T12129] ? __ia32_sys_read+0x90/0x90 [ 454.689164][T12129] ? sched_clock_cpu+0x18/0x3c0 [ 454.693997][T12129] __x64_sys_write+0x7b/0x90 [ 454.698563][T12129] x64_sys_call+0x8ef/0x9a0 [ 454.703039][T12129] do_syscall_64+0x4c/0xa0 [ 454.707427][T12129] ? clear_bhb_loop+0x50/0xa0 [ 454.712080][T12129] ? clear_bhb_loop+0x50/0xa0 [ 454.716730][T12129] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 454.722596][T12129] RIP: 0033:0x7f757ad9e929 [ 454.726990][T12129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 454.746570][T12129] RSP: 002b:00007f75793e6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 454.754957][T12129] RAX: ffffffffffffffda RBX: 00007f757afc6080 RCX: 00007f757ad9e929 [ 454.762904][T12129] RDX: 0000000000000012 RSI: 0000200000000380 RDI: 000000000000000b [ 454.770849][T12129] RBP: 00007f75793e6090 R08: 0000000000000000 R09: 0000000000000000 [ 454.778797][T12129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 454.786741][T12129] R13: 0000000000000000 R14: 00007f757afc6080 R15: 00007ffc87623a38 [ 454.794694][T12129] [ 455.477684][T12152] device sit0 left promiscuous mode [ 455.648947][T12159] device sit0 entered promiscuous mode [ 456.127977][T12167] device sit0 left promiscuous mode [ 456.241245][T12165] device sit0 entered promiscuous mode [ 456.259352][T12169] FAULT_INJECTION: forcing a failure. [ 456.259352][T12169] name failslab, interval 1, probability 0, space 0, times 0 [ 456.353847][T12169] CPU: 1 PID: 12169 Comm: syz.4.4152 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 456.363847][T12169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 456.373892][T12169] Call Trace: [ 456.377157][T12169] [ 456.380080][T12169] __dump_stack+0x21/0x30 [ 456.384402][T12169] dump_stack_lvl+0xee/0x150 [ 456.388982][T12169] ? show_regs_print_info+0x20/0x20 [ 456.394170][T12169] ? kasan_set_track+0x5b/0x70 [ 456.398934][T12169] ? kasan_set_free_info+0x23/0x40 [ 456.404036][T12169] ? ____kasan_slab_free+0x125/0x160 [ 456.409307][T12169] ? __kasan_slab_free+0x11/0x20 [ 456.414236][T12169] ? slab_free_freelist_hook+0xc2/0x190 [ 456.419776][T12169] dump_stack+0x15/0x20 [ 456.423930][T12169] should_fail+0x3c1/0x510 [ 456.428338][T12169] __should_failslab+0xa4/0xe0 [ 456.433092][T12169] should_failslab+0x9/0x20 [ 456.437583][T12169] slab_pre_alloc_hook+0x3b/0xe0 [ 456.442513][T12169] __kmalloc+0x6d/0x2c0 [ 456.446658][T12169] ? bpf_test_init+0x100/0x1c0 [ 456.451410][T12169] bpf_test_init+0x100/0x1c0 [ 456.455988][T12169] bpf_prog_test_run_skb+0x193/0x1150 [ 456.461349][T12169] ? __kasan_check_write+0x14/0x20 [ 456.466450][T12169] ? fput_many+0x15a/0x1a0 [ 456.470857][T12169] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 456.476740][T12169] bpf_prog_test_run+0x3d5/0x620 [ 456.481672][T12169] ? bpf_prog_query+0x230/0x230 [ 456.486513][T12169] ? selinux_bpf+0xce/0xf0 [ 456.490924][T12169] ? security_bpf+0x82/0xa0 [ 456.495418][T12169] __sys_bpf+0x52c/0x730 [ 456.499647][T12169] ? bpf_link_show_fdinfo+0x310/0x310 [ 456.505010][T12169] ? debug_smp_processor_id+0x17/0x20 [ 456.510374][T12169] __x64_sys_bpf+0x7c/0x90 [ 456.514775][T12169] x64_sys_call+0x4b9/0x9a0 [ 456.519269][T12169] do_syscall_64+0x4c/0xa0 [ 456.523675][T12169] ? clear_bhb_loop+0x50/0xa0 [ 456.528341][T12169] ? clear_bhb_loop+0x50/0xa0 [ 456.533003][T12169] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 456.538878][T12169] RIP: 0033:0x7fe850715929 [ 456.543274][T12169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.562855][T12169] RSP: 002b:00007fe84ed7e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 456.571246][T12169] RAX: ffffffffffffffda RBX: 00007fe85093cfa0 RCX: 00007fe850715929 [ 456.579195][T12169] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 456.587144][T12169] RBP: 00007fe84ed7e090 R08: 0000000000000000 R09: 0000000000000000 [ 456.595090][T12169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.603038][T12169] R13: 0000000000000000 R14: 00007fe85093cfa0 R15: 00007ffd1e74c338 [ 456.610992][T12169] [ 457.110848][ T30] audit: type=1400 audit(1751739410.504:140): avc: denied { create } for pid=12181 comm="syz.1.4156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 458.041506][T12217] device sit0 left promiscuous mode [ 458.438819][T12221] device sit0 entered promiscuous mode [ 458.545604][T12231] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.552869][T12231] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.829053][T12248] device pim6reg1 entered promiscuous mode [ 458.948595][T12231] device bridge_slave_1 left promiscuous mode [ 458.960576][T12231] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.006571][T12231] device bridge_slave_0 left promiscuous mode [ 459.024212][T12231] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.349135][ T30] audit: type=1400 audit(1751739413.744:141): avc: denied { create } for pid=12273 comm="syz.0.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 461.289372][T12294] device sit0 left promiscuous mode [ 461.394443][T12294] device sit0 entered promiscuous mode [ 464.067097][T12316] FAULT_INJECTION: forcing a failure. [ 464.067097][T12316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 464.132006][T12316] CPU: 0 PID: 12316 Comm: syz.0.4196 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 464.142004][T12316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 464.152049][T12316] Call Trace: [ 464.155310][T12316] [ 464.158226][T12316] __dump_stack+0x21/0x30 [ 464.162538][T12316] dump_stack_lvl+0xee/0x150 [ 464.167108][T12316] ? show_regs_print_info+0x20/0x20 [ 464.172288][T12316] dump_stack+0x15/0x20 [ 464.176417][T12316] should_fail+0x3c1/0x510 [ 464.180808][T12316] should_fail_alloc_page+0x55/0x80 [ 464.185986][T12316] prepare_alloc_pages+0x156/0x600 [ 464.191075][T12316] ? __alloc_pages_bulk+0xab0/0xab0 [ 464.196248][T12316] ? slab_post_alloc_hook+0x4f/0x2b0 [ 464.201514][T12316] ? alloc_vmap_area+0x17a/0x1990 [ 464.206512][T12316] ? __get_vm_area_node+0x14e/0x350 [ 464.211686][T12316] ? __vmalloc_node_range+0xe8/0x840 [ 464.216946][T12316] ? htab_map_alloc+0x3c0/0x14f0 [ 464.221860][T12316] __alloc_pages+0x10a/0x440 [ 464.226424][T12316] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 464.232208][T12316] ? prep_new_page+0x110/0x110 [ 464.236948][T12316] ? __kasan_check_write+0x14/0x20 [ 464.242039][T12316] __get_free_pages+0x10/0x30 [ 464.246690][T12316] kasan_populate_vmalloc_pte+0x29/0x120 [ 464.252299][T12316] __apply_to_page_range+0x8b0/0xbf0 [ 464.257559][T12316] ? kasan_populate_vmalloc+0x70/0x70 [ 464.262911][T12316] ? kasan_populate_vmalloc+0x70/0x70 [ 464.268263][T12316] apply_to_page_range+0x3b/0x50 [ 464.273183][T12316] kasan_populate_vmalloc+0x60/0x70 [ 464.278358][T12316] alloc_vmap_area+0x185c/0x1990 [ 464.283273][T12316] ? vm_map_ram+0xa60/0xa60 [ 464.287751][T12316] ? __get_vm_area_node+0x11d/0x350 [ 464.292927][T12316] __get_vm_area_node+0x14e/0x350 [ 464.297932][T12316] __vmalloc_node_range+0xe8/0x840 [ 464.303021][T12316] ? htab_map_alloc+0x3c0/0x14f0 [ 464.307936][T12316] ? irqentry_exit+0x37/0x40 [ 464.312505][T12316] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 464.318290][T12316] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 464.324421][T12316] bpf_map_area_alloc+0xd5/0xe0 [ 464.329251][T12316] ? htab_map_alloc+0x3c0/0x14f0 [ 464.334167][T12316] htab_map_alloc+0x3c0/0x14f0 [ 464.338908][T12316] ? __kasan_check_write+0x14/0x20 [ 464.344002][T12316] ? fput_many+0x15a/0x1a0 [ 464.348395][T12316] ? bpf_map_meta_alloc+0x16d/0x8c0 [ 464.353571][T12316] htab_of_map_alloc+0x55/0xc0 [ 464.358310][T12316] map_create+0x455/0x21b0 [ 464.362700][T12316] __sys_bpf+0x2cf/0x730 [ 464.366919][T12316] ? bpf_link_show_fdinfo+0x310/0x310 [ 464.372269][T12316] __x64_sys_bpf+0x7c/0x90 [ 464.376661][T12316] x64_sys_call+0x4b9/0x9a0 [ 464.381141][T12316] do_syscall_64+0x4c/0xa0 [ 464.385538][T12316] ? clear_bhb_loop+0x50/0xa0 [ 464.390364][T12316] ? clear_bhb_loop+0x50/0xa0 [ 464.395016][T12316] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 464.400883][T12316] RIP: 0033:0x7f757ad9e929 [ 464.405276][T12316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 464.424854][T12316] RSP: 002b:00007f7579407038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 464.433242][T12316] RAX: ffffffffffffffda RBX: 00007f757afc5fa0 RCX: 00007f757ad9e929 [ 464.441188][T12316] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0c00000000000000 [ 464.449134][T12316] RBP: 00007f7579407090 R08: 0000000000000000 R09: 0000000000000000 [ 464.457080][T12316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 464.465033][T12316] R13: 0000000000000000 R14: 00007f757afc5fa0 R15: 00007ffc87623a38 [ 464.472985][T12316] [ 467.840307][T12326] device sit0 left promiscuous mode [ 467.874363][T12327] device sit0 entered promiscuous mode [ 468.016149][T12345] FAULT_INJECTION: forcing a failure. [ 468.016149][T12345] name failslab, interval 1, probability 0, space 0, times 0 [ 468.038185][T12337] device sit0 left promiscuous mode [ 468.053140][T12345] CPU: 1 PID: 12345 Comm: syz.3.4207 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 468.063129][T12345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 468.073181][T12345] Call Trace: [ 468.076454][T12345] [ 468.079383][T12345] __dump_stack+0x21/0x30 [ 468.083710][T12345] dump_stack_lvl+0xee/0x150 [ 468.088291][T12345] ? show_regs_print_info+0x20/0x20 [ 468.093485][T12345] dump_stack+0x15/0x20 [ 468.097637][T12345] should_fail+0x3c1/0x510 [ 468.102106][T12345] __should_failslab+0xa4/0xe0 [ 468.106868][T12345] should_failslab+0x9/0x20 [ 468.111360][T12345] slab_pre_alloc_hook+0x3b/0xe0 [ 468.116288][T12345] ? dup_task_struct+0x57/0xc10 [ 468.121129][T12345] kmem_cache_alloc+0x44/0x260 [ 468.125880][T12345] ? _raw_spin_lock_irq+0x8f/0xe0 [ 468.130899][T12345] dup_task_struct+0x57/0xc10 [ 468.135576][T12345] ? __kasan_check_write+0x14/0x20 [ 468.140690][T12345] ? recalc_sigpending+0x1ac/0x230 [ 468.145798][T12345] copy_process+0x5a9/0x3210 [ 468.150383][T12345] ? kstrtol_from_user+0x260/0x260 [ 468.155490][T12345] ? memset+0x35/0x40 [ 468.159473][T12345] ? __kasan_check_write+0x14/0x20 [ 468.164577][T12345] ? proc_fail_nth_write+0x17a/0x1f0 [ 468.169858][T12345] ? proc_fail_nth_read+0x210/0x210 [ 468.175057][T12345] ? __pidfd_prepare+0x150/0x150 [ 468.179992][T12345] ? security_file_permission+0x83/0xa0 [ 468.185533][T12345] kernel_clone+0x23f/0x940 [ 468.190033][T12345] ? create_io_thread+0x130/0x130 [ 468.195053][T12345] ? __kasan_check_write+0x14/0x20 [ 468.200156][T12345] ? mutex_unlock+0x89/0x220 [ 468.204739][T12345] __x64_sys_clone+0x176/0x1d0 [ 468.209499][T12345] ? __kasan_check_write+0x14/0x20 [ 468.214605][T12345] ? __ia32_sys_vfork+0xf0/0xf0 [ 468.219455][T12345] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 468.225519][T12345] x64_sys_call+0x41f/0x9a0 [ 468.230020][T12345] do_syscall_64+0x4c/0xa0 [ 468.234442][T12345] ? clear_bhb_loop+0x50/0xa0 [ 468.239117][T12345] ? clear_bhb_loop+0x50/0xa0 [ 468.243791][T12345] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 468.249675][T12345] RIP: 0033:0x7ff536839929 [ 468.254086][T12345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.273692][T12345] RSP: 002b:00007ff534ea1fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 468.282097][T12345] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff536839929 [ 468.290060][T12345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 468.298024][T12345] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 468.305983][T12345] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 468.313944][T12345] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 468.321909][T12345] [ 468.796295][T12361] device sit0 left promiscuous mode [ 469.373023][T12364] device sit0 left promiscuous mode [ 469.401833][T12363] device sit0 entered promiscuous mode [ 469.593855][T12367] device sit0 left promiscuous mode [ 469.772953][T12369] device sit0 entered promiscuous mode [ 470.260591][T12401] device sit0 left promiscuous mode [ 470.451299][T12411] device sit0 entered promiscuous mode [ 470.473445][T12410] device sit0 entered promiscuous mode [ 470.728611][T12425] device sit0 left promiscuous mode [ 471.056510][T12438] device sit0 entered promiscuous mode [ 471.397400][T12454] device sit0 left promiscuous mode [ 471.675006][T12457] device sit0 entered promiscuous mode [ 472.819818][T12493] device sit0 left promiscuous mode [ 473.274674][T12495] device sit0 entered promiscuous mode [ 473.357400][T12506] FAULT_INJECTION: forcing a failure. [ 473.357400][T12506] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 473.392909][T12506] CPU: 0 PID: 12506 Comm: syz.4.4261 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 473.402899][T12506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 473.412943][T12506] Call Trace: [ 473.416202][T12506] [ 473.419109][T12506] __dump_stack+0x21/0x30 [ 473.423421][T12506] dump_stack_lvl+0xee/0x150 [ 473.427983][T12506] ? show_regs_print_info+0x20/0x20 [ 473.433159][T12506] ? 