last executing test programs: 4m18.665290186s ago: executing program 0 (id=6585): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a0"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r0}, 0x18) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) 4m18.635678327s ago: executing program 0 (id=6586): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14, r3, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x18) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4}, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fb", 0x86, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000280)="dee7030022cf5c6c7bc31bd2599759fafa9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x83, r7) keyctl$search(0xa, r7, &(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)={0x2c, r8, 0x1, 0x0, 0x30000, {0x1a}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x58, &(0x7f0000000500)}, 0x10) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0x7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0xfffd}}}]}, 0x38}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r11, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r12, {0x10, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000005c0)={@remote}, &(0x7f0000000600)=0x14) 4m17.682658376s ago: executing program 0 (id=6598): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x6, 0x3, 0x7ffcfffc}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) 4m17.537910608s ago: executing program 0 (id=6602): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b70300000700000085000000110000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) time(&(0x7f0000000140)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) kexec_load(0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000280)='./file2\x00', 0x404, &(0x7f0000000300)={[{@nodiscard}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@minixdf}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) ioprio_set$pid(0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000000), &(0x7f0000000180)=r3}, 0x20) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x2c, 0x2}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f0000000200)={0x0, 0x46, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c0003800800014000000000080002400000000018000380140001007465616d3000000000000000000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c00038014"], 0xfc}}, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000340)={[{@errors_remount}, {@nodioread_nolock}]}, 0x1, 0x512, &(0x7f0000000380)="$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") r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r6 = syz_open_procfs(r1, &(0x7f0000000100)='oom_score\x00') pread64(r6, &(0x7f0000000140), 0x5e, 0x4) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) fcntl$lock(r8, 0x24, &(0x7f0000001800)={0x1, 0x0, 0xffffffffffffff7f, 0x5a60}) fcntl$setlease(r7, 0x400, 0x1) 4m17.053834798s ago: executing program 0 (id=6609): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x19, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r4}, 0x18) sendmsg$802154_raw(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)="11a32ed688eb47", 0x7}, 0x1, 0x0, 0x0, 0x24008011}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r5, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 4m16.050643567s ago: executing program 0 (id=6619): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYRESHEX], &(0x7f0000000100)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x188) r1 = socket(0x10, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x3, 0xfff1}, {0xfff2, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=@newtfilter={0x94, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r3, {0xf}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x68, 0x2, [@TCA_U32_SEL={0x64, 0x5, {0x13, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0x10, 0xfffff000, 0x9f6}, {0x80deb2, 0x3, 0x6, 0x3}, {0x200, 0x3ff, 0x3, 0x4}, {0x9, 0x7, 0x40, 0x80}, {0x3ff, 0xb, 0x3, 0xa6d}]}}]}}]}, 0x94}, 0x1, 0x0, 0x0, 0xccd4ddef28b9e90e}, 0x40094) r4 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000001c40)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r5) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xb, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r7}, 0x10) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000185600000700000001000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r9}, 0x18) link(&(0x7f00000009c0)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) r10 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r8, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=[0x1], 0x0, 0x0, 0x1, 0x1}}, 0x3c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r10, 0x0, 0x0}, 0x10) r11 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r11}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x300) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x80, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x54, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x808}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x24044815}, 0x0) 4m16.045544847s ago: executing program 32 (id=6619): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYRESHEX], &(0x7f0000000100)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x188) r1 = socket(0x10, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x3, 0xfff1}, {0xfff2, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=@newtfilter={0x94, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r3, {0xf}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x68, 0x2, [@TCA_U32_SEL={0x64, 0x5, {0x13, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0x10, 0xfffff000, 0x9f6}, {0x80deb2, 0x3, 0x6, 0x3}, {0x200, 0x3ff, 0x3, 0x4}, {0x9, 0x7, 0x40, 0x80}, {0x3ff, 0xb, 0x3, 0xa6d}]}}]}}]}, 0x94}, 0x1, 0x0, 0x0, 0xccd4ddef28b9e90e}, 0x40094) r4 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000001c40)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r5) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xb, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r7}, 0x10) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000185600000700000001000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r9}, 0x18) link(&(0x7f00000009c0)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) r10 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r8, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=[0x1], 0x0, 0x0, 0x1, 0x1}}, 0x3c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r10, 0x0, 0x0}, 0x10) r11 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r11}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x300) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x80, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x54, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x808}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x24044815}, 0x0) 4.290758007s ago: executing program 2 (id=10175): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8}, &(0x7f0000010080), 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) 4.152576299s ago: executing program 2 (id=10177): r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3}, 0x1c) 3.304158355s ago: executing program 2 (id=10191): socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x18) creat(&(0x7f0000000140)='./bus\x00', 0x60) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000600)='./bus\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2000000100"/26], &(0x7f0000000540), 0x600) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x8, &(0x7f0000003600)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='cq_modify\x00', 0xffffffffffffffff, 0x0, 0x800000005}, 0xcf) r2 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x94) ftruncate(r2, 0x2007ffc) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'geneve0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x121c02, 0x0) ioctl$PPPIOCNEWUNIT(r5, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSACTIVE(r5, 0x40107446, &(0x7f00000003c0)={0x2, &(0x7f0000000080)=[{0x50, 0x1, 0x2, 0x6}, {0x6, 0x0, 0x3, 0x365}]}) write$ppp(r5, &(0x7f0000000400)="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", 0x109) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000500)='ext4_drop_inode\x00', r1, 0x0, 0xfffffffffffffffb}, 0x18) r6 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newqdisc={0x24, 0x24, 0x8, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, r7, {0xfff3, 0xc}, {0xffff, 0xd}, {0x1, 0xd}}}, 