0xffffffffa0028fe4 [ 473.437289][T12506] dump_stack+0x15/0x20 [ 473.441418][T12506] should_fail+0x3c1/0x510 [ 473.445814][T12506] should_fail_alloc_page+0x55/0x80 [ 473.450987][T12506] prepare_alloc_pages+0x156/0x600 [ 473.456076][T12506] ? __alloc_pages_bulk+0xab0/0xab0 [ 473.461250][T12506] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 473.466860][T12506] __alloc_pages+0x10a/0x440 [ 473.471426][T12506] ? prep_new_page+0x110/0x110 [ 473.476167][T12506] pcpu_populate_chunk+0x184/0xcb0 [ 473.481259][T12506] ? _find_next_bit+0x1b5/0x200 [ 473.486087][T12506] pcpu_alloc+0xc4d/0x1660 [ 473.490482][T12506] __alloc_percpu_gfp+0x25/0x30 [ 473.495307][T12506] bpf_map_alloc_percpu+0xc5/0x150 [ 473.500397][T12506] array_map_alloc+0x39a/0x6d0 [ 473.505137][T12506] map_create+0x455/0x21b0 [ 473.509526][T12506] __sys_bpf+0x2cf/0x730 [ 473.513745][T12506] ? bpf_link_show_fdinfo+0x310/0x310 [ 473.519102][T12506] ? debug_smp_processor_id+0x17/0x20 [ 473.524447][T12506] __x64_sys_bpf+0x7c/0x90 [ 473.528839][T12506] x64_sys_call+0x4b9/0x9a0 [ 473.533320][T12506] do_syscall_64+0x4c/0xa0 [ 473.537708][T12506] ? clear_bhb_loop+0x50/0xa0 [ 473.542362][T12506] ? clear_bhb_loop+0x50/0xa0 [ 473.547014][T12506] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 473.552883][T12506] RIP: 0033:0x7fe850715929 [ 473.557275][T12506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.576853][T12506] RSP: 002b:00007fe84ed7e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 473.585241][T12506] RAX: ffffffffffffffda RBX: 00007fe85093cfa0 RCX: 00007fe850715929 [ 473.593186][T12506] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 473.601133][T12506] RBP: 00007fe84ed7e090 R08: 0000000000000000 R09: 0000000000000000 [ 473.609080][T12506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 473.617025][T12506] R13: 0000000000000000 R14: 00007fe85093cfa0 R15: 00007ffd1e74c338 [ 473.624975][T12506] [ 474.039098][T12529] device sit0 entered promiscuous mode [ 474.150262][T12540] FAULT_INJECTION: forcing a failure. [ 474.150262][T12540] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 474.163357][T12540] CPU: 0 PID: 12540 Comm: syz.1.4274 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 474.173331][T12540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 474.183375][T12540] Call Trace: [ 474.186641][T12540] [ 474.189555][T12540] __dump_stack+0x21/0x30 [ 474.193868][T12540] dump_stack_lvl+0xee/0x150 [ 474.198436][T12540] ? show_regs_print_info+0x20/0x20 [ 474.203609][T12540] ? __kasan_check_write+0x14/0x20 [ 474.208707][T12540] ? _raw_spin_lock_irq+0x8f/0xe0 [ 474.213710][T12540] dump_stack+0x15/0x20 [ 474.217838][T12540] should_fail+0x3c1/0x510 [ 474.222232][T12540] should_fail_usercopy+0x1a/0x20 [ 474.227232][T12540] copy_page_from_iter_atomic+0x3fb/0x1350 [ 474.233021][T12540] ? pipe_zero+0x370/0x370 [ 474.237416][T12540] generic_perform_write+0x307/0x670 [ 474.242680][T12540] ? grab_cache_page_write_begin+0xb0/0xb0 [ 474.248467][T12540] ? file_remove_privs+0x590/0x590 [ 474.253555][T12540] ? rwsem_write_trylock+0x130/0x300 [ 474.258817][T12540] ? clear_nonspinnable+0x60/0x60 [ 474.263820][T12540] ? avc_policy_seqno+0x1b/0x70 [ 474.268647][T12540] __generic_file_write_iter+0x268/0x480 [ 474.274259][T12540] generic_file_write_iter+0xa9/0x1d0 [ 474.279604][T12540] vfs_write+0x802/0xf70 [ 474.283823][T12540] ? file_end_write+0x1b0/0x1b0 [ 474.288646][T12540] ? wait_for_completion_killable_timeout+0x10/0x10 [ 474.295215][T12540] ? __fget_files+0x2c4/0x320 [ 474.299876][T12540] ? __fdget_pos+0x2d2/0x380 [ 474.304441][T12540] ? ksys_write+0x71/0x240 [ 474.308832][T12540] ksys_write+0x140/0x240 [ 474.313137][T12540] ? __ia32_sys_read+0x90/0x90 [ 474.317876][T12540] ? debug_smp_processor_id+0x17/0x20 [ 474.323227][T12540] __x64_sys_write+0x7b/0x90 [ 474.327791][T12540] x64_sys_call+0x8ef/0x9a0 [ 474.332269][T12540] do_syscall_64+0x4c/0xa0 [ 474.336661][T12540] ? clear_bhb_loop+0x50/0xa0 [ 474.341321][T12540] ? clear_bhb_loop+0x50/0xa0 [ 474.345971][T12540] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 474.351838][T12540] RIP: 0033:0x7f4674e01929 [ 474.356229][T12540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 474.375812][T12540] RSP: 002b:00007f467346a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 474.384203][T12540] RAX: ffffffffffffffda RBX: 00007f4675028fa0 RCX: 00007f4674e01929 [ 474.392150][T12540] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 474.400095][T12540] RBP: 00007f467346a090 R08: 0000000000000000 R09: 0000000000000000 [ 474.408039][T12540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 474.415986][T12540] R13: 0000000000000000 R14: 00007f4675028fa0 R15: 00007ffd0102af98 [ 474.423939][T12540] [ 474.753971][T12535] device sit0 left promiscuous mode [ 474.945824][T12555] device sit0 entered promiscuous mode [ 475.787164][T12603] device sit0 left promiscuous mode [ 477.004667][T12653] FAULT_INJECTION: forcing a failure. [ 477.004667][T12653] name failslab, interval 1, probability 0, space 0, times 0 [ 477.050566][T12653] CPU: 1 PID: 12653 Comm: syz.4.4315 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 477.060571][T12653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 477.070618][T12653] Call Trace: [ 477.073885][T12653] [ 477.076802][T12653] __dump_stack+0x21/0x30 [ 477.081128][T12653] dump_stack_lvl+0xee/0x150 [ 477.085708][T12653] ? show_regs_print_info+0x20/0x20 [ 477.090899][T12653] dump_stack+0x15/0x20 [ 477.095040][T12653] should_fail+0x3c1/0x510 [ 477.099445][T12653] __should_failslab+0xa4/0xe0 [ 477.104198][T12653] should_failslab+0x9/0x20 [ 477.108693][T12653] slab_pre_alloc_hook+0x3b/0xe0 [ 477.113622][T12653] ? __alloc_skb+0xe0/0x740 [ 477.118114][T12653] kmem_cache_alloc+0x44/0x260 [ 477.122878][T12653] __alloc_skb+0xe0/0x740 [ 477.127206][T12653] alloc_skb_with_frags+0xa8/0x620 [ 477.132311][T12653] ? memcpy+0x56/0x70 [ 477.136284][T12653] sock_alloc_send_pskb+0x853/0x980 [ 477.141479][T12653] ? sock_kzfree_s+0x60/0x60 [ 477.146058][T12653] ? __kasan_check_write+0x14/0x20 [ 477.151154][T12653] ? _raw_spin_lock+0x8e/0xe0 [ 477.155825][T12653] ? _raw_spin_trylock_bh+0x130/0x130 [ 477.161186][T12653] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 477.167414][T12653] unix_dgram_sendmsg+0x5ea/0x1880 [ 477.172517][T12653] ? stack_trace_save+0xe0/0xe0 [ 477.177365][T12653] ? unix_dgram_poll+0x6b0/0x6b0 [ 477.182295][T12653] ? security_socket_sendmsg+0x82/0xa0 [ 477.187747][T12653] ? unix_dgram_poll+0x6b0/0x6b0 [ 477.192677][T12653] ____sys_sendmsg+0x5a2/0x8c0 [ 477.197433][T12653] ? __sys_sendmsg_sock+0x40/0x40 [ 477.202442][T12653] ? kstrtouint_from_user+0x1a0/0x200 [ 477.207802][T12653] ? import_iovec+0x7c/0xb0 [ 477.212294][T12653] ___sys_sendmsg+0x1f0/0x260 [ 477.216961][T12653] ? __sys_sendmsg+0x250/0x250 [ 477.221717][T12653] ? __fdget+0x1a1/0x230 [ 477.225955][T12653] __x64_sys_sendmsg+0x1e2/0x2a0 [ 477.230882][T12653] ? ___sys_sendmsg+0x260/0x260 [ 477.235720][T12653] ? ksys_write+0x1eb/0x240 [ 477.240211][T12653] ? perf_trace_sys_enter+0x30/0x150 [ 477.245481][T12653] ? trace_sys_enter+0x3d/0x50 [ 477.250229][T12653] x64_sys_call+0x4b/0x9a0 [ 477.254633][T12653] do_syscall_64+0x4c/0xa0 [ 477.259037][T12653] ? clear_bhb_loop+0x50/0xa0 [ 477.263700][T12653] ? clear_bhb_loop+0x50/0xa0 [ 477.268362][T12653] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 477.274241][T12653] RIP: 0033:0x7fe850715929 [ 477.278650][T12653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 477.298239][T12653] RSP: 002b:00007fe84ed7e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 477.306641][T12653] RAX: ffffffffffffffda RBX: 00007fe85093cfa0 RCX: 00007fe850715929 [ 477.314601][T12653] RDX: 0000000004040086 RSI: 0000200000000440 RDI: 0000000000000003 [ 477.322559][T12653] RBP: 00007fe84ed7e090 R08: 0000000000000000 R09: 0000000000000000 [ 477.330523][T12653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 477.338485][T12653] R13: 0000000000000000 R14: 00007fe85093cfa0 R15: 00007ffd1e74c338 [ 477.346451][T12653] [ 477.416437][T12660] device sit0 left promiscuous mode [ 477.496176][T12647] device sit0 entered promiscuous mode [ 479.336490][T12711] device sit0 left promiscuous mode [ 479.441564][T12715] device sit0 entered promiscuous mode [ 479.498644][T12717] device sit0 entered promiscuous mode [ 481.099446][T12762] device sit0 left promiscuous mode [ 481.218741][T12761] device sit0 entered promiscuous mode [ 482.172606][T12790] device sit0 left promiscuous mode [ 482.232527][T12789] device sit0 entered promiscuous mode [ 482.925895][T12803] device sit0 left promiscuous mode [ 482.974562][T12796] device sit0 left promiscuous mode [ 483.038776][T12799] device sit0 entered promiscuous mode [ 483.297873][T12794] device sit0 entered promiscuous mode [ 483.410609][T12805] device sit0 left promiscuous mode [ 483.706387][T12808] device sit0 entered promiscuous mode [ 484.639758][T12835] FAULT_INJECTION: forcing a failure. [ 484.639758][T12835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 484.688629][T12835] CPU: 0 PID: 12835 Comm: syz.0.4375 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 484.698629][T12835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 484.708676][T12835] Call Trace: [ 484.711942][T12835] [ 484.714863][T12835] __dump_stack+0x21/0x30 [ 484.719186][T12835] dump_stack_lvl+0xee/0x150 [ 484.723769][T12835] ? show_regs_print_info+0x20/0x20 [ 484.728959][T12835] dump_stack+0x15/0x20 [ 484.733103][T12835] should_fail+0x3c1/0x510 [ 484.737514][T12835] should_fail_usercopy+0x1a/0x20 [ 484.742530][T12835] _copy_from_user+0x20/0xd0 [ 484.747114][T12835] iovec_from_user+0x1bc/0x2f0 [ 484.751866][T12835] __import_iovec+0x71/0x400 [ 484.756445][T12835] ? kstrtol_from_user+0x260/0x260 [ 484.761549][T12835] import_iovec+0x7c/0xb0 [ 484.765871][T12835] ___sys_recvmsg+0x420/0x4f0 [ 484.770540][T12835] ? __sys_recvmsg+0x250/0x250 [ 484.775294][T12835] ? __irq_work_queue_local+0x115/0x190 [ 484.780832][T12835] ? __fdget+0x1a1/0x230 [ 484.785066][T12835] __x64_sys_recvmsg+0x1df/0x2a0 [ 484.789995][T12835] ? ___sys_recvmsg+0x4f0/0x4f0 [ 484.794837][T12835] ? ksys_write+0x1eb/0x240 [ 484.799333][T12835] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 484.805393][T12835] x64_sys_call+0x705/0x9a0 [ 484.809887][T12835] do_syscall_64+0x4c/0xa0 [ 484.814290][T12835] ? clear_bhb_loop+0x50/0xa0 [ 484.818955][T12835] ? clear_bhb_loop+0x50/0xa0 [ 484.823628][T12835] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 484.829507][T12835] RIP: 0033:0x7f757ad9e929 [ 484.833909][T12835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.853505][T12835] RSP: 002b:00007f7579407038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 484.861910][T12835] RAX: ffffffffffffffda RBX: 00007f757afc5fa0 RCX: 00007f757ad9e929 [ 484.869872][T12835] RDX: 0000000000002000 RSI: 0000200000000bc0 RDI: 0000000000000004 [ 484.877832][T12835] RBP: 00007f7579407090 R08: 0000000000000000 R09: 0000000000000000 [ 484.885790][T12835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.893755][T12835] R13: 0000000000000000 R14: 00007f757afc5fa0 R15: 00007ffc87623a38 [ 484.901725][T12835] [ 486.962248][T12895] device sit0 left promiscuous mode [ 486.982055][T12900] FAULT_INJECTION: forcing a failure. [ 486.982055][T12900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.168619][T12900] CPU: 0 PID: 12900 Comm: syz.2.4401 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 487.178624][T12900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 487.188668][T12900] Call Trace: [ 487.191934][T12900] [ 487.194853][T12900] __dump_stack+0x21/0x30 [ 487.199178][T12900] dump_stack_lvl+0xee/0x150 [ 487.203762][T12900] ? show_regs_print_info+0x20/0x20 [ 487.208953][T12900] dump_stack+0x15/0x20 [ 487.213101][T12900] should_fail+0x3c1/0x510 [ 487.217511][T12900] should_fail_alloc_page+0x55/0x80 [ 487.222704][T12900] prepare_alloc_pages+0x156/0x600 [ 487.227806][T12900] ? __alloc_pages_bulk+0xab0/0xab0 [ 487.232998][T12900] ? irqentry_exit+0x37/0x40 [ 487.237577][T12900] __alloc_pages+0x10a/0x440 [ 487.242156][T12900] ? prep_new_page+0x110/0x110 [ 487.246910][T12900] pipe_write+0x570/0x18d0 [ 487.251319][T12900] ? pipe_write+0x151/0x18d0 [ 487.255904][T12900] ? pipe_read+0xfe0/0xfe0 [ 487.260312][T12900] ? selinux_file_permission+0x3f4/0x510 [ 487.265934][T12900] ? memset+0x35/0x40 [ 487.269905][T12900] ? iov_iter_init+0xbc/0x180 [ 487.274573][T12900] vfs_write+0x802/0xf70 [ 487.278803][T12900] ? file_end_write+0x1b0/0x1b0 [ 487.283638][T12900] ? bpf_send_signal_common+0x2b2/0x420 [ 487.289174][T12900] ? __fget_files+0x2c4/0x320 [ 487.293841][T12900] ? __fdget_pos+0x1f7/0x380 [ 487.298418][T12900] ? ksys_write+0x71/0x240 [ 487.302821][T12900] ksys_write+0x140/0x240 [ 487.307139][T12900] ? __ia32_sys_read+0x90/0x90 [ 487.311891][T12900] ? debug_smp_processor_id+0x17/0x20 [ 487.317254][T12900] __x64_sys_write+0x7b/0x90 [ 487.321832][T12900] x64_sys_call+0x8ef/0x9a0 [ 487.326325][T12900] do_syscall_64+0x4c/0xa0 [ 487.330730][T12900] ? clear_bhb_loop+0x50/0xa0 [ 487.335396][T12900] ? clear_bhb_loop+0x50/0xa0 [ 487.340059][T12900] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 487.345940][T12900] RIP: 0033:0x7ff1cd64c929 [ 487.350343][T12900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 487.369937][T12900] RSP: 002b:00007ff1cbcb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 487.378341][T12900] RAX: ffffffffffffffda RBX: 00007ff1cd873fa0 RCX: 00007ff1cd64c929 [ 487.386305][T12900] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 487.394267][T12900] RBP: 00007ff1cbcb5090 R08: 0000000000000000 R09: 0000000000000000 [ 487.402234][T12900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 487.410191][T12900] R13: 0000000000000000 R14: 00007ff1cd873fa0 R15: 00007ffdfd2a6768 [ 487.418159][T12900] [ 487.455983][T12903] device sit0 entered promiscuous mode [ 488.267762][T12927] FAULT_INJECTION: forcing a failure. [ 488.267762][T12927] name failslab, interval 1, probability 0, space 0, times 0 [ 488.338285][T12927] CPU: 1 PID: 12927 Comm: syz.3.4410 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 488.348282][T12927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 488.358328][T12927] Call Trace: [ 488.361599][T12927] [ 488.364518][T12927] __dump_stack+0x21/0x30 [ 488.368841][T12927] dump_stack_lvl+0xee/0x150 [ 488.373420][T12927] ? show_regs_print_info+0x20/0x20 [ 488.378612][T12927] dump_stack+0x15/0x20 [ 488.382761][T12927] should_fail+0x3c1/0x510 [ 488.387169][T12927] __should_failslab+0xa4/0xe0 [ 488.391932][T12927] should_failslab+0x9/0x20 [ 488.396425][T12927] slab_pre_alloc_hook+0x3b/0xe0 [ 488.401354][T12927] ? security_file_alloc+0x33/0x120 [ 488.406544][T12927] kmem_cache_alloc+0x44/0x260 [ 488.411301][T12927] security_file_alloc+0x33/0x120 [ 488.416318][T12927] __alloc_file+0xb5/0x2a0 [ 488.420727][T12927] alloc_empty_file+0x97/0x180 [ 488.425479][T12927] alloc_file+0x59/0x540 [ 488.429712][T12927] alloc_file_pseudo+0x17a/0x1f0 [ 488.434647][T12927] ? alloc_empty_file_noaccount+0x80/0x80 [ 488.440356][T12927] ? alloc_perf_context+0x222/0x2e0 [ 488.445549][T12927] anon_inode_getfile+0xa6/0x180 [ 488.450480][T12927] __se_sys_perf_event_open+0xbd2/0x1b80 [ 488.456111][T12927] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 488.461747][T12927] __x64_sys_perf_event_open+0xbf/0xd0 [ 488.467207][T12927] x64_sys_call+0x50d/0x9a0 [ 488.471703][T12927] do_syscall_64+0x4c/0xa0 [ 488.476109][T12927] ? clear_bhb_loop+0x50/0xa0 [ 488.480785][T12927] ? clear_bhb_loop+0x50/0xa0 [ 488.485453][T12927] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 488.491342][T12927] RIP: 0033:0x7ff536839929 [ 488.495748][T12927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 488.515347][T12927] RSP: 002b:00007ff534ea2038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 488.523756][T12927] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff536839929 [ 488.531719][T12927] RDX: ffefffffffffffff RSI: 0000000000000000 RDI: 0000200000000700 [ 488.539684][T12927] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 488.547643][T12927] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 488.555602][T12927] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 488.563571][T12927] [ 488.720044][T12934] device sit0 left promiscuous mode [ 489.192042][T12939] device sit0 entered promiscuous mode [ 489.214018][T12944] device sit0 left promiscuous mode [ 489.232307][T12946] device sit0 entered promiscuous mode [ 490.864920][T13003] device sit0 left promiscuous mode [ 490.911834][T13003] device sit0 entered promiscuous mode [ 492.006733][T13018] device sit0 left promiscuous mode [ 492.692461][T13021] device sit0 entered promiscuous mode [ 493.014208][T13042] device veth1_macvtap left promiscuous mode [ 493.023989][T13042] device macsec0 left promiscuous mode [ 493.178162][T13046] device veth1_macvtap entered promiscuous mode [ 493.189640][T13046] device macsec0 entered promiscuous mode [ 493.204981][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 494.286176][T13101] device sit0 left promiscuous mode [ 494.561368][T13118] device sit0 left promiscuous mode [ 494.980444][T13122] device sit0 entered promiscuous mode [ 495.079118][T13130] FAULT_INJECTION: forcing a failure. [ 495.079118][T13130] name failslab, interval 1, probability 0, space 0, times 0 [ 495.096412][T13130] CPU: 0 PID: 13130 Comm: syz.0.4480 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 495.106400][T13130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 495.116448][T13130] Call Trace: [ 495.119714][T13130] [ 495.122637][T13130] __dump_stack+0x21/0x30 [ 495.126957][T13130] dump_stack_lvl+0xee/0x150 [ 495.131536][T13130] ? show_regs_print_info+0x20/0x20 [ 495.136723][T13130] dump_stack+0x15/0x20 [ 495.140872][T13130] should_fail+0x3c1/0x510 [ 495.145278][T13130] __should_failslab+0xa4/0xe0 [ 495.150033][T13130] should_failslab+0x9/0x20 [ 495.154525][T13130] slab_pre_alloc_hook+0x3b/0xe0 [ 495.159456][T13130] ? prepare_creds+0x2f/0x640 [ 495.164127][T13130] kmem_cache_alloc+0x44/0x260 [ 495.168880][T13130] prepare_creds+0x2f/0x640 [ 495.173378][T13130] copy_creds+0xe4/0x640 [ 495.177609][T13130] copy_process+0x799/0x3210 [ 495.182192][T13130] ? kstrtol_from_user+0x260/0x260 [ 495.187296][T13130] ? memset+0x35/0x40 [ 495.191270][T13130] ? __kasan_check_write+0x14/0x20 [ 495.196377][T13130] ? proc_fail_nth_write+0x17a/0x1f0 [ 495.201651][T13130] ? proc_fail_nth_read+0x210/0x210 [ 495.206838][T13130] ? __pidfd_prepare+0x150/0x150 [ 495.211773][T13130] ? security_file_permission+0x83/0xa0 [ 495.217314][T13130] kernel_clone+0x23f/0x940 [ 495.221811][T13130] ? create_io_thread+0x130/0x130 [ 495.226826][T13130] ? __kasan_check_write+0x14/0x20 [ 495.231929][T13130] ? mutex_unlock+0x89/0x220 [ 495.236509][T13130] __x64_sys_clone+0x176/0x1d0 [ 495.241262][T13130] ? __kasan_check_write+0x14/0x20 [ 495.246370][T13130] ? __ia32_sys_vfork+0xf0/0xf0 [ 495.251213][T13130] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 495.257272][T13130] x64_sys_call+0x41f/0x9a0 [ 495.261762][T13130] do_syscall_64+0x4c/0xa0 [ 495.266165][T13130] ? clear_bhb_loop+0x50/0xa0 [ 495.270832][T13130] ? clear_bhb_loop+0x50/0xa0 [ 495.275494][T13130] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 495.281376][T13130] RIP: 0033:0x7f757ad9e929 [ 495.285782][T13130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.305374][T13130] RSP: 002b:00007f7579406fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 495.313781][T13130] RAX: ffffffffffffffda RBX: 00007f757afc5fa0 RCX: 00007f757ad9e929 [ 495.321741][T13130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 495.329704][T13130] RBP: 00007f7579407090 R08: 0000000000000000 R09: 0000000000000000 [ 495.337669][T13130] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 495.345636][T13130] R13: 0000000000000000 R14: 00007f757afc5fa0 R15: 00007ffc87623a38 [ 495.353608][T13130] [ 496.870243][ T30] audit: type=1400 audit(1751739450.274:142): avc: denied { create } for pid=13189 comm="syz.0.4500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 497.392108][T13209] device syzkaller0 entered promiscuous mode [ 498.006518][T13241] device sit0 left promiscuous mode [ 498.381580][T13242] device sit0 entered promiscuous mode [ 499.080090][T13255] device sit0 left promiscuous mode [ 499.535502][T13266] device sit0 entered promiscuous mode [ 500.574896][T13303] FAULT_INJECTION: forcing a failure. [ 500.574896][T13303] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.598353][T13303] CPU: 1 PID: 13303 Comm: syz.4.4538 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 500.608341][T13303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 500.618389][T13303] Call Trace: [ 500.621660][T13303] [ 500.624586][T13303] __dump_stack+0x21/0x30 [ 500.628912][T13303] dump_stack_lvl+0xee/0x150 [ 500.633495][T13303] ? show_regs_print_info+0x20/0x20 [ 500.638686][T13303] dump_stack+0x15/0x20 [ 500.642831][T13303] should_fail+0x3c1/0x510 [ 500.647242][T13303] should_fail_alloc_page+0x55/0x80 [ 500.652432][T13303] prepare_alloc_pages+0x156/0x600 [ 500.657539][T13303] ? __alloc_pages_bulk+0xab0/0xab0 [ 500.662730][T13303] ? irqentry_exit+0x37/0x40 [ 500.667313][T13303] ? exc_page_fault+0x5e/0xb0 [ 500.671991][T13303] __alloc_pages+0x10a/0x440 [ 500.676577][T13303] ? prep_new_page+0x110/0x110 [ 500.681335][T13303] ? copy_user_enhanced_fast_string+0xe/0x40 [ 500.687316][T13303] pipe_write+0x570/0x18d0 [ 500.691724][T13303] ? pipe_write+0x151/0x18d0 [ 500.696305][T13303] ? pipe_read+0xfe0/0xfe0 [ 500.700714][T13303] ? selinux_file_permission+0x3f4/0x510 [ 500.706341][T13303] ? memset+0x35/0x40 [ 500.710313][T13303] ? iov_iter_init+0xbc/0x180 [ 500.714985][T13303] vfs_write+0x802/0xf70 [ 500.719230][T13303] ? file_end_write+0x1b0/0x1b0 [ 500.724080][T13303] ? __fget_files+0x2c4/0x320 [ 500.728760][T13303] ? __fdget_pos+0x1f7/0x380 [ 500.733342][T13303] ? ksys_write+0x71/0x240 [ 500.737747][T13303] ksys_write+0x140/0x240 [ 500.742065][T13303] ? __ia32_sys_read+0x90/0x90 [ 500.746821][T13303] ? debug_smp_processor_id+0x17/0x20 [ 500.752186][T13303] __x64_sys_write+0x7b/0x90 [ 500.756767][T13303] x64_sys_call+0x8ef/0x9a0 [ 500.761262][T13303] do_syscall_64+0x4c/0xa0 [ 500.765668][T13303] ? clear_bhb_loop+0x50/0xa0 [ 500.770333][T13303] ? clear_bhb_loop+0x50/0xa0 [ 500.775002][T13303] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 500.780889][T13303] RIP: 0033:0x7fe850715929 [ 500.785294][T13303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 500.804888][T13303] RSP: 002b:00007fe84ed7e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 500.813297][T13303] RAX: ffffffffffffffda RBX: 00007fe85093cfa0 RCX: 00007fe850715929 [ 500.821262][T13303] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 500.829221][T13303] RBP: 00007fe84ed7e090 R08: 0000000000000000 R09: 0000000000000000 [ 500.837181][T13303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.845140][T13303] R13: 0000000000000000 R14: 00007fe85093cfa0 R15: 00007ffd1e74c338 [ 500.853109][T13303] [ 501.536933][T13314] device sit0 left promiscuous mode [ 502.018582][T13319] device sit0 entered promiscuous mode [ 502.808891][T13327] syz.1.4544[13327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 502.808959][T13327] syz.1.4544[13327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.162146][T13345] device sit0 left promiscuous mode [ 503.519267][T13342] device sit0 entered promiscuous mode [ 504.875978][T13368] device sit0 left promiscuous mode [ 505.198931][T13379] device sit0 entered promiscuous mode [ 505.473610][T13392] device sit0 entered promiscuous mode [ 506.020542][T13408] device syzkaller0 entered promiscuous mode [ 506.053373][T13418] FAULT_INJECTION: forcing a failure. [ 506.053373][T13418] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 506.067693][T13418] CPU: 0 PID: 13418 Comm: syz.0.4576 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 506.077669][T13418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 506.087697][T13418] Call Trace: [ 506.090951][T13418] [ 506.093862][T13418] __dump_stack+0x21/0x30 [ 506.098165][T13418] dump_stack_lvl+0xee/0x150 [ 506.102729][T13418] ? show_regs_print_info+0x20/0x20 [ 506.107899][T13418] dump_stack+0x15/0x20 [ 506.112035][T13418] should_fail+0x3c1/0x510 [ 506.116455][T13418] should_fail_alloc_page+0x55/0x80 [ 506.121651][T13418] prepare_alloc_pages+0x156/0x600 [ 506.126759][T13418] ? __alloc_pages_bulk+0xab0/0xab0 [ 506.131949][T13418] ? irqentry_exit+0x37/0x40 [ 506.136533][T13418] ? exc_page_fault+0x5e/0xb0 [ 506.141207][T13418] __alloc_pages+0x10a/0x440 [ 506.145794][T13418] ? prep_new_page+0x110/0x110 [ 506.150555][T13418] ? copy_user_enhanced_fast_string+0xe/0x40 [ 506.156532][T13418] pipe_write+0x570/0x18d0 [ 506.160943][T13418] ? pipe_write+0x151/0x18d0 [ 506.165526][T13418] ? pipe_read+0xfe0/0xfe0 [ 506.169925][T13418] ? selinux_file_permission+0x3f4/0x510 [ 506.175537][T13418] ? memset+0x35/0x40 [ 506.179495][T13418] ? iov_iter_init+0xbc/0x180 [ 506.184148][T13418] vfs_write+0x802/0xf70 [ 506.188369][T13418] ? file_end_write+0x1b0/0x1b0 [ 506.193197][T13418] ? __fget_files+0x2c4/0x320 [ 506.197853][T13418] ? __fdget_pos+0x1f7/0x380 [ 506.202420][T13418] ? ksys_write+0x71/0x240 [ 506.206810][T13418] ksys_write+0x140/0x240 [ 506.211117][T13418] ? __ia32_sys_read+0x90/0x90 [ 506.215857][T13418] ? debug_smp_processor_id+0x17/0x20 [ 506.221204][T13418] __x64_sys_write+0x7b/0x90 [ 506.225771][T13418] x64_sys_call+0x8ef/0x9a0 [ 506.230260][T13418] do_syscall_64+0x4c/0xa0 [ 506.234650][T13418] ? clear_bhb_loop+0x50/0xa0 [ 506.239307][T13418] ? clear_bhb_loop+0x50/0xa0 [ 506.243960][T13418] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 506.249831][T13418] RIP: 0033:0x7f757ad9e929 [ 506.254223][T13418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.273802][T13418] RSP: 002b:00007f7579407038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 506.282191][T13418] RAX: ffffffffffffffda RBX: 00007f757afc5fa0 RCX: 00007f757ad9e929 [ 506.290137][T13418] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 506.298085][T13418] RBP: 00007f7579407090 R08: 0000000000000000 R09: 0000000000000000 [ 506.306032][T13418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 506.313980][T13418] R13: 0000000000000000 R14: 00007f757afc5fa0 R15: 00007ffc87623a38 [ 506.321934][T13418] [ 506.386037][T13420] device sit0 left promiscuous mode [ 506.782987][T13431] device sit0 entered promiscuous mode [ 506.800578][T13436] device sit0 left promiscuous mode [ 507.316362][T13444] device sit0 entered promiscuous mode [ 507.702092][ T30] audit: type=1400 audit(1751739461.104:143): avc: denied { create } for pid=13463 comm="syz.0.4588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 507.917053][T13476] device syzkaller0 entered promiscuous mode [ 508.434791][ T30] audit: type=1400 audit(1751739461.824:144): avc: denied { create } for pid=13500 comm="syz.4.4600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 