0x24}}, 0x0) socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@delchain={0x24, 0x65, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, {0xb, 0x10}, {0x7, 0xffe0}, {0xc, 0xf}}}, 0x24}, 0x1, 0x0, 0x0, 0x42000}, 0x4004) sendfile(r2, r2, 0x0, 0x100000000) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000640)={{0x2, 0x4e25, @dev={0xac, 0x14, 0x14, 0x3f}}, {0x6, @local}, 0x48, {0x2, 0x4e22, @loopback}, 'team0\x00'}) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[], 0x24}}, 0x0) 2.704134348s ago: executing program 4 (id=10207): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x8040) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') preadv(r2, &(0x7f0000002540)=[{0x0}], 0x1, 0x47fff, 0x6) syz_read_part_table(0x406c, &(0x7f0000008100)="$eJzszzFKxGAQBeCXjcEogUXQShAXe4mdVW6xjZXsGaxVzE0sxQN4IkuvEMHF1aSwU1S+r5rhzQv5wx9Rb6YiydPqcS/J8SJ9267Drfd856PUnqXarWdpklwluRh/c/nwM/8OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8QrPRdjNJ6820Okx/3eW8SeqDeXJXpuqOiuwni9P1Sfm5WSbPSYokL0mW8298AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwj1yOtu1p3HxRvT9J31Vv422SYRiG8UGRV3bnmAgAGASC4JcxGJP4wBcKaKh3+5u59NK+5NdhFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYduBAAAAAAADI/7URqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqrADBzIAAAAAwvyt82g/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKwUAAP//BkAT8g==") fchdir(0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x100b28, 0x6, 0x0, 0x7, 0x8, 0x20005, 0x80, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0x122}, 0x1, 0x0, 0x0, 0x88c1}, 0x8010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x5452, &(0x7f0000000a00)={'vlan0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0xfc}}) recvmsg$unix(r5, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) close(r4) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[], 0x44}, 0x1, 0x0, 0x0, 0x24000091}, 0x4008000) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x64, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0xffffffff, 0xff}, 0x20, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x94eb2000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) gettid() 2.59211823s ago: executing program 2 (id=10209): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f00000002c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc0ed000e, &(0x7f00000001c0)={[{@jqfmt_vfsold}, {@orlov}, {@sysvgroups}, {@noload}, {@nombcache}, {@noblock_validity}, {@init_itable_val={'init_itable', 0x3d, 0x51}}, {@nogrpid}]}, 0xfa, 0x489, &(0x7f0000000840)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="44000000020605000000000000000000000000000c000300686173683a69700005"], 0x44}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)={0x4c, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xfffffffc}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10000047}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140)={0xfff}, 0x8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)={0x28, 0x18, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x800, 0x0, 0x0, @ipv4=@multicast2}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @uid}]}]}, 0x28}}, 0x0) 2.113786829s ago: executing program 3 (id=10215): syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2102848, 0x0, 0x1, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180018110000000000000000000000000000000030169113baed6b", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket(0x1, 0x803, 0x0) bind$unix(r2, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_AUTHENTICATE(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=r3, @ANYBLOB="040327bd7000fcdbdf25250000000c00990040fbffff3b000000390a00340001010101010100000a000600ffffffffffff000011000700cf97814a3392d17abac931aeb10000000d000a00614ba56288e19a05940000001100070076a6ce77ff309d3be1f5dba6c700000008003700000000000800090001ac0f00050008000000002217489a06d6f422d22978df3f4f61f1ee2256fc5856f2f0d8ed3784f4d8c99f0575eff11e38c9651d658db1971c0401822467087edb27e0d9d3e0e11a440e234e27f08e414788723e094f339f18fe661b4fc3ad775c3b021c390648a2d363547f6a487c5f2ce69b7375e337340805e5200ee6b570583b7b5b3e970108e97d3bd4d2948f391b31646206405ed80835424b72df87"], 0x88}}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r4 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4e4000000df70108d00000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) pipe2(0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8, 0x0, 0x7}, 0x18) 1.816296835s ago: executing program 1 (id=10221): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000090000004200000040"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800100000400000028000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000050000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000680), 0x80c02, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r5 = socket$netlink(0x10, 0x3, 0x9) preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/64, 0x40}], 0x1, 0x7ff, 0x2) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000004c0)="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") bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3, 0x0, 0x8000000005}, 0x18) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1ff) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000000100)=0x0) timer_settime(r8, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_delete(r8) socket$packet(0x11, 0x3, 0x300) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r9, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r9, &(0x7f0000000180)="10030600e0fc020004004788aa96a13bb100001100007fca1a00", 0x1a, 0x0, &(0x7f0000000140)={0x11, 0x0, r10}, 0x14) timer_settime(r8, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000080)) write$cgroup_int(r3, 0x0, 0x2) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) 1.55158758s ago: executing program 1 (id=10223): r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3}, 0x1c) 1.136165098s ago: executing program 3 (id=10226): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000280)=""/196, 0xc4, 0xfffffffffffffffe, 0x0) 1.083899749s ago: executing program 3 (id=10227): socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) io_uring_setup(0xd79, &(0x7f00000003c0)={0x0, 0x95a5, 0x80, 0x3, 0x18c}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) socket$tipc(0x1e, 0x2, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ff8}]}) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000fcffffff61301000000000006200e700000000009500000000000000"], 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) r7 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r7) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c30000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x12, &(0x7f0000000100), 0x1, 0x4c9, &(0x7f0000000b40)="$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") socket$pptp(0x18, 0x1, 0x2) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r8, 0x5608) 1.02688895s ago: executing program 5 (id=10228): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1214040, 0x0) mount$bind(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x20000, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) 983.764621ms ago: executing program 5 (id=10229): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000090000004200000040"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800100000400000028000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000050000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000680), 0x80c02, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r5 = socket$netlink(0x10, 0x3, 0x9) preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/64, 0x40}], 0x1, 0x7ff, 0x2) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000004c0)="1d561bb84f4fc22063a62d5b1f4a85bb12db3a0e3cb1bc1632c4649f5aa7d47d3a1c2e3fd9c6af743145ab9faac8daa9949509f9fece0e227975a8596210b31d1b5290721e25351f1ac7f175e1a85bec5fce233386cf9437de496935c63195d130abb1757e7c52f0fe734454ee961f919a5ac9fbeb76c7291a9668c9e5e91483e49884ef9126d0b3fa4304b197bfbd3ed4b935c00c19315c3f8ee001d08753710d4c746233958e525ace7ea9aba0327d0878a982a76912120507fc1723babb81b2fb64d362303e78b84aeda16e0d156d2aee07f78cf582e8341c6b6314c263b5b1f186ede58bffca712ac83f58f3c7252f35d9a0f931ffa5b291a8de1af19265") bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3, 0x0, 0x8000000005}, 0x18) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1ff) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000000100)=0x0) timer_settime(r8, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_delete(r8) socket$packet(0x11, 