508.537323][T13507] FAULT_INJECTION: forcing a failure. [ 508.537323][T13507] name failslab, interval 1, probability 0, space 0, times 0 [ 508.710042][T13507] CPU: 0 PID: 13507 Comm: syz.2.4602 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 508.720039][T13507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 508.730074][T13507] Call Trace: [ 508.733328][T13507] [ 508.736235][T13507] __dump_stack+0x21/0x30 [ 508.740542][T13507] dump_stack_lvl+0xee/0x150 [ 508.745108][T13507] ? show_regs_print_info+0x20/0x20 [ 508.750282][T13507] dump_stack+0x15/0x20 [ 508.754415][T13507] should_fail+0x3c1/0x510 [ 508.758809][T13507] __should_failslab+0xa4/0xe0 [ 508.763550][T13507] should_failslab+0x9/0x20 [ 508.768034][T13507] slab_pre_alloc_hook+0x3b/0xe0 [ 508.772948][T13507] __kmalloc+0x6d/0x2c0 [ 508.777079][T13507] ? sk_prot_alloc+0xed/0x320 [ 508.781734][T13507] sk_prot_alloc+0xed/0x320 [ 508.786212][T13507] sk_alloc+0x38/0x430 [ 508.790254][T13507] bpf_prog_test_run_skb+0x24b/0x1150 [ 508.795602][T13507] ? __kasan_check_write+0x14/0x20 [ 508.800692][T13507] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 508.806562][T13507] bpf_prog_test_run+0x3d5/0x620 [ 508.811478][T13507] ? bpf_prog_query+0x230/0x230 [ 508.816301][T13507] ? selinux_bpf+0xce/0xf0 [ 508.820699][T13507] ? security_bpf+0x82/0xa0 [ 508.825176][T13507] __sys_bpf+0x52c/0x730 [ 508.829403][T13507] ? bpf_link_show_fdinfo+0x310/0x310 [ 508.834755][T13507] ? debug_smp_processor_id+0x17/0x20 [ 508.840103][T13507] ? perf_trace_sys_enter+0x30/0x150 [ 508.845365][T13507] __x64_sys_bpf+0x7c/0x90 [ 508.849757][T13507] x64_sys_call+0x4b9/0x9a0 [ 508.854236][T13507] do_syscall_64+0x4c/0xa0 [ 508.858625][T13507] ? clear_bhb_loop+0x50/0xa0 [ 508.863282][T13507] ? clear_bhb_loop+0x50/0xa0 [ 508.867947][T13507] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 508.873815][T13507] RIP: 0033:0x7ff1cd64c929 [ 508.878212][T13507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 508.897792][T13507] RSP: 002b:00007ff1cbcb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 508.906183][T13507] RAX: ffffffffffffffda RBX: 00007ff1cd873fa0 RCX: 00007ff1cd64c929 [ 508.914133][T13507] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 508.922081][T13507] RBP: 00007ff1cbcb5090 R08: 0000000000000000 R09: 0000000000000000 [ 508.930035][T13507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 508.937988][T13507] R13: 0000000000000000 R14: 00007ff1cd873fa0 R15: 00007ffdfd2a6768 [ 508.945941][T13507] [ 509.280295][T13521] FAULT_INJECTION: forcing a failure. [ 509.280295][T13521] name failslab, interval 1, probability 0, space 0, times 0 [ 509.292924][T13521] CPU: 0 PID: 13521 Comm: syz.1.4605 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 509.302892][T13521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 509.312935][T13521] Call Trace: [ 509.316203][T13521] [ 509.319123][T13521] __dump_stack+0x21/0x30 [ 509.323452][T13521] dump_stack_lvl+0xee/0x150 [ 509.328035][T13521] ? show_regs_print_info+0x20/0x20 [ 509.333227][T13521] dump_stack+0x15/0x20 [ 509.337375][T13521] should_fail+0x3c1/0x510 [ 509.341782][T13521] __should_failslab+0xa4/0xe0 [ 509.346551][T13521] should_failslab+0x9/0x20 [ 509.351056][T13521] slab_pre_alloc_hook+0x3b/0xe0 [ 509.355987][T13521] ? __alloc_skb+0xe0/0x740 [ 509.360485][T13521] kmem_cache_alloc+0x44/0x260 [ 509.365244][T13521] __alloc_skb+0xe0/0x740 [ 509.369564][T13521] ip_frag_next+0xd7/0xab0 [ 509.373983][T13521] ip_do_fragment+0x811/0x1ca0 [ 509.378736][T13521] ? ip_fragment+0x250/0x250 [ 509.383325][T13521] ip_fragment+0x152/0x250 [ 509.387734][T13521] __ip_finish_output+0x236/0x360 [ 509.392860][T13521] ip_finish_output+0x31/0x240 [ 509.397624][T13521] ? ip_mc_output+0x5c7/0x7e0 [ 509.402293][T13521] ip_mc_output+0x3fc/0x7e0 [ 509.406788][T13521] ? ip_build_and_send_pkt+0xb00/0xb00 [ 509.412246][T13521] ? ip_mc_finish_output+0x400/0x400 [ 509.417527][T13521] ? __ip_local_out+0x3d9/0x3e0 [ 509.422379][T13521] ? kasan_quarantine_put+0x34/0x190 [ 509.427660][T13521] ? ip_send_check+0xf0/0xf0 [ 509.432249][T13521] ? __ip_local_out+0x3e0/0x3e0 [ 509.437096][T13521] ? __kasan_slab_free+0x11/0x20 [ 509.442025][T13521] ? slab_free_freelist_hook+0xc2/0x190 [ 509.447573][T13521] ? siphash_3u32+0x27/0x250 [ 509.452160][T13521] ip_local_out+0x96/0xb0 [ 509.456488][T13521] iptunnel_xmit+0x4db/0x8f0 [ 509.461075][T13521] ip_tunnel_xmit+0x1a2b/0x21c0 [ 509.465917][T13521] ? ip4_dst_hoplimit+0x110/0x110 [ 509.470932][T13521] ? skb_network_protocol+0x501/0x740 [ 509.476284][T13521] ? gre_build_header+0x229/0x850 [ 509.481288][T13521] ipgre_xmit+0x7c0/0xb30 [ 509.485609][T13521] dev_hard_start_xmit+0x244/0x670 [ 509.490701][T13521] __dev_queue_xmit+0x17bd/0x2d80 [ 509.495704][T13521] ? dev_queue_xmit+0x20/0x20 [ 509.500357][T13521] ? __kasan_check_write+0x14/0x20 [ 509.505532][T13521] ? skb_release_data+0x1c6/0xa10 [ 509.510538][T13521] ? __kasan_check_write+0x14/0x20 [ 509.515645][T13521] ? pskb_expand_head+0xbe6/0x11d0 [ 509.520737][T13521] dev_queue_xmit+0x17/0x20 [ 509.525220][T13521] __bpf_redirect+0x68a/0xe60 [ 509.529873][T13521] bpf_clone_redirect+0x242/0x380 [ 509.534876][T13521] bpf_prog_973cd02a7a0e8181+0x56/0xa48 [ 509.540399][T13521] ? __kasan_slab_alloc+0xcf/0xf0 [ 509.545399][T13521] ? __kasan_slab_alloc+0xbd/0xf0 [ 509.550399][T13521] ? slab_post_alloc_hook+0x4f/0x2b0 [ 509.555661][T13521] ? kmem_cache_alloc+0xf7/0x260 [ 509.560576][T13521] ? __build_skb+0x2d/0x310 [ 509.565053][T13521] ? build_skb+0x24/0x200 [ 509.569357][T13521] ? bpf_prog_test_run_skb+0x279/0x1150 [ 509.574876][T13521] ? bpf_prog_test_run+0x3d5/0x620 [ 509.579978][T13521] ? __sys_bpf+0x52c/0x730 [ 509.584367][T13521] ? __x64_sys_bpf+0x7c/0x90 [ 509.588932][T13521] ? x64_sys_call+0x4b9/0x9a0 [ 509.593583][T13521] ? do_syscall_64+0x4c/0xa0 [ 509.598150][T13521] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 509.604197][T13521] ? __kasan_check_read+0x11/0x20 [ 509.609198][T13521] ? bpf_test_timer_continue+0x146/0x4a0 [ 509.614814][T13521] bpf_test_run+0x33d/0x8d0 [ 509.619296][T13521] ? convert___skb_to_skb+0x4f0/0x4f0 [ 509.624647][T13521] ? eth_get_headlen+0x1f0/0x1f0 [ 509.629583][T13521] ? convert___skb_to_skb+0x41/0x4f0 [ 509.634857][T13521] bpf_prog_test_run_skb+0x9ec/0x1150 [ 509.640211][T13521] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 509.646081][T13521] bpf_prog_test_run+0x3d5/0x620 [ 509.650994][T13521] ? bpf_prog_query+0x230/0x230 [ 509.655821][T13521] ? selinux_bpf+0xce/0xf0 [ 509.660215][T13521] ? security_bpf+0x82/0xa0 [ 509.664695][T13521] __sys_bpf+0x52c/0x730 [ 509.668914][T13521] ? bpf_link_show_fdinfo+0x310/0x310 [ 509.674262][T13521] ? debug_smp_processor_id+0x17/0x20 [ 509.679619][T13521] __x64_sys_bpf+0x7c/0x90 [ 509.684014][T13521] x64_sys_call+0x4b9/0x9a0 [ 509.688494][T13521] do_syscall_64+0x4c/0xa0 [ 509.692886][T13521] ? clear_bhb_loop+0x50/0xa0 [ 509.697541][T13521] ? clear_bhb_loop+0x50/0xa0 [ 509.702193][T13521] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 509.708059][T13521] RIP: 0033:0x7f4674e01929 [ 509.712453][T13521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 509.732038][T13521] RSP: 002b:00007f467346a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 509.740425][T13521] RAX: ffffffffffffffda RBX: 00007f4675028fa0 RCX: 00007f4674e01929 [ 509.748371][T13521] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 509.756319][T13521] RBP: 00007f467346a090 R08: 0000000000000000 R09: 0000000000000000 [ 509.764269][T13521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 509.772214][T13521] R13: 0000000000000000 R14: 00007f4675028fa0 R15: 00007ffd0102af98 [ 509.780164][T13521] [ 510.404887][T13554] device veth0_vlan left promiscuous mode [ 510.557989][T13554] device veth0_vlan entered promiscuous mode [ 510.851546][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.864558][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 510.873655][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 511.019223][T13564] device sit0 left promiscuous mode [ 511.598620][T13565] device sit0 entered promiscuous mode [ 511.811367][T13576] device sit0 left promiscuous mode [ 512.150347][T13581] device sit0 entered promiscuous mode [ 512.178419][T13586] device veth0_vlan left promiscuous mode [ 512.248794][T13586] device veth0_vlan entered promiscuous mode [ 512.462890][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 512.477554][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 512.498387][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 515.010910][T13651] device sit0 left promiscuous mode [ 515.029777][T13649] device sit0 entered promiscuous mode [ 515.278801][T13650] device veth0_vlan left promiscuous mode [ 515.301722][T13650] device veth0_vlan entered promiscuous mode [ 515.322471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.339419][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 515.356387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 515.455803][T13668] FAULT_INJECTION: forcing a failure. [ 515.455803][T13668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 515.469336][T13668] CPU: 1 PID: 13668 Comm: syz.4.4659 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 515.479321][T13668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 515.489365][T13668] Call Trace: [ 515.492633][T13668] [ 515.495556][T13668] __dump_stack+0x21/0x30 [ 515.499878][T13668] dump_stack_lvl+0xee/0x150 [ 515.504457][T13668] ? show_regs_print_info+0x20/0x20 [ 515.509645][T13668] dump_stack+0x15/0x20 [ 515.513786][T13668] should_fail+0x3c1/0x510 [ 515.518198][T13668] should_fail_usercopy+0x1a/0x20 [ 515.523209][T13668] _copy_to_user+0x20/0x90 [ 515.527615][T13668] simple_read_from_buffer+0xe9/0x160 [ 515.532973][T13668] proc_fail_nth_read+0x19a/0x210 [ 515.537990][T13668] ? proc_fault_inject_write+0x2f0/0x2f0 [ 515.543618][T13668] ? security_file_permission+0x83/0xa0 [ 515.549154][T13668] ? proc_fault_inject_write+0x2f0/0x2f0 [ 515.554780][T13668] vfs_read+0x282/0xbe0 [ 515.558925][T13668] ? kernel_read+0x1f0/0x1f0 [ 515.563500][T13668] ? __kasan_check_write+0x14/0x20 [ 515.568600][T13668] ? mutex_lock+0x95/0x1a0 [ 515.573004][T13668] ? wait_for_completion_killable_timeout+0x10/0x10 [ 515.579582][T13668] ? kasan_check_range+0x1ae/0x290 [ 515.584681][T13668] ? __fdget_pos+0x2d2/0x380 [ 515.589256][T13668] ? ksys_read+0x71/0x240 [ 515.593572][T13668] ksys_read+0x140/0x240 [ 515.597799][T13668] ? vfs_write+0xf70/0xf70 [ 515.602200][T13668] ? debug_smp_processor_id+0x17/0x20 [ 515.607558][T13668] __x64_sys_read+0x7b/0x90 [ 515.612048][T13668] x64_sys_call+0x96d/0x9a0 [ 515.616543][T13668] do_syscall_64+0x4c/0xa0 [ 515.620946][T13668] ? clear_bhb_loop+0x50/0xa0 [ 515.625611][T13668] ? clear_bhb_loop+0x50/0xa0 [ 515.630272][T13668] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 515.636149][T13668] RIP: 0033:0x7fe85071433c [ 515.640555][T13668] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 515.660146][T13668] RSP: 002b:00007fe84ed7e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 515.668545][T13668] RAX: ffffffffffffffda RBX: 00007fe85093cfa0 RCX: 00007fe85071433c [ 515.676507][T13668] RDX: 000000000000000f RSI: 00007fe84ed7e0a0 RDI: 0000000000000006 [ 515.684466][T13668] RBP: 00007fe84ed7e090 R08: 0000000000000000 R09: 0000000000000000 [ 515.692422][T13668] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 515.700378][T13668] R13: 0000000000000000 R14: 00007fe85093cfa0 R15: 00007ffd1e74c338 [ 515.708340][T13668] [ 515.749961][T13674] device macsec0 left promiscuous mode [ 515.762127][T13674] device veth1_macvtap entered promiscuous mode [ 515.768510][T13674] device macsec0 entered promiscuous mode [ 515.818577][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 516.613649][T13685] FAULT_INJECTION: forcing a failure. [ 516.613649][T13685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.738571][T13685] CPU: 1 PID: 13685 Comm: syz.1.4665 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 516.748581][T13685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 516.758628][T13685] Call Trace: [ 516.761894][T13685] [ 516.764817][T13685] __dump_stack+0x21/0x30 [ 516.769146][T13685] dump_stack_lvl+0xee/0x150 [ 516.773728][T13685] ? show_regs_print_info+0x20/0x20 [ 516.778927][T13685] dump_stack+0x15/0x20 [ 516.783070][T13685] should_fail+0x3c1/0x510 [ 516.787479][T13685] should_fail_alloc_page+0x55/0x80 [ 516.792673][T13685] prepare_alloc_pages+0x156/0x600 [ 516.797783][T13685] ? __alloc_pages_bulk+0xab0/0xab0 [ 516.802975][T13685] ? perf_sched_cb_inc+0x240/0x240 [ 516.808083][T13685] __alloc_pages+0x10a/0x440 [ 516.812669][T13685] ? prep_new_page+0x110/0x110 [ 516.817420][T13685] ? __kasan_check_write+0x14/0x20 [ 516.822522][T13685] ? release_firmware_map_entry+0x190/0x190 [ 516.828414][T13685] __get_free_pages+0x10/0x30 [ 516.833081][T13685] kasan_populate_vmalloc_pte+0x29/0x120 [ 516.838703][T13685] __apply_to_page_range+0x8b0/0xbf0 [ 516.843972][T13685] ? kasan_populate_vmalloc+0x70/0x70 [ 516.849326][T13685] ? kasan_populate_vmalloc+0x70/0x70 [ 516.854678][T13685] apply_to_page_range+0x3b/0x50 [ 516.859596][T13685] kasan_populate_vmalloc+0x60/0x70 [ 516.864772][T13685] alloc_vmap_area+0x185c/0x1990 [ 516.869690][T13685] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 516.875826][T13685] ? vm_map_ram+0xa60/0xa60 [ 