0x3, 0x300) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r9, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r9, &(0x7f0000000180)="10030600e0fc020004004788aa96a13bb100001100007fca1a00", 0x1a, 0x0, &(0x7f0000000140)={0x11, 0x0, r10}, 0x14) timer_settime(r8, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000080)) write$cgroup_int(r3, 0x0, 0x2) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) 930.658112ms ago: executing program 3 (id=10230): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180000"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000d40)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x8000, 0x3, {"3f8c0d6cf777eaa6ace6d3ec00ed4771"}, 0x500e, 0x0, 0xf}}}, 0xa0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000c40)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) modify_ldt$write(0x1, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x26801000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00bc"], 0x40}}, 0x0) 872.029233ms ago: executing program 2 (id=10231): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x2}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8}, &(0x7f0000010080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r2, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) 845.696514ms ago: executing program 4 (id=10232): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x200, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x1921, 0x20420}, [@IFLA_CARRIER_CHANGES={0x8, 0x23, 0x9}, @IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x8000002) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="780000001000010400"/20, @ANYRES32=r2, @ANYBLOB="60300300001400005800128009000100626f6e640000000048000280"], 0x78}}, 0x0) 814.838644ms ago: executing program 2 (id=10233): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x8040) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') preadv(r2, &(0x7f0000002540)=[{0x0}], 0x1, 0x47fff, 0x6) syz_read_part_table(0x406c, &(0x7f0000008100)="$eJzszzFKxGAQBeCXjcEogUXQShAXe4mdVW6xjZXsGaxVzE0sxQN4IkuvEMHF1aSwU1S+r5rhzQv5wx9Rb6YiydPqcS/J8SJ9267Drfd856PUnqXarWdpklwluRh/c/nwM/8OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8QrPRdjNJ6820Okx/3eW8SeqDeXJXpuqOiuwni9P1Sfm5WSbPSYokL0mW8298AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwj1yOtu1p3HxRvT9J31Vv422SYRiG8UGRV3bnmAgAGASC4JcxGJP4wBcKaKh3+5u59NK+5NdhFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYduBAAAAAAADI/7URqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqrADBzIAAAAAwvyt82g/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKwUAAP//BkAT8g==") fchdir(0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x100b28, 0x6, 0x0, 0x7, 0x8, 0x20005, 0x80, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0x122}, 0x1, 0x0, 0x0, 0x88c1}, 0x8010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x5452, &(0x7f0000000a00)={'vlan0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0xfc}}) recvmsg$unix(r5, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) close(r4) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[], 0x44}, 0x1, 0x0, 0x0, 0x24000091}, 0x4008000) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x64, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0xffffffff, 0xff}, 0x20, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x94eb2000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) gettid() 749.504936ms ago: executing program 5 (id=10234): mount$tmpfs(0x0, 0x0, &(0x7f0000000280), 0x1000000, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r1, 0x0, 0x58) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) execve(0x0, 0x0, 0x0) 681.978777ms ago: executing program 4 (id=10235): sendmsg$inet6(0xffffffffffffffff, 0x0, 0x40c0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000009e01000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x66, &(0x7f0000000b80)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x14, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x33, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21481e, &(0x7f0000000300), 0x1, 0x4f2, &(0x7f0000000600)="$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") r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000b40)={0x2, 0xd, 0x7, 0x2, 0x2c, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_lifetime={0x4, 0x3, 0x6, 0x10000, 0x3, 0xa}, @sadb_key={0x1e, 0x9, 0x740, 0x0, "7c8fd0a3b9732142f4c5d2221584f577026561cb85a6d70cc9fc1761ad0d1ba449485bdecf0c5ea387fb9a22ab2a34f89023b8fa904cba3bb52ea0d6a0cbe7708ab9d513d0b6fcd3c1c50b5d37e3d7d3aef56c1e2dc77429392c32a4f8524bfa7225ce4aad877d202c0977f6bff11c7053d83eaf31c552cb15521c11e1e9636a4d300ec065b02edc434193ad9c853c565b9e788734bb8af8a41bc08856d79dab703dc0e9ece23a5a703b485a041660b5bfc046d13df623546479ed24af9ce69fda518662065f8ef547b648cbd941d6540b34507c50f56b6461e9164253802be96670dffae4d0f3a6"}, @sadb_lifetime={0x4, 0x4, 0x915, 0x81, 0x8001, 0xf02}, @sadb_sa={0x2, 0x1, 0x4d2, 0x8, 0x9, 0xf8, 0x4, 0x60000001}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}]}, 0x160}}, 0x841) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) r6 = socket$pppl2tp(0x18, 0x1, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000b00)={0xa, 0xfdfe, 0x100007, @remote, 0xa}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) writev(r6, &(0x7f0000000180), 0x0) 672.928698ms ago: executing program 5 (id=10236): io_setup(0x3c, &(0x7f0000000000)=0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000500)='kmem_cache_free\x00', r2}, 0x18) io_submit(r0, 0x6, &(0x7f0000000880)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000000280)="88fd25c9d2e499571e2376a8d7c8a75e837703488403767e9dfbe2c7a72ea48575fb7941881683d7f90b4112ccdce5d17ca17c990a32cca17e8e28edffbd478d0441254729ace9189b82a58b69856bcf8b799d7ea257b7a59145add3f2d0b9d49ab78c683b54b08b19e7f7a3192dc986e6d9660202b4dee475beeb508778eafe115b816f84549a041bba6187d3d95dd9541a12269398d960e3e506bfc303046a279b039c31e5e56d92df1f768f56c29c836d", 0xb2, 0x7ff, 0x0, 0x4}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)="c1f1b0c88ee088547276c61d9ddf7b68dc36ce3093a60255e22efb68cf311afb40da01ccd3e2a536d0b431374c347ca98aac908b319dbb991bd7a2cfc0a6d96a3b4c995334930e8b959418b0804bc4a824b79f82cb1d30ab8496c1cf84d12faec26add42126f561a07bb45", 0x6b, 0x9, 0x0, 0x2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x9, 0xffffffffffffffff, &(0x7f0000000400)="cf1ad332ee98b350a7bebfd60d430e6bb613895bb8799b2a328d2679ccd79f52bd54fd10711a9148cd0a5d0b266cac82bae40f17274e2647a7466b9ecb2d313016e015dd308e9de3723c63a7954242ec596d3c2ebc9abbf94c3414b1543b4e6ab9885889436cd292a817a54e845bce1f88835d5dd70950ec21e7ce7838260ef927a11d8212641767711eae39743c526e3ab8cef106846e4516c79f8b4a67092f20daa053fdda0ec6a97ce1f68c49", 0xae, 0x4, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0x902c, 0xffffffffffffffff, &(0x7f00000004c0)="bc9e3a23b3605ac32bbcbd4b5247b1301e7d3e81bd6b2b4d4fd035cd257abaa92be3fd6c33848270b54e9ebab20181efd7bd1990797b9df476efe76bbf26df9010417d0fc6870415c7b1307d307269e5ff9146ceca45b549d43646b1bcb28594795efd3de1ae35ffadaa491f7cb0a2f0", 0x70, 0xfffffffffffff477, 0x0, 0x3}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, 0x101, 0xffffffffffffffff, &(0x7f00000005c0)="43db42ac17aa3763a3da1c1200", 0xd, 0xfff, 0x0, 0x2}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, &(0x7f0000000740)="f3efed68db8a8a79cb11517daa61e32be075f3188f674b08ad2de9124506837b21a57d0df5b625c2ced8f521ca45a6ac2e06978e2757c12098ad3e52247442e902cba6dc317f168292bbab2461789f98d10827e909eeb1928765e441fb4308d95cd14a65763034eea7c95de573f9c1d935de0ff21fcd0d131e1c76a02892ef52f29ecf2a01d90a8eed44caea0daf1983c272fc2217e7c12040b04bcb8dc16c337c8c01e6b4baa120c3da249d48df0e5031113bc9aae9a0b690288f0b5965274770fadefd0efa104e2db8a687cf6810ffba655e52031f0a6f712820dfae6fc8", 0xdf, 0x8888}]) 671.468708ms ago: executing program 3 (id=10237): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000280)=""/196, 0xc4, 0xfffffffffffffffe, 0x0) 648.773317ms ago: executing program 1 (id=10238): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x31ec}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x7}, {0xffff, 0xffff}, {0x0, 0xfff2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@newtfilter={0x6c, 0x2c, 0xd27, 0x70bd26, 0x8000007, {0x0, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0x1, 0xa}}, [@filter_kind_options=@f_basic={{0xa}, {0x3c, 0x2, [@TCA_BASIC_EMATCHES={0x38, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x7f, 0x1, 0x8001}, {0x8, 0x6a6, 0xffff, 0x5, 0x3, 0x2}}}, @TCF_EM_CONTAINER={0x10, 0x2, 0x0, 0x0, {{0xffff, 0x0, 0x7540}, '\"'}}]}]}]}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24008004}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) 606.216759ms ago: executing program 4 (id=10239): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8}, &(0x7f0000010080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) 586.724519ms ago: executing program 3 (id=10240): syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2102848, 0x0, 0x1, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180018110000000000000000000000000000000030169113baed6b", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket(0x1, 0x803, 0x0) bind$unix(r3, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_AUTHENTICATE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=r4, @ANYBLOB="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"], 0x88}}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r5 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4e4000000df70108d00000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_UNIMAPCLR(r6, 0x4b68, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, 0x0, 0x81c0, 0x0) pipe2(0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9, 0x0, 0x7}, 0x18) unshare(0x62040200) 561.17439ms ago: executing program 5 (id=10241): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) symlink(0x0, 0x0) 509.39352ms ago: executing program 5 (id=10242): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@type_tag={0x10, 0x0, 0x0, 0x12, 0x1}, @enum64={0x2, 0x1, 0x0, 0x13, 0x1, 0x4, [{0xb, 0xe149, 0x9}]}, @decl_tag={0xd, 0x0, 0x0, 0x11, 0x4, 0x3}]}}, &(0x7f0000000340)=""/22, 0x4e, 0x16, 0x0, 0xfffffffb}, 0x28) mmap(&(0x7f00001bc000/0x1000)=nil, 0x1000, 0x0, 0x80010, r1, 0xe0930000) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xb2570000) socketpair(0x25, 0x80000, 0x6, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ptrace$ARCH_SHSTK_UNLOCK(0x1e, 0x0, 0x6, 0x5004) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4094, 0xffe}], 0x1, 0x8, 0xd215) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sched_switch\x00', r6}, 0xe) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './bus\x00'}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000004c0)={[{@grpquota}, {@nogrpid}, {@quota}], [{@fowner_eq={'fowner', 0x3d, r7}}, {@seclabel}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@subj_type={'subj_type', 0x3d, 'ext4\x00'}}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_open_dev$sg(&(0x7f0000000380), 0x7, 0x2) unshare(0x62040200) 508.83258ms ago: executing program 1 (id=10243): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x13f, 0x2}}, 0x20) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaa"], 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007880)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000040)="af0ac9", 0x3}], 0x1}}], 0x1, 0x4000000) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000010000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5}, 0x18) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, 0x1403, 0x1, 0x70bd28, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bridge0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000038000511d25a80698c63940d0124fc602f6e35400c000200001ec00037153e370a00018025581d00d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000000)=0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r7 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x4001, 0x0, @loopback}, 0x1c) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4975e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x10008, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x20) preadv(r8, &(0x7f0000001b00)=[{&(0x7f00000009c0)=""/239, 0xef}], 0x1, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fsetxattr(r8, &(0x7f0000000400)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)='{-\x00', 0x3, 0x3) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x12, 0x2, 0x8, 0xd0eb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r10 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r10, &(0x7f0000000280)=[{&(0x7f00000005c0)="580000001400192340834b80040d8c560a06ffffff7f000000000000000058000b480400945f64009400050038925a01000000800000008004000000ff0109000000fff5dd0000000800030006010000418e01400004fcff", 0x58}], 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 508.35517ms ago: executing program 4 (id=10244): r0 = creat(&(0x7f0000000640)='./bus\x00', 0x1a8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x51}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x400, 0x100, 0x2}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={0xffffffffffffffff, &(0x7f0000000780)}, 0x20) r4 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write(r4, &(0x7f0000000180)="2cd889f0253e14", 0x7) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = getpid() bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[0x7], 0x0, 0x0, 0x1, 0x0, r6}}, 0x40) r7 = gettid() r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008000000a5"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) rt_sigaction(0x101b, 0x0, 0x0, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x18) process_vm_writev(r7, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 114.068498ms ago: executing program 1 (id=10245): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x121c02, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000003c0)={0x2, &(0x7f0000000080)=[{0x50, 0x1, 0x2, 0x6}, {0x6, 0x0, 0x3, 0x365}]}) write$ppp(r0, &(0x7f0000000400)="01fd0bd33caad4bc7fe612ad66a8916a8d5dae46e7ccb72f3c7064ec08682b64af5cc1d08cb427eaa7d55bc1b03bc6e7f1e8961db6c7c5a89e478dcbaf2ae88d20071a9c371525fff7d7601f056ac1b8e2babd75637c4072c9109322499a51ad546d592a4f2a14802e05c3aa984110b9f2d594f4414fe21f04183bf920ae981ae347c075c48f0332a2dc7d8a7b340000000000000000311f262233d16cffc8eb4d13702c9174e8ad15f857c4d2d4ef7f66850a58547880c5c15f74544aa8f754af9e1e42c65472", 0xc7) 8.68084ms ago: executing program 1 (id=10246): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x200, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x1921, 0x20420}, [@IFLA_CARRIER_CHANGES={0x8, 0x23, 0x9}, @IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x8000002) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="780000001000010400"/20, @ANYRES32=r2, @ANYBLOB="60300300001400005800128009000100626f6e640000000048000280"], 0x78}}, 0x0) 0s ago: executing program 4 (id=10247): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000090000004200000040"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800100000400000028000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000050000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000680), 0x80c02, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r5 = socket$netlink(0x10, 0x3, 0x9) preadv(r4, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/64, 0x40}], 0x1, 0x7ff, 0x2) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000004c0)="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") bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3, 0x0, 0x8000000005}, 0x18) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1ff) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000000100)=0x0) timer_settime(r8, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_delete(r8) socket$packet(0x11, 0x3, 0x300) r9 = socket$packet(0x11, 0x3, 0x300) r10 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r10, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r9, &(0x7f0000000180)="10030600e0fc020004004788aa96a13bb100001100007fca1a00", 0x1a, 0x0, &(0x7f0000000140)={0x11, 0x0, r11}, 0x14) timer_settime(r8, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000080)) write$cgroup_int(r3, 0x0, 0x2) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) kernel console output (not intermixed with test programs): parameter 'dirsync' [ 747.153945][T30354] loop9: detected capacity change from 0 to 7 [ 747.160600][T30354] Buffer I/O error on dev loop9, logical block 0, async page read [ 747.168649][T30354] Buffer I/O error on dev loop9, logical block 0, async page read [ 747.176598][T30354] loop9: unable to read partition table [ 747.187951][T30354] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 747.187951][T30354] ) failed (rc=-5) [ 747.271659][T30287] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.279187][T30287] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.315245][T30287] bridge_slave_0: entered allmulticast mode [ 747.331599][T30287] bridge_slave_0: entered promiscuous mode [ 747.344702][T30287] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.351869][T30287] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.359504][T30287] bridge_slave_1: entered allmulticast mode [ 747.366044][T30287] bridge_slave_1: entered promiscuous mode [ 747.376834][T30367] wireguard0: entered promiscuous mode [ 747.378204][T30369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8751'. [ 747.382508][T30367] wireguard0: entered allmulticast mode [ 747.458832][T30287] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 747.461821][T30287] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 747.550054][T30287] team0: Port device team_slave_0 added [ 747.570881][T30383] lo speed is unknown, defaulting to 1000 [ 747.577940][T30287] team0: Port device team_slave_1 added [ 747.609240][T30386] wireguard0: entered promiscuous mode [ 747.614790][T30386] wireguard0: entered allmulticast mode [ 747.675207][T30287] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 747.682320][T30287] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 747.708353][T30287] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 747.723300][T30287] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 747.730426][T30287] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 747.756475][T30287] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 747.769849][T30397] SELinux: policydb version 0 does not match my version range 15-35 [ 747.781356][T30397] SELinux: failed to load policy [ 747.793687][T30395] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8761'. [ 747.808957][T30287] hsr_slave_0: entered promiscuous mode [ 747.809727][T30287] hsr_slave_1: entered promiscuous mode [ 747.864787][T30395] FAULT_INJECTION: forcing a failure. [ 747.864787][T30395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 747.878106][T30395] CPU: 1 UID: 0 PID: 30395 Comm: syz.3.8761 Not tainted syzkaller #0 PREEMPT(voluntary) [ 747.878133][T30395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 747.878146][T30395] Call Trace: [ 747.878152][T30395] [ 747.878159][T30395] __dump_stack+0x1d/0x30 [ 747.878261][T30395] dump_stack_lvl+0xe8/0x140 [ 747.878307][T30395] dump_stack+0x15/0x1b [ 747.878385][T30395] should_fail_ex+0x265/0x280 [ 747.878408][T30395] should_fail+0xb/0x20 [ 747.878448][T30395] should_fail_usercopy+0x1a/0x20 [ 747.878475][T30395] _copy_from_iter+0xd2/0xe80 [ 747.878582][T30395] ? __pfx_woken_wake_function+0x10/0x10 [ 747.878614][T30395] file_tty_write+0x31d/0x690 [ 747.878732][T30395] ? __pfx_tty_write+0x10/0x10 [ 747.878764][T30395] tty_write+0x25/0x30 [ 747.878797][T30395] vfs_write+0x527/0x960 [ 747.878862][T30395] ksys_write+0xda/0x1a0 [ 747.878895][T30395] __x64_sys_write+0x40/0x50 [ 747.878931][T30395] x64_sys_call+0x2802/0x3000 [ 747.878952][T30395] do_syscall_64+0xd2/0x200 [ 747.879008][T30395] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 747.879041][T30395] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 747.879153][T30395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 747.879181][T30395] RIP: 0033:0x7f12f22beec9 [ 747.879199][T30395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 747.879222][T30395] RSP: 002b:00007f12f0d27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 747.879241][T30395] RAX: ffffffffffffffda RBX: 00007f12f2515fa0 RCX: 00007f12f22beec9 [ 747.879253][T30395] RDX: 0000000000001006 RSI: 0000200000002080 RDI: 000000000000000a [ 747.879270][T30395] RBP: 00007f12f0d27090 R08: 0000000000000000 R09: 0000000000000000 [ 747.879284][T30395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 747.879300][T30395] R13: 00007f12f2516038 R14: 00007f12f2515fa0 R15: 00007fff73b78128 [ 747.879325][T30395] [ 748.158305][T30401] netlink: 24 bytes leftover after parsing attributes in process `syz.4.8762'. [ 748.257087][T30413] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8765'. [ 748.610443][T30287] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 748.625188][T30435] SELinux: policydb version 0 does not match my version range 15-35 [ 748.630834][T30287] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 748.643644][T30435] SELinux: failed to load policy [ 748.651623][T30287] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 748.685506][T30287] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 748.735959][T30437] 9pnet_fd: Insufficient options for proto=fd [ 748.792000][T30287] 8021q: adding VLAN 0 to HW filter on device bond0 [ 748.812423][T30287] 8021q: adding VLAN 0 to HW filter on device team0 [ 748.849688][ T176] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.856872][ T176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 748.898513][ T176] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.905659][ T176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.033019][T30287] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 749.219018][T30287] veth0_vlan: entered promiscuous mode [ 749.238677][T30287] veth1_vlan: entered promiscuous mode [ 749.295739][T30287] veth0_macvtap: entered promiscuous mode [ 749.329741][T30466] vlan2: entered allmulticast mode [ 749.341747][T30466] dummy0: entered allmulticast mode [ 749.375526][T30287] veth1_macvtap: entered promiscuous mode [ 749.409333][T30287] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 749.432354][T30287] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 749.460342][T13982] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.478753][T13982] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.499935][T30472] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8782'. [ 749.509183][T30472] netlink: 16 bytes leftover after parsing attributes in process `syz.4.8782'. [ 749.525374][T13982] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.543601][T13982] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.570467][T30466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=30466 comm=syz.5.8780 [ 749.607669][T30473] rdma_rxe: rxe_newlink: failed to add lo [ 749.807676][T30486] FAULT_INJECTION: forcing a failure. [ 749.807676][T30486] name failslab, interval 1, probability 0, space 0, times 0 [ 749.820580][T30486] CPU: 1 UID: 0 PID: 30486 Comm: syz.1.8785 Not tainted syzkaller #0 PREEMPT(voluntary) [ 749.820614][T30486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 749.820638][T30486] Call Trace: [ 749.820646][T30486] [ 749.820656][T30486] __dump_stack+0x1d/0x30 [ 749.820723][T30486] dump_stack_lvl+0xe8/0x140 [ 749.820749][T30486] dump_stack+0x15/0x1b [ 749.820775][T30486] should_fail_ex+0x265/0x280 [ 749.820805][T30486] ? netdev_name_node_alt_create+0x6d/0x210 [ 749.820838][T30486] should_failslab+0x8c/0xb0 [ 749.820882][T30486] __kmalloc_cache_noprof+0x4c/0x320 [ 749.820932][T30486] netdev_name_node_alt_create+0x6d/0x210 [ 749.821015][T30486] rtnl_linkprop+0x41d/0x570 [ 749.821134][T30486] ? selinux_capable+0x31/0x40 [ 749.821236][T30486] ? security_capable+0x83/0x90 [ 749.821261][T30486] ? __pfx_rtnl_newlinkprop+0x10/0x10 [ 749.821361][T30486] rtnl_newlinkprop+0x2a/0x40 [ 749.821397][T30486] rtnetlink_rcv_msg+0x65a/0x6d0 [ 749.821437][T30486] netlink_rcv_skb+0x123/0x220 [ 749.821483][T30486] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 749.821527][T30486] rtnetlink_rcv+0x1c/0x30 [ 749.821559][T30486] netlink_unicast+0x5bd/0x690 [ 749.821586][T30486] netlink_sendmsg+0x58b/0x6b0 [ 749.821624][T30486] ? __pfx_netlink_sendmsg+0x10/0x10 [ 749.821826][T30486] __sock_sendmsg+0x142/0x180 [ 749.821867][T30486] ____sys_sendmsg+0x31e/0x4e0 [ 749.821904][T30486] ___sys_sendmsg+0x17b/0x1d0 [ 749.821982][T30486] __x64_sys_sendmsg+0xd4/0x160 [ 749.822088][T30486] x64_sys_call+0x191e/0x3000 [ 749.822113][T30486] do_syscall_64+0xd2/0x200 [ 749.822223][T30486] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 749.822250][T30486] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 749.822311][T30486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 749.822340][T30486] RIP: 0033:0x7f2ad11deec9 [ 749.822360][T30486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 749.822385][T30486] RSP: 002b:00007f2acfc3f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 749.822410][T30486] RAX: ffffffffffffffda RBX: 00007f2ad1435fa0 RCX: 00007f2ad11deec9 [ 749.822485][T30486] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000005 [ 749.822501][T30486] RBP: 00007f2acfc3f090 R08: 0000000000000000 R09: 0000000000000000 [ 749.822521][T30486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 