516.880303][T13685] __get_vm_area_node+0x14e/0x350 [ 516.885305][T13685] __vmalloc_node_range+0xe8/0x840 [ 516.890397][T13685] ? htab_map_alloc+0x3c0/0x14f0 [ 516.895312][T13685] bpf_map_area_alloc+0xd5/0xe0 [ 516.900141][T13685] ? htab_map_alloc+0x3c0/0x14f0 [ 516.905051][T13685] htab_map_alloc+0x3c0/0x14f0 [ 516.909787][T13685] ? __kasan_check_write+0x14/0x20 [ 516.914873][T13685] ? fput_many+0x15a/0x1a0 [ 516.919267][T13685] ? bpf_map_meta_alloc+0x16d/0x8c0 [ 516.924560][T13685] htab_of_map_alloc+0x55/0xc0 [ 516.929316][T13685] map_create+0x455/0x21b0 [ 516.933716][T13685] __sys_bpf+0x2cf/0x730 [ 516.937947][T13685] ? bpf_link_show_fdinfo+0x310/0x310 [ 516.943303][T13685] ? __kasan_check_write+0x14/0x20 [ 516.948394][T13685] __x64_sys_bpf+0x7c/0x90 [ 516.952790][T13685] x64_sys_call+0x4b9/0x9a0 [ 516.957273][T13685] do_syscall_64+0x4c/0xa0 [ 516.961671][T13685] ? clear_bhb_loop+0x50/0xa0 [ 516.966322][T13685] ? clear_bhb_loop+0x50/0xa0 [ 516.970974][T13685] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 516.976843][T13685] RIP: 0033:0x7f4674e01929 [ 516.981235][T13685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 517.000817][T13685] RSP: 002b:00007f467346a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 517.009208][T13685] RAX: ffffffffffffffda RBX: 00007f4675028fa0 RCX: 00007f4674e01929 [ 517.017163][T13685] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0c00000000000000 [ 517.025121][T13685] RBP: 00007f467346a090 R08: 0000000000000000 R09: 0000000000000000 [ 517.033073][T13685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 517.041025][T13685] R13: 0000000000000000 R14: 00007f4675028fa0 R15: 00007ffd0102af98 [ 517.048983][T13685] [ 517.396765][T13672] device syzkaller0 entered promiscuous mode [ 517.440691][T13698] bond_slave_1: mtu less than device minimum [ 518.190869][T13734] device sit0 left promiscuous mode [ 518.253774][T13733] device sit0 entered promiscuous mode [ 519.228590][T13752] device sit0 left promiscuous mode [ 519.489861][T13752] device sit0 entered promiscuous mode [ 520.617952][T13790] device sit0 left promiscuous mode [ 520.808022][T13794] device sit0 entered promiscuous mode [ 521.062538][T13803] device syzkaller0 entered promiscuous mode [ 521.645016][T13830] device sit0 left promiscuous mode [ 522.049711][T13845] device sit0 entered promiscuous mode [ 522.177819][T13849] device sit0 left promiscuous mode [ 522.417862][T13853] device sit0 entered promiscuous mode [ 522.503727][T13870] device pim6reg1 entered promiscuous mode [ 522.527506][T13872] FAULT_INJECTION: forcing a failure. [ 522.527506][T13872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 522.540579][T13872] CPU: 0 PID: 13872 Comm: syz.2.4729 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 522.550546][T13872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 522.560590][T13872] Call Trace: [ 522.563856][T13872] [ 522.566777][T13872] __dump_stack+0x21/0x30 [ 522.571103][T13872] dump_stack_lvl+0xee/0x150 [ 522.575683][T13872] ? show_regs_print_info+0x20/0x20 [ 522.580877][T13872] ? __kasan_check_write+0x14/0x20 [ 522.585981][T13872] ? _raw_spin_lock_irq+0x8f/0xe0 [ 522.591004][T13872] dump_stack+0x15/0x20 [ 522.595151][T13872] should_fail+0x3c1/0x510 [ 522.599558][T13872] should_fail_usercopy+0x1a/0x20 [ 522.604573][T13872] copy_page_from_iter_atomic+0x3fb/0x1350 [ 522.610378][T13872] ? pipe_zero+0x370/0x370 [ 522.614789][T13872] generic_perform_write+0x307/0x670 [ 522.620074][T13872] ? grab_cache_page_write_begin+0xb0/0xb0 [ 522.625872][T13872] ? file_remove_privs+0x590/0x590 [ 522.630978][T13872] ? rwsem_write_trylock+0x130/0x300 [ 522.636255][T13872] ? clear_nonspinnable+0x60/0x60 [ 522.641269][T13872] ? avc_policy_seqno+0x1b/0x70 [ 522.646114][T13872] __generic_file_write_iter+0x268/0x480 [ 522.651738][T13872] generic_file_write_iter+0xa9/0x1d0 [ 522.657102][T13872] vfs_write+0x802/0xf70 [ 522.661340][T13872] ? file_end_write+0x1b0/0x1b0 [ 522.666180][T13872] ? wait_for_completion_killable_timeout+0x10/0x10 [ 522.672759][T13872] ? __fget_files+0x2c4/0x320 [ 522.677430][T13872] ? __fdget_pos+0x2d2/0x380 [ 522.682005][T13872] ? ksys_write+0x71/0x240 [ 522.686412][T13872] ksys_write+0x140/0x240 [ 522.690729][T13872] ? __ia32_sys_read+0x90/0x90 [ 522.695479][T13872] ? debug_smp_processor_id+0x17/0x20 [ 522.700841][T13872] __x64_sys_write+0x7b/0x90 [ 522.705416][T13872] x64_sys_call+0x8ef/0x9a0 [ 522.709908][T13872] do_syscall_64+0x4c/0xa0 [ 522.714309][T13872] ? clear_bhb_loop+0x50/0xa0 [ 522.718972][T13872] ? clear_bhb_loop+0x50/0xa0 [ 522.723636][T13872] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 522.729515][T13872] RIP: 0033:0x7ff1cd64c929 [ 522.733918][T13872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 522.753946][T13872] RSP: 002b:00007ff1cbcb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 522.762352][T13872] RAX: ffffffffffffffda RBX: 00007ff1cd873fa0 RCX: 00007ff1cd64c929 [ 522.770314][T13872] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 522.778274][T13872] RBP: 00007ff1cbcb5090 R08: 0000000000000000 R09: 0000000000000000 [ 522.786231][T13872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 522.794191][T13872] R13: 0000000000000000 R14: 00007ff1cd873fa0 R15: 00007ffdfd2a6768 [ 522.802159][T13872] [ 523.598301][T13924] device wg2 entered promiscuous mode [ 523.741699][T13926] device veth0_vlan left promiscuous mode [ 523.795830][T13926] device veth0_vlan entered promiscuous mode [ 523.949676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 523.958068][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 523.968917][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 524.209916][T13943] FAULT_INJECTION: forcing a failure. [ 524.209916][T13943] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 524.259672][T13943] CPU: 0 PID: 13943 Comm: syz.1.4753 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 524.269668][T13943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 524.279712][T13943] Call Trace: [ 524.282979][T13943] [ 524.285898][T13943] __dump_stack+0x21/0x30 [ 524.290220][T13943] dump_stack_lvl+0xee/0x150 [ 524.294805][T13943] ? show_regs_print_info+0x20/0x20 [ 524.300075][T13943] ? exc_page_fault+0x5e/0xb0 [ 524.304743][T13943] dump_stack+0x15/0x20 [ 524.308888][T13943] should_fail+0x3c1/0x510 [ 524.313293][T13943] should_fail_usercopy+0x1a/0x20 [ 524.318302][T13943] copy_page_from_iter+0x2f6/0x680 [ 524.323407][T13943] pipe_write+0x914/0x18d0 [ 524.327821][T13943] ? pipe_write+0x151/0x18d0 [ 524.332393][T13943] ? pipe_read+0xfe0/0xfe0 [ 524.336783][T13943] ? selinux_file_permission+0x3f4/0x510 [ 524.342386][T13943] ? memset+0x35/0x40 [ 524.346341][T13943] ? iov_iter_init+0xbc/0x180 [ 524.350987][T13943] vfs_write+0x802/0xf70 [ 524.355198][T13943] ? file_end_write+0x1b0/0x1b0 [ 524.360015][T13943] ? bpf_send_signal_common+0x2b2/0x420 [ 524.365531][T13943] ? __fget_files+0x2c4/0x320 [ 524.370180][T13943] ? __fdget_pos+0x1f7/0x380 [ 524.374748][T13943] ? ksys_write+0x71/0x240 [ 524.379140][T13943] ksys_write+0x140/0x240 [ 524.383445][T13943] ? __ia32_sys_read+0x90/0x90 [ 524.388189][T13943] ? debug_smp_processor_id+0x17/0x20 [ 524.393537][T13943] __x64_sys_write+0x7b/0x90 [ 524.398103][T13943] x64_sys_call+0x8ef/0x9a0 [ 524.402584][T13943] do_syscall_64+0x4c/0xa0 [ 524.406974][T13943] ? clear_bhb_loop+0x50/0xa0 [ 524.411625][T13943] ? clear_bhb_loop+0x50/0xa0 [ 524.416276][T13943] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 524.422144][T13943] RIP: 0033:0x7f4674e01929 [ 524.426535][T13943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 524.446116][T13943] RSP: 002b:00007f467346a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 524.454506][T13943] RAX: ffffffffffffffda RBX: 00007f4675028fa0 RCX: 00007f4674e01929 [ 524.462459][T13943] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 524.470422][T13943] RBP: 00007f467346a090 R08: 0000000000000000 R09: 0000000000000000 [ 524.478552][T13943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 524.486543][T13943] R13: 0000000000000000 R14: 00007f4675028fa0 R15: 00007ffd0102af98 [ 524.494523][T13943] [ 525.166823][T13964] FAULT_INJECTION: forcing a failure. [ 525.166823][T13964] name failslab, interval 1, probability 0, space 0, times 0 [ 525.310832][T13964] CPU: 1 PID: 13964 Comm: syz.4.4761 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 525.320829][T13964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 525.330865][T13964] Call Trace: [ 525.334125][T13964] [ 525.337032][T13964] __dump_stack+0x21/0x30 [ 525.341342][T13964] dump_stack_lvl+0xee/0x150 [ 525.345911][T13964] ? show_regs_print_info+0x20/0x20 [ 525.351086][T13964] ? __kasan_check_write+0x14/0x20 [ 525.356176][T13964] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 525.361612][T13964] dump_stack+0x15/0x20 [ 525.365745][T13964] should_fail+0x3c1/0x510 [ 525.370143][T13964] __should_failslab+0xa4/0xe0 [ 525.374889][T13964] should_failslab+0x9/0x20 [ 525.379368][T13964] slab_pre_alloc_hook+0x3b/0xe0 [ 525.384283][T13964] ? skb_clone+0x1cf/0x360 [ 525.388676][T13964] kmem_cache_alloc+0x44/0x260 [ 525.393422][T13964] skb_clone+0x1cf/0x360 [ 525.397638][T13964] ? __kasan_check_write+0x14/0x20 [ 525.402724][T13964] sk_psock_verdict_recv+0x53/0x800 [ 525.407899][T13964] unix_read_sock+0x10a/0x2c0 [ 525.412552][T13964] ? sk_psock_skb_redirect+0x440/0x440 [ 525.417989][T13964] ? unix_stream_splice_actor+0x120/0x120 [ 525.423686][T13964] ? __kasan_check_write+0x14/0x20 [ 525.428777][T13964] ? unix_stream_splice_actor+0x120/0x120 [ 525.434472][T13964] sk_psock_verdict_data_ready+0x115/0x170 [ 525.440255][T13964] ? sk_psock_start_verdict+0xc0/0xc0 [ 525.445602][T13964] ? _raw_spin_lock+0x8e/0xe0 [ 525.450282][T13964] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 525.456064][T13964] ? skb_queue_tail+0xcb/0xf0 [ 525.460716][T13964] unix_dgram_sendmsg+0x11e6/0x1880 [ 525.465891][T13964] ? stack_trace_save+0xe0/0xe0 [ 525.470719][T13964] ? unix_dgram_poll+0x6b0/0x6b0 [ 525.475636][T13964] ? security_socket_sendmsg+0x82/0xa0 [ 525.481072][T13964] ? unix_dgram_poll+0x6b0/0x6b0 [ 525.485987][T13964] ____sys_sendmsg+0x5a2/0x8c0 [ 525.490732][T13964] ? __sys_sendmsg_sock+0x40/0x40 [ 525.495732][T13964] ? kstrtouint_from_user+0x1a0/0x200 [ 525.501090][T13964] ? import_iovec+0x7c/0xb0 [ 525.505583][T13964] ___sys_sendmsg+0x1f0/0x260 [ 525.510252][T13964] ? __sys_sendmsg+0x250/0x250 [ 525.514994][T13964] ? native_apic_msr_write+0x39/0x50 [ 525.520270][T13964] ? __fdget+0x1a1/0x230 [ 525.524495][T13964] __x64_sys_sendmsg+0x1e2/0x2a0 [ 525.529499][T13964] ? ___sys_sendmsg+0x260/0x260 [ 525.534329][T13964] ? ksys_write+0x1eb/0x240 [ 525.538810][T13964] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 525.544863][T13964] x64_sys_call+0x4b/0x9a0 [ 525.549256][T13964] do_syscall_64+0x4c/0xa0 [ 525.553650][T13964] ? clear_bhb_loop+0x50/0xa0 [ 525.558308][T13964] ? clear_bhb_loop+0x50/0xa0 [ 525.562961][T13964] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 525.568831][T13964] RIP: 0033:0x7fe850715929 [ 525.573225][T13964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 525.592808][T13964] RSP: 002b:00007fe84ed7e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 525.601198][T13964] RAX: ffffffffffffffda RBX: 00007fe85093cfa0 RCX: 00007fe850715929 [ 525.609145][T13964] RDX: 0000000004040086 RSI: 0000200000000440 RDI: 0000000000000003 [ 525.617182][T13964] RBP: 00007fe84ed7e090 R08: 0000000000000000 R09: 0000000000000000 [ 525.625127][T13964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.633075][T13964] R13: 0000000000000000 R14: 00007fe85093cfa0 R15: 00007ffd1e74c338 [ 525.641036][T13964] [ 526.278103][T14006] device sit0 left promiscuous mode [ 526.351062][T14002] device sit0 entered promiscuous mode [ 526.665893][T14015] device syzkaller0 entered promiscuous mode [ 528.045475][T14059] device wg2 left promiscuous mode [ 528.661182][T14096] FAULT_INJECTION: forcing a failure. [ 528.661182][T14096] name failslab, interval 1, probability 0, space 0, times 0 [ 528.684727][T14096] CPU: 1 PID: 14096 Comm: syz.2.4805 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 528.694716][T14096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 528.704763][T14096] Call Trace: [ 528.708031][T14096] [ 528.710952][T14096] __dump_stack+0x21/0x30 [ 528.715278][T14096] dump_stack_lvl+0xee/0x150 [ 528.719859][T14096] ? show_regs_print_info+0x20/0x20 [ 528.725052][T14096] dump_stack+0x15/0x20 [ 528.729199][T14096] should_fail+0x3c1/0x510 [ 528.733613][T14096] ? skb_ensure_writable+0x2e7/0x460 [ 528.738893][T14096] __should_failslab+0xa4/0xe0 [ 528.743668][T14096] should_failslab+0x9/0x20 [ 528.748165][T14096] slab_pre_alloc_hook+0x3b/0xe0 [ 528.753102][T14096] ? skb_ensure_writable+0x2e7/0x460 [ 528.758378][T14096] ? skb_ensure_writable+0x2e7/0x460 [ 528.763656][T14096] __kmalloc_track_caller+0x6c/0x2c0 [ 528.768934][T14096] ? skb_ensure_writable+0x2e7/0x460 [ 528.774216][T14096] ? skb_ensure_writable+0x2e7/0x460 [ 528.779490][T14096] pskb_expand_head+0x11b/0x11d0 [ 528.784417][T14096] ? __copy_skb_header+0x437/0x600 [ 528.789521][T14096] ? __kasan_check_write+0x14/0x20 [ 528.794623][T14096] ? __skb_clone+0x47a/0x790 [ 528.799203][T14096] skb_ensure_writable+0x2e7/0x460 [ 528.804301][T14096] bpf_clone_redirect+0x10b/0x380 [ 528.809311][T14096] bpf_prog_973cd02a7a0e8181+0x56/0x3bc [ 528.814836][T14096] ? __kasan_slab_alloc+0xcf/0xf0 [ 528.819836][T14096] ? __kasan_slab_alloc+0xbd/0xf0 [ 528.824835][T14096] ? slab_post_alloc_hook+0x4f/0x2b0 [ 528.830096][T14096] ? kmem_cache_alloc+0xf7/0x260 [ 528.835010][T14096] ? __build_skb+0x2d/0x310 [ 528.839488][T14096] ? build_skb+0x24/0x200 [ 528.843790][T14096] ? bpf_prog_test_run_skb+0x279/0x1150 [ 528.849312][T14096] ? bpf_prog_test_run+0x3d5/0x620 [ 528.854401][T14096] ? __sys_bpf+0x52c/0x730 [ 528.858792][T14096] ? __x64_sys_bpf+0x7c/0x90 [ 528.863361][T14096] ? x64_sys_call+0x4b9/0x9a0 [ 528.868029][T14096] ? do_syscall_64+0x4c/0xa0 [ 528.872601][T14096] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 528.878655][T14096] ? __kasan_check_read+0x11/0x20 [ 528.883665][T14096] ? bpf_test_timer_continue+0x146/0x4a0 [ 528.889285][T14096] bpf_test_run+0x33d/0x8d0 [ 528.893774][T14096] ? convert___skb_to_skb+0x4f0/0x4f0 [ 528.899122][T14096] ? eth_get_headlen+0x1f0/0x1f0 [ 528.904044][T14096] ? convert___skb_to_skb+0x41/0x4f0 [ 528.909306][T14096] bpf_prog_test_run_skb+0x9ec/0x1150 [ 528.914654][T14096] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 528.920522][T14096] bpf_prog_test_run+0x3d5/0x620 [ 528.925435][T14096] ? bpf_prog_query+0x230/0x230 [ 528.930264][T14096] ? selinux_bpf+0xce/0xf0 [ 528.934658][T14096] ? security_bpf+0x82/0xa0 [ 528.939135][T14096] __sys_bpf+0x52c/0x730 [ 528.943357][T14096] ? bpf_link_show_fdinfo+0x310/0x310 [ 528.948705][T14096] ? debug_smp_processor_id+0x17/0x20 [ 528.954054][T14096] __x64_sys_bpf+0x7c/0x90 [ 528.958447][T14096] x64_sys_call+0x4b9/0x9a0 [ 528.962931][T14096] do_syscall_64+0x4c/0xa0 [ 528.967319][T14096] ? clear_bhb_loop+0x50/0xa0 [ 528.971970][T14096] ? clear_bhb_loop+0x50/0xa0 [ 528.976620][T14096] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 528.982487][T14096] RIP: 0033:0x7ff1cd64c929 [ 528.986882][T14096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 529.006460][T14096] RSP: 002b:00007ff1cbcb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 529.014851][T14096] RAX: ffffffffffffffda RBX: 00007ff1cd873fa0 RCX: 00007ff1cd64c929 [ 529.022799][T14096] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 529.030745][T14096] RBP: 00007ff1cbcb5090 R08: 0000000000000000 R09: 0000000000000000 [ 529.038690][T14096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 529.046633][T14096] R13: 0000000000000000 R14: 00007ff1cd873fa0 R15: 00007ffdfd2a6768 [ 529.054584][T14096] [ 530.197724][T14134] FAULT_INJECTION: forcing a failure. [ 530.197724][T14134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 530.247662][T14134] CPU: 0 PID: 14134 Comm: syz.3.4818 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 530.257654][T14134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 530.267698][T14134] Call Trace: [ 530.270966][T14134] [ 530.273889][T14134] __dump_stack+0x21/0x30 [ 530.278211][T14134] dump_stack_lvl+0xee/0x150 [ 530.283140][T14134] ? show_regs_print_info+0x20/0x20 [ 530.288329][T14134] dump_stack+0x15/0x20 [ 530.292470][T14134] should_fail+0x3c1/0x510 [ 530.296878][T14134] should_fail_usercopy+0x1a/0x20 [ 530.301893][T14134] _copy_to_user+0x20/0x90 [ 530.306302][T14134] simple_read_from_buffer+0xe9/0x160 [ 530.311669][T14134] proc_fail_nth_read+0x19a/0x210 [ 530.316686][T14134] ? proc_fault_inject_write+0x2f0/0x2f0 [ 530.322315][T14134] ? security_file_permission+0x83/0xa0 [ 530.327856][T14134] ? proc_fault_inject_write+0x2f0/0x2f0 [ 530.333482][T14134] vfs_read+0x282/0xbe0 [ 530.337631][T14134] ? kernel_read+0x1f0/0x1f0 [ 530.342213][T14134] ? __kasan_check_write+0x14/0x20 [ 530.347317][T14134] ? mutex_lock+0x95/0x1a0 [ 530.351722][T14134] ? wait_for_completion_killable_timeout+0x10/0x10 [ 530.358302][T14134] ? __fget_files+0x2c4/0x320 [ 530.362971][T14134] ? __fdget_pos+0x2d2/0x380 [ 530.367550][T14134] ? ksys_read+0x71/0x240 [ 530.371867][T14134] ksys_read+0x140/0x240 [ 530.376099][T14134] ? vfs_write+0xf70/0xf70 [ 530.380502][T14134] ? debug_smp_processor_id+0x17/0x20 [ 530.385867][T14134] __x64_sys_read+0x7b/0x90 [ 530.390364][T14134] x64_sys_call+0x96d/0x9a0 [ 530.394872][T14134] do_syscall_64+0x4c/0xa0 [ 530.399276][T14134] ? clear_bhb_loop+0x50/0xa0 [ 530.403952][T14134] ? clear_bhb_loop+0x50/0xa0 [ 530.408639][T14134] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 530.414527][T14134] RIP: 0033:0x7ff53683833c [ 530.418936][T14134] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 530.438573][T14134] RSP: 002b:00007ff534ea2030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 530.446984][T14134] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff53683833c [ 530.454948][T14134] RDX: 000000000000000f RSI: 00007ff534ea20a0 RDI: 0000000000000008 [ 530.462905][T14134] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 530.470866][T14134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 530.478818][T14134] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 530.486771][T14134] [ 531.478964][T14162] device sit0 left promiscuous mode [ 533.384530][T14223] FAULT_INJECTION: forcing a failure. [ 533.384530][T14223] name failslab, interval 1, probability 0, space 0, times 0 [ 533.415384][ T30] audit: type=1400 audit(1751739486.814:145): avc: denied { setattr } for pid=14225 comm="syz.2.4848" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 533.526409][T14229] FAULT_INJECTION: forcing a failure. [ 533.526409][T14229] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 533.539945][T14223] CPU: 0 PID: 14223 Comm: syz.3.4847 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 533.549921][T14223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 533.559963][T14223] Call Trace: [ 533.563227][T14223] [ 533.566150][T14223] __dump_stack+0x21/0x30 [ 533.570470][T14223] dump_stack_lvl+0xee/0x150 [ 533.575049][T14223] ? show_regs_print_info+0x20/0x20 [ 533.580237][T14223] dump_stack+0x15/0x20 [ 533.584380][T14223] should_fail+0x3c1/0x510 [ 533.588783][T14223] __should_failslab+0xa4/0xe0 [ 533.593535][T14223] should_failslab+0x9/0x20 [ 533.598028][T14223] slab_pre_alloc_hook+0x3b/0xe0 [ 533.602955][T14223] ? __alloc_skb+0xe0/0x740 [ 533.607444][T14223] kmem_cache_alloc+0x44/0x260 [ 533.612198][T14223] __alloc_skb+0xe0/0x740 [ 533.616514][T14223] tipc_buf_acquire+0x2b/0xe0 [ 533.621186][T14223] tipc_msg_build+0x8f1/0xfb0 [ 533.625866][T14223] __tipc_sendmsg+0x19dd/0x2680 [ 533.630705][T14223] ? _raw_spin_lock+0xe0/0xe0 [ 533.635375][T14223] ? local_bh_enable+0x30/0x30 [ 533.640129][T14223] ? wait_woken+0x170/0x170 [ 533.644620][T14223] ? avc_has_perm+0x158/0x240 [ 533.649284][T14223] ? __kasan_check_write+0x14/0x20 [ 533.654381][T14223] ? _raw_spin_lock_bh+0x8e/0xe0 [ 533.659302][T14223] ? _raw_spin_lock_irq+0xe0/0xe0 [ 533.664316][T14223] ? unwind_get_return_address+0x4d/0x90 [ 533.669940][T14223] ? stack_trace_save+0xe0/0xe0 [ 533.674781][T14223] ? __local_bh_enable_ip+0x58/0x80 [ 533.679968][T14223] ? lock_sock_nested+0x1f1/0x290 [ 533.684988][T14223] ? sock_init_data+0xc0/0xc0 [ 533.689658][T14223] ? stack_trace_save+0x98/0xe0 [ 533.694512][T14223] tipc_sendmsg+0x55/0x70 [ 533.698837][T14223] ? tipc_recvmsg+0x13a0/0x13a0 [ 533.703678][T14223] ____sys_sendmsg+0x5a2/0x8c0 [ 533.708434][T14223] ? __sys_sendmsg_sock+0x40/0x40 [ 533.713449][T14223] ? import_iovec+0x7c/0xb0 [ 533.717941][T14223] ___sys_sendmsg+0x1f0/0x260 [ 533.722609][T14223] ? __sys_sendmsg+0x250/0x250 [ 533.727370][T14223] ? __fdget+0x1a1/0x230 [ 533.731607][T14223] __x64_sys_sendmsg+0x1e2/0x2a0 [ 533.736547][T14223] ? ___sys_sendmsg+0x260/0x260 [ 533.741385][T14223] ? ksys_write+0x1eb/0x240 [ 533.745879][T14223] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 533.751935][T14223] x64_sys_call+0x4b/0x9a0 [ 533.756340][T14223] do_syscall_64+0x4c/0xa0 [ 533.760745][T14223] ? clear_bhb_loop+0x50/0xa0 [ 533.765408][T14223] ? clear_bhb_loop+0x50/0xa0 [ 533.770069][T14223] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 533.775948][T14223] RIP: 0033:0x7ff536839929 [ 533.780611][T14223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.800207][T14223] RSP: 002b:00007ff534ea2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 533.808606][T14223] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff536839929 [ 533.816564][T14223] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000009 [ 533.824523][T14223] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 533.832485][T14223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 533.840441][T14223] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 533.848404][T14223] [ 533.853038][T14233] device sit0 left promiscuous mode [ 533.869249][T14229] CPU: 1 PID: 14229 Comm: syz.0.4850 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 533.879239][T14229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 533.889283][T14229] Call Trace: [ 533.892540][T14229] [ 533.895445][T14229] __dump_stack+0x21/0x30 [ 533.899752][T14229] dump_stack_lvl+0xee/0x150 [ 533.904317][T14229] ? show_regs_print_info+0x20/0x20 [ 533.909492][T14229] dump_stack+0x15/0x20 [ 533.913622][T14229] should_fail+0x3c1/0x510 [ 533.918011][T14229] should_fail_usercopy+0x1a/0x20 [ 533.923008][T14229] _copy_from_user+0x20/0xd0 [ 533.927578][T14229] generic_map_update_batch+0x44f/0x740 [ 533.933107][T14229] ? generic_map_delete_batch+0x510/0x510 [ 533.938802][T14229] ? kasan_check_range+0x7f/0x290 [ 533.943803][T14229] ? generic_map_delete_batch+0x510/0x510 [ 533.949502][T14229] bpf_map_do_batch+0x463/0x5f0 [ 533.954354][T14229] __sys_bpf+0x5e3/0x730 [ 533.958574][T14229] ? bpf_link_show_fdinfo+0x310/0x310 [ 533.963926][T14229] ? debug_smp_processor_id+0x17/0x20 [ 533.969274][T14229] __x64_sys_bpf+0x7c/0x90 [ 533.973662][T14229] x64_sys_call+0x4b9/0x9a0 [ 533.978141][T14229] do_syscall_64+0x4c/0xa0 [ 533.982535][T14229] ? clear_bhb_loop+0x50/0xa0 [ 533.987186][T14229] ? clear_bhb_loop+0x50/0xa0 [ 533.991834][T14229] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 533.997702][T14229] RIP: 0033:0x7f757ad9e929 [ 534.002092][T14229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 534.021674][T14229] RSP: 002b:00007f7579407038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 534.030062][T14229] RAX: ffffffffffffffda RBX: 00007f757afc5fa0 RCX: 00007f757ad9e929 [ 534.038007][T14229] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 534.045950][T14229] RBP: 00007f7579407090 R08: 0000000000000000 R09: 0000000000000000 [ 534.053897][T14229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 534.061843][T14229] R13: 0000000000000000 R14: 00007f757afc5fa0 R15: 00007ffc87623a38 [ 534.069793][T14229] [ 536.065261][T14301] FAULT_INJECTION: forcing a failure. [ 536.065261][T14301] name failslab, interval 1, probability 0, space 0, times 0 [ 536.151297][T14304] FAULT_INJECTION: forcing a failure. [ 536.151297][T14304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 536.228680][T14301] CPU: 1 PID: 14301 Comm: syz.1.4873 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 536.238859][T14301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 536.248906][T14301] Call Trace: [ 536.252180][T14301] [ 536.255101][T14301] __dump_stack+0x21/0x30 [ 536.259424][T14301] dump_stack_lvl+0xee/0x150 [ 536.264001][T14301] ? show_regs_print_info+0x20/0x20 [ 536.269201][T14301] dump_stack+0x15/0x20 [ 536.273353][T14301] should_fail+0x3c1/0x510 [ 536.277769][T14301] __should_failslab+0xa4/0xe0 [ 536.282535][T14301] should_failslab+0x9/0x20 [ 536.287030][T14301] slab_pre_alloc_hook+0x3b/0xe0 [ 536.291963][T14301] __kmalloc+0x6d/0x2c0 [ 536.296120][T14301] ? sk_prot_alloc+0xed/0x320 [ 536.300791][T14301] sk_prot_alloc+0xed/0x320 [ 536.305282][T14301] sk_alloc+0x38/0x430 [ 536.309342][T14301] bpf_prog_test_run_skb+0x24b/0x1150 [ 536.314705][T14301] ? __kasan_check_write+0x14/0x20 [ 536.319804][T14301] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 536.325693][T14301] bpf_prog_test_run+0x3d5/0x620 [ 536.330616][T14301] ? bpf_prog_query+0x230/0x230 [ 536.335454][T14301] ? selinux_bpf+0xce/0xf0 [ 536.339854][T14301] ? security_bpf+0x82/0xa0 [ 536.344334][T14301] __sys_bpf+0x52c/0x730 [ 536.348562][T14301] ? bpf_link_show_fdinfo+0x310/0x310 [ 536.353930][T14301] ? debug_smp_processor_id+0x17/0x20 [ 536.359306][T14301] __x64_sys_bpf+0x7c/0x90 [ 536.363702][T14301] x64_sys_call+0x4b9/0x9a0 [ 536.368180][T14301] do_syscall_64+0x4c/0xa0 [ 536.372572][T14301] ? clear_bhb_loop+0x50/0xa0 [ 536.377223][T14301] ? clear_bhb_loop+0x50/0xa0 [ 536.381875][T14301] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 536.387744][T14301] RIP: 0033:0x7f4674e01929 [ 536.392138][T14301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.411717][T14301] RSP: 002b:00007f467346a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 536.420104][T14301] RAX: ffffffffffffffda RBX: 00007f4675028fa0 RCX: 00007f4674e01929 [ 536.428053][T14301] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 536.436006][T14301] RBP: 00007f467346a090 R08: 0000000000000000 R09: 0000000000000000 [ 536.443963][T14301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.451915][T14301] R13: 0000000000000000 R14: 00007f4675028fa0 R15: 00007ffd0102af98 [ 536.459868][T14301] [ 536.470444][T14304] CPU: 0 PID: 14304 Comm: syz.3.4875 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 536.480429][T14304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 536.490474][T14304] Call Trace: [ 536.493741][T14304] [ 536.496663][T14304] __dump_stack+0x21/0x30 [ 536.500984][T14304] dump_stack_lvl+0xee/0x150 [ 536.505561][T14304] ? show_regs_print_info+0x20/0x20 [ 536.510751][T14304] ? bpf_test_timer_continue+0x155/0x4a0 [ 536.516376][T14304] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 536.521823][T14304] dump_stack+0x15/0x20 [ 536.525968][T14304] should_fail+0x3c1/0x510 [ 536.530376][T14304] should_fail_usercopy+0x1a/0x20 [ 536.535388][T14304] _copy_to_user+0x20/0x90 [ 536.539795][T14304] bpf_test_finish+0x1ae/0x3b0 [ 536.544549][T14304] ? convert_skb_to___skb+0x360/0x360 [ 536.549908][T14304] ? convert_skb_to___skb+0x203/0x360 [ 536.555274][T14304] bpf_prog_test_run_skb+0xbba/0x1150 [ 536.560641][T14304] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 536.566526][T14304] bpf_prog_test_run+0x3d5/0x620 [ 536.571453][T14304] ? bpf_prog_query+0x230/0x230 [ 536.576294][T14304] ? selinux_bpf+0xce/0xf0 [ 536.580701][T14304] ? security_bpf+0x82/0xa0 [ 536.585194][T14304] __sys_bpf+0x52c/0x730 [ 536.589430][T14304] ? bpf_link_show_fdinfo+0x310/0x310 [ 536.594793][T14304] ? debug_smp_processor_id+0x17/0x20 [ 536.600154][T14304] __x64_sys_bpf+0x7c/0x90 [ 536.604561][T14304] x64_sys_call+0x4b9/0x9a0 [ 536.609055][T14304] do_syscall_64+0x4c/0xa0 [ 536.613457][T14304] ? clear_bhb_loop+0x50/0xa0 [ 536.618127][T14304] ? clear_bhb_loop+0x50/0xa0 [ 536.622790][T14304] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 536.628672][T14304] RIP: 0033:0x7ff536839929 [ 536.633079][T14304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.652679][T14304] RSP: 002b:00007ff534ea2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 536.661083][T14304] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff536839929 [ 536.669052][T14304] RDX: 0000000000000050 RSI: 0000200000000100 RDI: 000000000000000a [ 536.677013][T14304] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 536.684971][T14304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.692929][T14304] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 536.700895][T14304] [ 536.883840][T14325] bond_slave_1: mtu less than device minimum [ 537.392844][T14349] FAULT_INJECTION: forcing a failure. [ 537.392844][T14349] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 537.488891][T14349] CPU: 1 PID: 14349 Comm: syz.2.4889 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 537.498887][T14349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 537.508937][T14349] Call Trace: [ 537.512205][T14349] [ 537.515125][T14349] __dump_stack+0x21/0x30 [ 537.519453][T14349] dump_stack_lvl+0xee/0x150 [ 537.524044][T14349] ? show_regs_print_info+0x20/0x20 [ 537.529246][T14349] dump_stack+0x15/0x20 [ 537.533393][T14349] should_fail+0x3c1/0x510 [ 537.537802][T14349] should_fail_alloc_page+0x55/0x80 [ 537.543008][T14349] prepare_alloc_pages+0x156/0x600 [ 537.548114][T14349] ? __alloc_pages_bulk+0xab0/0xab0 [ 537.553305][T14349] __alloc_pages+0x10a/0x440 [ 537.557892][T14349] ? prep_new_page+0x110/0x110 [ 537.562650][T14349] __vmalloc_node_range+0x440/0x840 [ 537.567844][T14349] bpf_map_area_alloc+0xd5/0xe0 [ 537.572690][T14349] ? htab_map_alloc+0x3c0/0x14f0 [ 537.577619][T14349] htab_map_alloc+0x3c0/0x14f0 [ 537.582722][T14349] ? __kasan_check_write+0x14/0x20 [ 537.587826][T14349] ? fput_many+0x15a/0x1a0 [ 537.592236][T14349] ? bpf_map_meta_alloc+0x16d/0x8c0 [ 537.597427][T14349] htab_of_map_alloc+0x55/0xc0 [ 537.602184][T14349] map_create+0x455/0x21b0 [ 537.606592][T14349] __sys_bpf+0x2cf/0x730 [ 537.610828][T14349] ? bpf_link_show_fdinfo+0x310/0x310 [ 537.616205][T14349] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 537.622358][T14349] __x64_sys_bpf+0x7c/0x90 [ 537.626764][T14349] x64_sys_call+0x4b9/0x9a0 [ 537.631262][T14349] do_syscall_64+0x4c/0xa0 [ 537.635669][T14349] ? clear_bhb_loop+0x50/0xa0 [ 537.640337][T14349] ? clear_bhb_loop+0x50/0xa0 [ 537.645003][T14349] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 537.650890][T14349] RIP: 0033:0x7ff1cd64c929 [ 537.655295][T14349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.674891][T14349] RSP: 002b:00007ff1cbcb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 537.683298][T14349] RAX: ffffffffffffffda RBX: 00007ff1cd873fa0 RCX: 00007ff1cd64c929 [ 537.691262][T14349] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0c00000000000000 [ 537.699223][T14349] RBP: 00007ff1cbcb5090 R08: 0000000000000000 R09: 0000000000000000 [ 537.707186][T14349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 537.715146][T14349] R13: 0000000000000000 R14: 00007ff1cd873fa0 R15: 00007ffdfd2a6768 [ 537.723115][T14349] [ 538.286630][T14408] device pim6reg1 entered promiscuous mode [ 538.813742][T14420] device sit0 entered promiscuous mode [ 538.905190][T14423] FAULT_INJECTION: forcing a failure. [ 538.905190][T14423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 539.074989][T14423] CPU: 0 PID: 14423 Comm: syz.2.4911 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 539.084989][T14423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 539.095031][T14423] Call Trace: [ 539.098299][T14423] [ 539.101223][T14423] __dump_stack+0x21/0x30 [ 539.105544][T14423] dump_stack_lvl+0xee/0x150 [ 539.110123][T14423] ? show_regs_print_info+0x20/0x20 [ 539.115310][T14423] ? _raw_spin_lock+0x8e/0xe0 [ 539.119983][T14423] ? _raw_spin_trylock_bh+0x130/0x130 [ 539.125362][T14423] dump_stack+0x15/0x20 [ 539.129508][T14423] should_fail+0x3c1/0x510 [ 539.133918][T14423] should_fail_alloc_page+0x55/0x80 [ 539.139116][T14423] prepare_alloc_pages+0x156/0x600 [ 539.144220][T14423] ? __alloc_pages_bulk+0xab0/0xab0 [ 539.149411][T14423] ? fault_around_bytes_set+0xc0/0xc0 [ 539.154773][T14423] __alloc_pages+0x10a/0x440 [ 539.159354][T14423] ? prep_new_page+0x110/0x110 [ 539.164115][T14423] shmem_alloc_and_acct_page+0x42b/0x870 [ 539.169745][T14423] ? shmem_swapin_page+0x14c0/0x14c0 [ 539.175029][T14423] ? xas_load+0x2ea/0x300 [ 539.179351][T14423] ? pagecache_get_page+0xcbd/0xda0 [ 539.184541][T14423] ? page_cache_prev_miss+0x270/0x270 [ 539.189909][T14423] ? kasan_check_range+0x13/0x290 [ 539.194929][T14423] shmem_getpage_gfp+0xfe5/0x2310 [ 539.199960][T14423] shmem_write_begin+0xce/0x1b0 [ 539.204811][T14423] generic_perform_write+0x2ad/0x670 [ 539.210097][T14423] ? grab_cache_page_write_begin+0xb0/0xb0 [ 539.215893][T14423] ? file_remove_privs+0x590/0x590 [ 539.220997][T14423] ? rwsem_write_trylock+0x130/0x300 [ 539.226272][T14423] ? clear_nonspinnable+0x60/0x60 [ 539.231286][T14423] ? avc_policy_seqno+0x1b/0x70 [ 539.236125][T14423] __generic_file_write_iter+0x268/0x480 [ 539.241749][T14423] generic_file_write_iter+0xa9/0x1d0 [ 539.247109][T14423] vfs_write+0x802/0xf70 [ 539.251340][T14423] ? file_end_write+0x1b0/0x1b0 [ 539.256179][T14423] ? wait_for_completion_killable_timeout+0x10/0x10 [ 539.262755][T14423] ? __fget_files+0x2c4/0x320 [ 539.267428][T14423] ? __fdget_pos+0x2d2/0x380 [ 539.272010][T14423] ? ksys_write+0x71/0x240 [ 539.276417][T14423] ksys_write+0x140/0x240 [ 539.280733][T14423] ? __ia32_sys_read+0x90/0x90 [ 539.285483][T14423] ? debug_smp_processor_id+0x17/0x20 [ 539.290845][T14423] __x64_sys_write+0x7b/0x90 [ 539.295420][T14423] x64_sys_call+0x8ef/0x9a0 [ 539.299912][T14423] do_syscall_64+0x4c/0xa0 [ 539.304318][T14423] ? clear_bhb_loop+0x50/0xa0 [ 539.308986][T14423] ? clear_bhb_loop+0x50/0xa0 [ 539.313654][T14423] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 539.319534][T14423] RIP: 0033:0x7ff1cd64c929 [ 539.323937][T14423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.343609][T14423] RSP: 002b:00007ff1cbcb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 539.351999][T14423] RAX: ffffffffffffffda RBX: 00007ff1cd873fa0 RCX: 00007ff1cd64c929 [ 539.359945][T14423] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 539.367903][T14423] RBP: 00007ff1cbcb5090 R08: 0000000000000000 R09: 0000000000000000 [ 539.375850][T14423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 539.383793][T14423] R13: 0000000000000000 R14: 00007ff1cd873fa0 R15: 00007ffdfd2a6768 [ 539.391745][T14423] [ 539.711166][T14451] device syzkaller0 entered promiscuous mode [ 540.064226][T14467] FAULT_INJECTION: forcing a failure. [ 540.064226][T14467] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 540.098571][T14467] CPU: 1 PID: 14467 Comm: syz.4.4928 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 540.108564][T14467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 540.118611][T14467] Call Trace: [ 540.121883][T14467] [ 540.124807][T14467] __dump_stack+0x21/0x30 [ 540.129133][T14467] dump_stack_lvl+0xee/0x150 [ 540.133716][T14467] ? show_regs_print_info+0x20/0x20 [ 540.138909][T14467] dump_stack+0x15/0x20 [ 540.143057][T14467] should_fail+0x3c1/0x510 [ 540.147461][T14467] should_fail_alloc_page+0x55/0x80 [ 540.152654][T14467] prepare_alloc_pages+0x156/0x600 [ 540.157761][T14467] ? __alloc_pages_bulk+0xab0/0xab0 [ 540.162963][T14467] ? irqentry_exit+0x37/0x40 [ 540.167545][T14467] ? exc_page_fault+0x5e/0xb0 [ 540.172215][T14467] __alloc_pages+0x10a/0x440 [ 540.176801][T14467] ? prep_new_page+0x110/0x110 [ 540.181567][T14467] ? copy_user_enhanced_fast_string+0xe/0x40 [ 540.187543][T14467] pipe_write+0x570/0x18d0 [ 540.191954][T14467] ? pipe_write+0x151/0x18d0 [ 540.196545][T14467] ? pipe_read+0xfe0/0xfe0 [ 540.200950][T14467] ? selinux_file_permission+0x3f4/0x510 [ 540.206575][T14467] ? memset+0x35/0x40 [ 540.210546][T14467] ? iov_iter_init+0xbc/0x180 [ 540.215210][T14467] vfs_write+0x802/0xf70 [ 540.219458][T14467] ? file_end_write+0x1b0/0x1b0 [ 540.224299][T14467] ? __fget_files+0x2c4/0x320 [ 540.228973][T14467] ? __fdget_pos+0x1f7/0x380 [ 540.233555][T14467] ? ksys_write+0x71/0x240 [ 540.237962][T14467] ksys_write+0x140/0x240 [ 540.242279][T14467] ? __ia32_sys_read+0x90/0x90 [ 540.247017][T14467] ? debug_smp_processor_id+0x17/0x20 [ 540.252364][T14467] __x64_sys_write+0x7b/0x90 [ 540.256946][T14467] x64_sys_call+0x8ef/0x9a0 [ 540.261423][T14467] do_syscall_64+0x4c/0xa0 [ 540.265809][T14467] ? clear_bhb_loop+0x50/0xa0 [ 540.270464][T14467] ? clear_bhb_loop+0x50/0xa0 [ 540.275139][T14467] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 540.281031][T14467] RIP: 0033:0x7fe850715929 [ 540.285438][T14467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.305039][T14467] RSP: 002b:00007fe84ed7e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 540.313444][T14467] RAX: ffffffffffffffda RBX: 00007fe85093cfa0 RCX: 00007fe850715929 [ 540.321409][T14467] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 540.329375][T14467] RBP: 00007fe84ed7e090 R08: 0000000000000000 R09: 0000000000000000 [ 540.337348][T14467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 540.345410][T14467] R13: 0000000000000000 R14: 00007fe85093cfa0 R15: 00007ffd1e74c338 [ 540.353378][T14467] [ 542.104781][T14555] ÿÿÿÿÿÿ: renamed from vlan1 [ 542.253094][T14562] device veth0_vlan left promiscuous mode [ 542.269463][T14562] device veth0_vlan entered promiscuous mode [ 542.281399][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 542.291092][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 542.301260][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 542.843320][T14591] device sit0 left promiscuous mode [ 543.020863][T14605] device sit0 entered promiscuous mode [ 543.035560][T14610] device pim6reg1 entered promiscuous mode [ 544.023527][T14637] device syzkaller0 entered promiscuous mode [ 544.632771][T14674] device sit0 left promiscuous mode [ 544.749580][T14680] device sit0 entered promiscuous mode [ 545.263023][T14717] device sit0 left promiscuous mode [ 545.370842][T14719] device sit0 entered promiscuous mode [ 545.379944][T14718] device sit0 entered promiscuous mode [ 545.673554][T14745] FAULT_INJECTION: forcing a failure. [ 545.673554][T14745] name failslab, interval 1, probability 0, space 0, times 0 [ 545.694875][T14745] CPU: 0 PID: 14745 Comm: syz.3.5030 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 545.704858][T14745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 545.714904][T14745] Call Trace: [ 545.718170][T14745] [ 545.721087][T14745] __dump_stack+0x21/0x30 [ 545.725409][T14745] dump_stack_lvl+0xee/0x150 [ 545.729986][T14745] ? show_regs_print_info+0x20/0x20 [ 545.735172][T14745] dump_stack+0x15/0x20 [ 545.739314][T14745] should_fail+0x3c1/0x510 [ 545.743717][T14745] __should_failslab+0xa4/0xe0 [ 545.748475][T14745] should_failslab+0x9/0x20 [ 545.752975][T14745] slab_pre_alloc_hook+0x3b/0xe0 [ 545.757902][T14745] ? __build_skb+0x2d/0x310 [ 545.762392][T14745] kmem_cache_alloc+0x44/0x260 [ 545.767146][T14745] __build_skb+0x2d/0x310 [ 545.771460][T14745] ? __kasan_check_write+0x14/0x20 [ 545.776560][T14745] build_skb+0x24/0x200 [ 545.780700][T14745] bpf_prog_test_run_skb+0x279/0x1150 [ 545.786064][T14745] ? __kasan_check_write+0x14/0x20 [ 545.791169][T14745] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 545.797047][T14745] bpf_prog_test_run+0x3d5/0x620 [ 545.801975][T14745] ? bpf_prog_query+0x230/0x230 [ 545.806813][T14745] ? selinux_bpf+0xce/0xf0 [ 545.811218][T14745] ? security_bpf+0x82/0xa0 [ 545.815708][T14745] __sys_bpf+0x52c/0x730 [ 545.819938][T14745] ? bpf_link_show_fdinfo+0x310/0x310 [ 545.825301][T14745] ? debug_smp_processor_id+0x17/0x20 [ 545.830660][T14745] __x64_sys_bpf+0x7c/0x90 [ 