749.822534][T30486] R13: 00007f2ad1436038 R14: 00007f2ad1435fa0 R15: 00007ffec51aac48 [ 749.822554][T30486] [ 750.088183][T30489] serio: Serial port ptm0 [ 750.114198][T30494] 9pnet_fd: Insufficient options for proto=fd [ 750.159527][T30489] 9pnet_fd: Insufficient options for proto=fd [ 750.298813][T30499] netlink: 'syz.2.8789': attribute type 30 has an invalid length. [ 750.436842][T30506] netlink: 'syz.4.8792': attribute type 30 has an invalid length. [ 750.705147][T30516] SELinux: policydb version 0 does not match my version range 15-35 [ 750.776216][T30516] SELinux: failed to load policy [ 750.868742][T30522] serio: Serial port ptm0 [ 750.892117][T30520] loop9: detected capacity change from 0 to 7 [ 750.907478][T30520] Buffer I/O error on dev loop9, logical block 0, async page read [ 750.923122][T30522] 9pnet_fd: Insufficient options for proto=fd [ 750.925640][T30520] Buffer I/O error on dev loop9, logical block 0, async page read [ 750.937706][T30520] loop9: unable to read partition table [ 750.966518][T30520] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 750.966518][T30520] ) failed (rc=-5) [ 751.013005][T30528] lo speed is unknown, defaulting to 1000 [ 751.105480][T30536] lo: entered allmulticast mode [ 751.470218][T30550] lo speed is unknown, defaulting to 1000 [ 752.198054][T30551] lo speed is unknown, defaulting to 1000 [ 752.208109][ T29] kauditd_printk_skb: 1300 callbacks suppressed [ 752.208129][ T29] audit: type=1400 audit(1007.446:121346): avc: denied { prog_load } for pid=30540 comm="syz.3.8808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 752.234200][ T29] audit: type=1400 audit(1007.446:121347): avc: denied { bpf } for pid=30540 comm="syz.3.8808" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 752.254826][ T29] audit: type=1400 audit(1007.446:121348): avc: denied { perfmon } for pid=30540 comm="syz.3.8808" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 752.275584][ T29] audit: type=1400 audit(1007.446:121349): avc: denied { bpf } for pid=30540 comm="syz.3.8808" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 752.295996][ T29] audit: type=1400 audit(1007.446:121350): avc: denied { prog_run } for pid=30540 comm="syz.3.8808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 752.315153][ T29] audit: type=1400 audit(1007.826:121351): avc: denied { prog_load } for pid=30544 comm="syz.4.8809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 752.334174][ T29] audit: type=1400 audit(1007.826:121352): avc: denied { bpf } for pid=30544 comm="syz.4.8809" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 752.355002][ T29] audit: type=1400 audit(1007.826:121353): avc: denied { perfmon } for pid=30544 comm="syz.4.8809" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 752.376242][ T29] audit: type=1400 audit(1007.826:121354): avc: denied { bpf } for pid=30544 comm="syz.4.8809" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 752.396610][ T29] audit: type=1400 audit(1007.826:121355): avc: denied { prog_run } for pid=30544 comm="syz.4.8809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 752.990183][T30576] rdma_rxe: rxe_newlink: failed to add lo [ 753.176973][T30586] SELinux: policydb version 0 does not match my version range 15-35 [ 753.195367][T30586] SELinux: failed to load policy [ 753.551677][T13613] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 753.661414][T13613] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 753.731086][T13613] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 753.791961][T13613] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 753.827796][T30610] __nla_validate_parse: 4 callbacks suppressed [ 753.827823][T30610] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8827'. [ 753.849838][T30610] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 753.857330][T30610] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 753.867634][T30612] SELinux: policydb version 0 does not match my version range 15-35 [ 753.875864][T30612] SELinux: failed to load policy [ 753.884923][T30610] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 753.892396][T30610] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 753.949159][T30614] SELinux: policydb version 0 does not match my version range 15-35 [ 753.974109][T30614] SELinux: failed to load policy [ 753.997834][T13613] bridge_slave_1: left allmulticast mode [ 754.003657][T13613] bridge_slave_1: left promiscuous mode [ 754.009449][T13613] bridge0: port 2(bridge_slave_1) entered disabled state [ 754.066366][T13613] bridge_slave_0: left allmulticast mode [ 754.072122][T13613] bridge_slave_0: left promiscuous mode [ 754.077907][T13613] bridge0: port 1(bridge_slave_0) entered disabled state [ 754.195933][T30621] openvswitch: netlink: Message has 6 unknown bytes. [ 754.243398][T13613] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 754.279663][T13613] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 754.328330][T13613] bond0 (unregistering): Released all slaves [ 754.391905][T30626] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8835'. [ 754.431652][T30626] FAULT_INJECTION: forcing a failure. [ 754.431652][T30626] name failslab, interval 1, probability 0, space 0, times 0 [ 754.444352][T30626] CPU: 1 UID: 0 PID: 30626 Comm: syz.1.8835 Not tainted syzkaller #0 PREEMPT(voluntary) [ 754.444386][T30626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 754.444422][T30626] Call Trace: [ 754.444431][T30626] [ 754.444441][T30626] __dump_stack+0x1d/0x30 [ 754.444466][T30626] dump_stack_lvl+0xe8/0x140 [ 754.444489][T30626] dump_stack+0x15/0x1b [ 754.444510][T30626] should_fail_ex+0x265/0x280 [ 754.444578][T30626] should_failslab+0x8c/0xb0 [ 754.444596][T30626] kmem_cache_alloc_node_noprof+0x57/0x320 [ 754.444625][T30626] ? __alloc_skb+0x101/0x320 [ 754.444694][T30626] __alloc_skb+0x101/0x320 [ 754.444715][T30626] netlink_ack+0xfd/0x500 [ 754.444746][T30626] netlink_rcv_skb+0x192/0x220 [ 754.444772][T30626] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 754.444846][T30626] rtnetlink_rcv+0x1c/0x30 [ 754.444880][T30626] netlink_unicast+0x5bd/0x690 [ 754.444901][T30626] netlink_sendmsg+0x58b/0x6b0 [ 754.444955][T30626] ? __pfx_netlink_sendmsg+0x10/0x10 [ 754.444982][T30626] __sock_sendmsg+0x142/0x180 [ 754.445020][T30626] ____sys_sendmsg+0x31e/0x4e0 [ 754.445060][T30626] ___sys_sendmsg+0x17b/0x1d0 [ 754.445168][T30626] __x64_sys_sendmsg+0xd4/0x160 [ 754.445242][T30626] x64_sys_call+0x191e/0x3000 [ 754.445270][T30626] do_syscall_64+0xd2/0x200 [ 754.445420][T30626] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 754.445446][T30626] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 754.445475][T30626] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 754.445500][T30626] RIP: 0033:0x7f2ad11deec9 [ 754.445515][T30626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 754.445591][T30626] RSP: 002b:00007f2acfc3f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 754.445613][T30626] RAX: ffffffffffffffda RBX: 00007f2ad1435fa0 RCX: 00007f2ad11deec9 [ 754.445625][T30626] RDX: 0000000000044004 RSI: 0000200000000040 RDI: 0000000000000003 [ 754.445637][T30626] RBP: 00007f2acfc3f090 R08: 0000000000000000 R09: 0000000000000000 [ 754.445696][T30626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 754.445712][T30626] R13: 00007f2ad1436038 R14: 00007f2ad1435fa0 R15: 00007ffec51aac48 [ 754.445734][T30626] [ 754.731898][T13613] hsr_slave_0: left promiscuous mode [ 754.743803][T13613] hsr_slave_1: left promiscuous mode [ 754.783637][T13613] veth1_macvtap: left promiscuous mode [ 754.808676][T13613] veth0_macvtap: left promiscuous mode [ 754.821395][T13613] veth1_vlan: left promiscuous mode [ 754.826674][T13613] veth0_vlan: left promiscuous mode [ 754.912204][T13613] team0 (unregistering): Port device team_slave_1 removed [ 754.930736][T13613] team0 (unregistering): Port device team_slave_0 removed [ 754.961526][T30642] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8838'. [ 754.989305][T13613] lo (unregistering): left allmulticast mode [ 755.030851][T30601] lo speed is unknown, defaulting to 1000 [ 755.209791][T30648] rdma_rxe: rxe_newlink: failed to add lo [ 755.256859][T30629] lo speed is unknown, defaulting to 1000 [ 755.279086][T13613] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 755.351949][T30664] 9pnet_fd: Insufficient options for proto=fd [ 755.363708][T30601] chnl_net:caif_netlink_parms(): no params data found [ 755.378501][T30664] netlink: 32 bytes leftover after parsing attributes in process `syz.4.8843'. [ 755.399328][T13613] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 755.486395][T13613] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 755.523459][T30601] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.530588][T30601] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.542049][T30601] bridge_slave_0: entered allmulticast mode [ 755.551074][T30601] bridge_slave_0: entered promiscuous mode [ 755.570020][T13613] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 755.591504][T30601] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.599045][T30601] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.608226][T30601] bridge_slave_1: entered allmulticast mode [ 755.615118][T30601] bridge_slave_1: entered promiscuous mode [ 755.655698][T30601] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 755.723137][T30601] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 755.733653][T13613] bridge_slave_1: left allmulticast mode [ 755.739407][T13613] bridge_slave_1: left promiscuous mode [ 755.745273][T13613] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.762362][T13613] bridge_slave_0: left allmulticast mode [ 755.768176][T13613] bridge_slave_0: left promiscuous mode [ 755.773885][T13613] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.865819][ T3407] IPVS: starting estimator thread 0... [ 755.874307][T13613] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 755.885203][T13613] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 755.897114][T13613] bond0 (unregistering): Released all slaves [ 755.922166][T30629] chnl_net:caif_netlink_parms(): no params data found [ 755.960073][T30601] team0: Port device team_slave_0 added [ 755.968409][T30678] IPVS: using max 2352 ests per chain, 117600 per kthread [ 755.980719][T30601] team0: Port device team_slave_1 added [ 756.031561][T13613] hsr_slave_0: left promiscuous mode [ 756.038657][T13613] hsr_slave_1: left promiscuous mode [ 756.044467][T13613] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 756.051937][T13613] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 756.060537][T13613] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 756.067982][T13613] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 756.085519][T13613] veth1_macvtap: left promiscuous mode [ 756.093205][T13613] veth0_macvtap: left promiscuous mode [ 756.098816][T13613] veth1_vlan: left promiscuous mode [ 756.108571][T13613] veth0_vlan: left promiscuous mode [ 756.265074][T13613] team0 (unregistering): Port device team_slave_1 removed [ 756.288011][T13613] team0 (unregistering): Port device team_slave_0 removed [ 756.351016][T30601] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 756.358278][T30601] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 756.384514][T30601] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 756.409051][T30601] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 756.416035][T30601] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 756.442213][T30601] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 756.464415][T30682] wireguard0: entered promiscuous mode [ 756.469954][T30682] wireguard0: entered allmulticast mode [ 756.504724][T30629] bridge0: port 1(bridge_slave_0) entered blocking state [ 756.511876][T30629] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.527381][T30629] bridge_slave_0: entered allmulticast mode [ 756.537379][T30629] bridge_slave_0: entered promiscuous mode [ 756.550291][T30629] bridge0: port 2(bridge_slave_1) entered blocking state [ 756.557771][T30629] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.565232][T30629] bridge_slave_1: entered allmulticast mode [ 756.571985][T30629] bridge_slave_1: entered promiscuous mode [ 756.613227][T30601] hsr_slave_0: entered promiscuous mode [ 756.619575][T30601] hsr_slave_1: entered promiscuous mode [ 756.626980][T30629] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 756.661122][T30629] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 756.720455][T30629] team0: Port device team_slave_0 added [ 756.739277][T30711] vlan2: entered allmulticast mode [ 756.744643][T30711] dummy0: entered allmulticast mode [ 756.774378][T30629] team0: Port device team_slave_1 added [ 756.823695][T30714] SELinux: policydb version 0 does not match my version range 15-35 [ 756.841011][T30714] SELinux: failed to load policy [ 756.852181][T30629] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 756.859289][T30629] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 756.885693][T30629] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 756.911817][T30629] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 756.918947][T30629] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 756.944946][T30629] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 757.032412][T30629] hsr_slave_0: entered promiscuous mode [ 757.043602][T30629] hsr_slave_1: entered promiscuous mode [ 757.057843][T30629] debugfs: 'hsr0' already exists in 'hsr' [ 757.063624][T30629] Cannot create hsr debugfs directory [ 757.180377][T30726] syz_tun: entered allmulticast mode [ 757.203276][T30726] netlink: 36 bytes leftover after parsing attributes in process `syz.1.8863'. [ 757.219260][ T29] kauditd_printk_skb: 1194 callbacks suppressed [ 757.219275][ T29] audit: type=1400 audit(1013.216:122550): avc: denied { map_create } for pid=30730 comm="syz.3.8865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 757.273069][ T29] audit: type=1400 audit(1013.236:122551): avc: denied { map_read map_write } for pid=30730 comm="syz.3.8865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 757.292781][ T29] audit: type=1400 audit(1013.246:122552): avc: denied { prog_load } for pid=30730 comm="syz.3.8865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 757.311743][ T29] audit: type=1400 audit(1013.246:122553): avc: denied { bpf } for pid=30730 comm="syz.3.8865" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 757.332250][ T29] audit: type=1400 audit(1013.246:122554): avc: denied { perfmon } for pid=30730 comm="syz.3.8865" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 757.353072][ T29] audit: type=1400 audit(1013.246:122555): avc: denied { prog_load } for pid=30730 comm="syz.3.8865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 757.372541][ T29] audit: type=1400 audit(1013.246:122556): avc: denied { prog_run } for pid=30730 comm="syz.3.8865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 757.391294][ T29] audit: type=1400 audit(1013.256:122557): avc: denied { create } for pid=30730 comm="syz.3.8865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 757.411876][ T29] audit: type=1400 audit(1013.256:122558): avc: denied { write } for pid=30730 comm="syz.3.8865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 757.432525][ T29] audit: type=1400 audit(1013.256:122559): avc: denied { prog_load } for pid=30730 comm="syz.3.8865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 757.591851][T30741] SELinux: policydb version 0 does not match my version range 15-35 [ 757.594089][T30601] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 757.600506][T30741] SELinux: failed to load policy [ 757.641719][T30601] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 757.657927][T30601] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 757.671368][T30601] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 757.726278][T30601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 757.740634][T30601] 8021q: adding VLAN 0 to HW filter on device team0 [ 757.750702][T13643] bridge0: port 1(bridge_slave_0) entered blocking state [ 757.757878][T13643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 757.767689][T30753] SELinux: policydb version 0 does not match my version range 15-35 [ 757.780034][T30753] SELinux: failed to load policy [ 757.793112][T13643] bridge0: port 2(bridge_slave_1) entered blocking state [ 757.800857][T13643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 757.815982][T30755] siw: device registration error -23 [ 757.826497][T30755] openvswitch: netlink: Message has 6 unknown bytes. [ 757.910396][T30629] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 757.929300][T30629] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 757.944087][T30629] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 757.956594][T30629] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 758.161908][T30601] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 758.192902][T30629] 8021q: adding