545.835062][T14745] x64_sys_call+0x4b9/0x9a0 [ 545.839553][T14745] do_syscall_64+0x4c/0xa0 [ 545.843955][T14745] ? clear_bhb_loop+0x50/0xa0 [ 545.848619][T14745] ? clear_bhb_loop+0x50/0xa0 [ 545.853283][T14745] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 545.859161][T14745] RIP: 0033:0x7ff536839929 [ 545.863565][T14745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 545.883156][T14745] RSP: 002b:00007ff534ea2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 545.891561][T14745] RAX: ffffffffffffffda RBX: 00007ff536a60fa0 RCX: 00007ff536839929 [ 545.899520][T14745] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 545.907477][T14745] RBP: 00007ff534ea2090 R08: 0000000000000000 R09: 0000000000000000 [ 545.915435][T14745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.923401][T14745] R13: 0000000000000000 R14: 00007ff536a60fa0 R15: 00007ffc3df0af98 [ 545.931370][T14745] [ 546.017826][T14752] device pim6reg1 entered promiscuous mode [ 546.695084][T14790] device veth0_vlan left promiscuous mode [ 546.715913][T14790] device veth0_vlan entered promiscuous mode [ 546.727215][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.739171][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 546.820148][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 547.254688][T14799] device veth0_vlan left promiscuous mode [ 547.294907][T14799] device veth0_vlan entered promiscuous mode [ 547.548756][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 547.571660][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 547.592024][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 547.993404][T14821] device sit0 left promiscuous mode [ 548.614985][T14840] device veth0_vlan left promiscuous mode [ 548.697313][T14840] device veth0_vlan entered promiscuous mode [ 548.720136][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 548.731663][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 548.765330][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 548.802196][T14848] FAULT_INJECTION: forcing a failure. [ 548.802196][T14848] name failslab, interval 1, probability 0, space 0, times 0 [ 548.818586][T14848] CPU: 1 PID: 14848 Comm: syz.4.5068 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 548.828567][T14848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 548.838616][T14848] Call Trace: [ 548.841891][T14848] [ 548.844936][T14848] __dump_stack+0x21/0x30 [ 548.849292][T14848] dump_stack_lvl+0xee/0x150 [ 548.853876][T14848] ? show_regs_print_info+0x20/0x20 [ 548.859073][T14848] dump_stack+0x15/0x20 [ 548.863219][T14848] should_fail+0x3c1/0x510 [ 548.867633][T14848] __should_failslab+0xa4/0xe0 [ 548.872393][T14848] should_failslab+0x9/0x20 [ 548.876901][T14848] slab_pre_alloc_hook+0x3b/0xe0 [ 548.881838][T14848] kmem_cache_alloc_trace+0x48/0x270 [ 548.887123][T14848] ? allocate_cgrp_cset_links+0xdc/0x380 [ 548.892755][T14848] allocate_cgrp_cset_links+0xdc/0x380 [ 548.898206][T14848] find_css_set+0x928/0x1520 [ 548.902790][T14848] ? cgroup_migrate_prepare_dst+0x910/0x910 [ 548.908681][T14848] ? sysvec_irq_work+0x61/0xc0 [ 548.913444][T14848] ? asm_sysvec_irq_work+0x1b/0x20 [ 548.918550][T14848] cgroup_migrate_prepare_dst+0xe0/0x910 [ 548.924181][T14848] ? _raw_spin_unlock_irq+0x49/0x70 [ 548.929377][T14848] cgroup_attach_task+0x2ca/0x550 [ 548.934397][T14848] ? cgroup_migrate_execute+0xf70/0xf70 [ 548.939939][T14848] ? cgroup_attach_task+0x550/0x550 [ 548.945127][T14848] ? __kasan_check_write+0x14/0x20 [ 548.950231][T14848] ? get_task_cred+0x147/0x180 [ 548.954988][T14848] __cgroup1_procs_write+0x36f/0x520 [ 548.960270][T14848] ? cgroup_pidlist_destroy_work_fn+0x210/0x210 [ 548.966512][T14848] ? __kasan_check_write+0x14/0x20 [ 548.971616][T14848] ? _copy_from_iter+0x4ae/0x1050 [ 548.976644][T14848] cgroup1_procs_write+0x2a/0x40 [ 548.981573][T14848] ? cgroup_pidlist_stop+0x100/0x100 [ 548.986848][T14848] cgroup_file_write+0x299/0x540 [ 548.991777][T14848] ? cgroup_seqfile_stop+0xc0/0xc0 [ 548.996876][T14848] ? mutex_lock+0x95/0x1a0 [ 549.001280][T14848] ? wait_for_completion_killable_timeout+0x10/0x10 [ 549.007860][T14848] ? check_stack_object+0x81/0x140 [ 549.012963][T14848] ? __kasan_check_write+0x14/0x20 [ 549.018074][T14848] kernfs_fop_write_iter+0x2c5/0x400 [ 549.023355][T14848] ? cgroup_seqfile_stop+0xc0/0xc0 [ 549.028465][T14848] vfs_write+0x802/0xf70 [ 549.032699][T14848] ? asm_sysvec_irq_work+0x1b/0x20 [ 549.037804][T14848] ? file_end_write+0x1b0/0x1b0 [ 549.042644][T14848] ? wait_for_completion_killable_timeout+0x10/0x10 [ 549.049227][T14848] ? __fget_files+0x2c4/0x320 [ 549.054604][T14848] ? __fdget_pos+0x2d2/0x380 [ 549.059191][T14848] ? ksys_write+0x71/0x240 [ 549.063606][T14848] ksys_write+0x140/0x240 [ 549.067947][T14848] ? __ia32_sys_read+0x90/0x90 [ 549.072708][T14848] ? __kasan_check_write+0x14/0x20 [ 549.077818][T14848] __x64_sys_write+0x7b/0x90 [ 549.082403][T14848] x64_sys_call+0x8ef/0x9a0 [ 549.086902][T14848] do_syscall_64+0x4c/0xa0 [ 549.091311][T14848] ? clear_bhb_loop+0x50/0xa0 [ 549.095984][T14848] ? clear_bhb_loop+0x50/0xa0 [ 549.100653][T14848] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 549.106543][T14848] RIP: 0033:0x7fe850715929 [ 549.110957][T14848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.131512][T14848] RSP: 002b:00007fe84ed5d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 549.139906][T14848] RAX: ffffffffffffffda RBX: 00007fe85093d080 RCX: 00007fe850715929 [ 549.147857][T14848] RDX: 0000000000000012 RSI: 0000200000000380 RDI: 000000000000000b [ 549.155806][T14848] RBP: 00007fe84ed5d090 R08: 0000000000000000 R09: 0000000000000000 [ 549.163756][T14848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.171709][T14848] R13: 0000000000000000 R14: 00007fe85093d080 R15: 00007ffd1e74c338 [ 549.179665][T14848] [ 552.039163][ T30] audit: type=1400 audit(1751739505.444:146): avc: denied { create } for pid=14938 comm="syz.1.5104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 552.675791][T14951] device sit0 left promiscuous mode [ 552.787068][T14959] device sit0 entered promiscuous mode [ 552.989892][ T30] audit: type=1400 audit(1751739506.364:147): avc: denied { read } for pid=14962 comm="syz.1.5111" dev="nsfs" ino=4026532944 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 553.188054][ T30] audit: type=1400 audit(1751739506.414:148): avc: denied { open } for pid=14962 comm="syz.1.5111" path="net:[4026532944]" dev="nsfs" ino=4026532944 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 554.515051][T15014] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.522272][T15014] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.791643][T15029] bond_slave_1: mtu less than device minimum [ 556.279818][T15077] device veth0_vlan left promiscuous mode [ 556.300129][T15077] device veth0_vlan entered promiscuous mode [ 556.397855][T15082] device sit0 left promiscuous mode [ 556.463026][T15081] device sit0 entered promiscuous mode [ 557.835347][T15114] device sit0 left promiscuous mode [ 557.846267][T15115] device sit0 entered promiscuous mode [ 558.092350][T15129] device sit0 entered promiscuous mode [ 558.172539][T15119] device sit0 left promiscuous mode [ 558.350207][ T30] audit: type=1400 audit(1751739511.754:149): avc: denied { ioctl } for pid=15120 comm="syz.4.5170" path="pid:[4026532636]" dev="nsfs" ino=4026532636 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 558.668040][T15121] device sit0 entered promiscuous mode [ 559.237578][T15154] device sit0 left promiscuous mode [ 559.334641][T15074] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 559.346381][T15074] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 559.354789][T15074] CPU: 0 PID: 15074 Comm: syz.4.5151 Not tainted 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 559.364764][T15074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 559.374816][T15074] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 559.380455][T15074] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 4e de 3a ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 2b de 3a ff 41 f6 45 00 01 48 89 [ 559.400056][T15074] RSP: 0018:ffffc9000275f6c0 EFLAGS: 00010246 [ 559.406129][T15074] RAX: dffffc0000000000 RBX: ffff88811e3f3068 RCX: 1ffff11023c7e60d [ 559.414091][T15074] RDX: ffffffff819aea70 RSI: 1ffff110213177b7 RDI: ffff88811e3f3058 [ 559.422063][T15074] RBP: ffffc9000275f720 R08: dffffc0000000000 R09: ffffed10213177bb [ 559.430033][T15074] R10: ffffed10213177bb R11: 1ffff110213177ba R12: 1ffff11023c7e60e [ 559.438151][T15074] R13: 0000000000000000 R14: ffff88811e3f3058 R15: 0000000000000000 [ 559.446119][T15074] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 559.455039][T15074] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 559.461617][T15074] CR2: 000020000003e000 CR3: 000000012c9e1000 CR4: 00000000003506b0 [ 559.469585][T15074] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 559.477552][T15074] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 559.485514][T15074] Call Trace: [ 559.488787][T15074] [ 559.491707][T15074] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 559.498123][T15074] vma_interval_tree_remove+0xadf/0xb00 [ 559.503669][T15074] unlink_file_vma+0xd7/0xf0 [ 559.508252][T15074] free_pgtables+0x139/0x280 [ 559.512834][T15074] exit_mmap+0x407/0x860 [ 559.517070][T15074] ? vm_brk+0x30/0x30 [ 559.521048][T15074] ? mutex_unlock+0x89/0x220 [ 559.525636][T15074] ? uprobe_clear_state+0x2c1/0x320 [ 559.530948][T15074] __mmput+0x93/0x320 [ 559.534956][T15074] ? mmput+0x48/0x150 [ 559.538966][T15074] mmput+0x50/0x150 [ 559.542764][T15074] do_exit+0x9ca/0x27a0 [ 559.546914][T15074] ? simple_acl_create+0x1c0/0x1c0 [ 559.552023][T15074] ? put_task_struct+0x90/0x90 [ 559.556775][T15074] ? ____kasan_slab_free+0x130/0x160 [ 559.562054][T15074] ? get_signal+0xb5e/0x1480 [ 559.566644][T15074] do_group_exit+0x141/0x310 [ 559.571231][T15074] get_signal+0x66a/0x1480 [ 559.575643][T15074] arch_do_signal_or_restart+0xc1/0x10f0 [ 559.581269][T15074] ? bad_area+0x74/0x90 [ 559.585433][T15074] ? do_kern_addr_fault+0x80/0x80 [ 559.590460][T15074] ? get_sigframe_size+0x10/0x10 [ 559.595397][T15074] exit_to_user_mode_loop+0xa7/0xe0 [ 559.600586][T15074] exit_to_user_mode_prepare+0x5a/0xa0 [ 559.606038][T15074] irqentry_exit_to_user_mode+0x9/0x10 [ 559.611755][T15074] irqentry_exit+0x12/0x40 [ 559.616166][T15074] exc_page_fault+0x5e/0xb0 [ 559.620661][T15074] asm_exc_page_fault+0x27/0x30 [ 559.625509][T15074] RIP: 0033:0x7fe850715931 [ 559.629914][T15074] Code: Unable to access opcode bytes at RIP 0x7fe850715907. [ 559.637263][T15074] RSP: 002b:0000000000009000 EFLAGS: 00010217 [ 559.643325][T15074] RAX: 0000000000000000 RBX: 00007fe85093d080 RCX: 00007fe850715929 [ 559.651288][T15074] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000000000000 [ 559.659258][T15074] RBP: 00007fe850797b39 R08: 0000000000000000 R09: 0000000000000000 [ 559.667225][T15074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 559.675187][T15074] R13: 0000000000000000 R14: 00007fe85093d080 R15: 00007ffd1e74c338 [ 559.683152][T15074] [ 559.686159][T15074] Modules linked in: [ 559.692258][ T30] audit: type=1400 audit(1751739513.094:150): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 559.732978][ T30] audit: type=1400 audit(1751739513.094:151): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 559.758481][T15160] device sit0 entered promiscuous mode [ 559.777238][ T30] audit: type=1400 audit(1751739513.094:152): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 559.821496][ T30] audit: type=1400 audit(1751739513.094:153): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 559.834822][T15074] ---[ end trace e47e99337a1d0308 ]--- [ 559.847510][T15074] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 559.849075][ T30] audit: type=1400 audit(1751739513.094:154): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 559.855110][T15074] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 4e de 3a ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 2b de 3a ff 41 f6 45 00 01 48 89 [ 559.873814][ T30] audit: type=1400 audit(1751739513.094:155): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 559.939310][ T30] audit: type=1400 audit(1751739513.094:156): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 560.313918][T15074] RSP: 0018:ffffc9000275f6c0 EFLAGS: 00010246 [ 560.320061][T15074] RAX: dffffc0000000000 RBX: ffff88811e3f3068 RCX: 1ffff11023c7e60d [ 560.328030][T15074] RDX: ffffffff819aea70 RSI: 1ffff110213177b7 RDI: ffff88811e3f3058 [ 560.336076][T15074] RBP: ffffc9000275f720 R08: dffffc0000000000 R09: ffffed10213177bb [ 560.344062][T15074] R10: ffffed10213177bb R11: 1ffff110213177ba R12: 1ffff11023c7e60e [ 560.352079][T15074] R13: 0000000000000000 R14: ffff88811e3f3058 R15: 0000000000000000 [ 560.360050][T15074] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 560.368978][T15074] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 560.375554][T15074] CR2: 000020000003e000 CR3: 000000012c8fc000 CR4: 00000000003506b0 [ 560.383525][T15074] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 560.391499][T15074] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 560.399464][T15074] Kernel panic - not syncing: Fatal exception [ 560.405723][T15074] Kernel Offset: disabled [ 560.410028][T15074] Rebooting in 86400 seconds..