VLAN 0 to HW filter on device bond0 [ 758.277200][T30629] 8021q: adding VLAN 0 to HW filter on device team0 [ 758.299924][T30783] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8875'. [ 758.330707][T13643] bridge0: port 1(bridge_slave_0) entered blocking state [ 758.338007][T13643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 758.378838][T30783] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 758.386432][T30783] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 758.395809][T30783] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 758.403397][T30783] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 758.426048][T30789] netlink: 36 bytes leftover after parsing attributes in process `syz.1.8878'. [ 758.458778][T13613] bridge0: port 2(bridge_slave_1) entered blocking state [ 758.466426][T13613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 758.552992][T30795] SELinux: policydb version 0 does not match my version range 15-35 [ 758.565061][T30795] SELinux: failed to load policy [ 758.840370][T30629] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 758.871398][T30601] veth0_vlan: entered promiscuous mode [ 758.879143][T30814] siw: device registration error -23 [ 758.887043][T30814] openvswitch: netlink: Message has 6 unknown bytes. [ 758.894997][T30601] veth1_vlan: entered promiscuous mode [ 758.907921][T30809] wireguard0: entered promiscuous mode [ 758.913563][T30809] wireguard0: entered allmulticast mode [ 759.011735][T30601] veth0_macvtap: entered promiscuous mode [ 759.031468][T30601] veth1_macvtap: entered promiscuous mode [ 759.119005][T30601] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 759.169310][T30601] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 759.195200][T13613] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.230731][T13613] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.250430][T13613] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.259352][T30629] veth0_vlan: entered promiscuous mode [ 759.265200][T13613] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.280855][T30629] veth1_vlan: entered promiscuous mode [ 759.308151][T30629] veth0_macvtap: entered promiscuous mode [ 759.323450][T30629] veth1_macvtap: entered promiscuous mode [ 759.359280][T30629] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 759.375457][T30629] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 759.408279][T13643] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.417060][T13643] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.455413][T13613] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.472794][T13629] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.506331][T30844] SELinux: policydb version 0 does not match my version range 15-35 [ 759.519067][T30845] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8893'. [ 759.519345][T30844] SELinux: failed to load policy [ 759.547406][T30845] bridge_slave_1: left allmulticast mode [ 759.553218][T30845] bridge_slave_1: left promiscuous mode [ 759.558990][T30845] bridge0: port 2(bridge_slave_1) entered disabled state [ 759.573107][T30845] bridge_slave_0: left allmulticast mode [ 759.578895][T30845] bridge_slave_0: left promiscuous mode [ 759.584738][T30845] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.697421][T30846] lo speed is unknown, defaulting to 1000 [ 759.802428][T30861] openvswitch: netlink: Message has 6 unknown bytes. [ 759.818923][T30857] siw: device registration error -23 [ 759.839420][T30845] devtmpfs: Unknown parameter 'dirsync' [ 760.047427][T30865] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8895'. [ 760.065110][T30874] lo speed is unknown, defaulting to 1000 [ 760.109455][T30877] 9pnet_fd: Insufficient options for proto=fd [ 760.644971][T30894] SELinux: policydb version 0 does not match my version range 15-35 [ 760.671722][T30894] SELinux: failed to load policy [ 760.885614][T30903] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8910'. [ 761.126901][T30910] syz_tun: entered allmulticast mode [ 761.162966][T30917] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8917'. [ 761.172277][T30908] wireguard0: entered promiscuous mode [ 761.177821][T30908] wireguard0: entered allmulticast mode [ 761.198527][T30910] netlink: 36 bytes leftover after parsing attributes in process `syz.4.8914'. [ 761.286608][T30923] SELinux: policydb version 0 does not match my version range 15-35 [ 761.294807][T30923] SELinux: failed to load policy [ 761.359891][T30927] rdma_rxe: rxe_newlink: failed to add lo [ 761.408317][T30929] FAULT_INJECTION: forcing a failure. [ 761.408317][T30929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 761.421551][T30929] CPU: 0 UID: 0 PID: 30929 Comm: syz.1.8921 Not tainted syzkaller #0 PREEMPT(voluntary) [ 761.421586][T30929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 761.421604][T30929] Call Trace: [ 761.421613][T30929] [ 761.421623][T30929] __dump_stack+0x1d/0x30 [ 761.421712][T30929] dump_stack_lvl+0xe8/0x140 [ 761.421737][T30929] dump_stack+0x15/0x1b [ 761.421755][T30929] should_fail_ex+0x265/0x280 [ 761.421828][T30929] should_fail+0xb/0x20 [ 761.421895][T30929] should_fail_usercopy+0x1a/0x20 [ 761.421926][T30929] _copy_from_user+0x1c/0xb0 [ 761.421963][T30929] perf_copy_attr+0x145/0x610 [ 761.421985][T30929] __se_sys_perf_event_open+0x67/0x11c0 [ 761.422097][T30929] ? vfs_write+0x7e8/0x960 [ 761.422145][T30929] ? __rcu_read_unlock+0x4f/0x70 [ 761.422249][T30929] __x64_sys_perf_event_open+0x67/0x80 [ 761.422274][T30929] x64_sys_call+0x7bd/0x3000 [ 761.422362][T30929] do_syscall_64+0xd2/0x200 [ 761.422470][T30929] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 761.422495][T30929] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 761.422523][T30929] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 761.422549][T30929] RIP: 0033:0x7f2ad11deec9 [ 761.422629][T30929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 761.422653][T30929] RSP: 002b:00007f2acfc3f038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 761.422677][T30929] RAX: ffffffffffffffda RBX: 00007f2ad1435fa0 RCX: 00007f2ad11deec9 [ 761.422694][T30929] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 761.422710][T30929] RBP: 00007f2acfc3f090 R08: 0000000000000000 R09: 0000000000000000 [ 761.422775][T30929] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 761.422791][T30929] R13: 00007f2ad1436038 R14: 00007f2ad1435fa0 R15: 00007ffec51aac48 [ 761.422815][T30929] [ 761.674114][T30934] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8923'. [ 761.986719][T30939] 9pnet_fd: Insufficient options for proto=fd [ 762.109570][T30943] SELinux: policydb version 0 does not match my version range 15-35 [ 762.127241][T30943] SELinux: failed to load policy [ 762.163028][T30941] wireguard0: entered promiscuous mode [ 762.168616][T30941] wireguard0: entered allmulticast mode [ 762.235707][ T29] kauditd_printk_skb: 1720 callbacks suppressed [ 762.235737][ T29] audit: type=1326 audit(1018.226:124280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30938 comm="syz.1.8924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2ad1211785 code=0x7ffc0000 [ 762.316944][ T29] audit: type=1400 audit(1018.306:124281): avc: denied { prog_load } for pid=30949 comm="syz.5.8927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 762.336125][ T29] audit: type=1400 audit(1018.306:124282): avc: denied { bpf } for pid=30949 comm="syz.5.8927" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 762.356425][ T29] audit: type=1400 audit(1018.306:124283): avc: denied { perfmon } for pid=30949 comm="syz.5.8927" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 762.422718][ T29] audit: type=1326 audit(1018.376:124284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30938 comm="syz.1.8924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2ad1211785 code=0x7ffc0000 [ 762.446454][ T29] audit: type=1400 audit(1018.376:124285): avc: denied { prog_load } for pid=30949 comm="syz.5.8927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 762.465596][ T29] audit: type=1326 audit(1018.376:124286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30938 comm="syz.1.8924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2ad1211785 code=0x7ffc0000 [ 762.488848][ T29] audit: type=1326 audit(1018.376:124287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30938 comm="syz.1.8924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2ad1211785 code=0x7ffc0000 [ 762.512285][ T29] audit: type=1326 audit(1018.376:124288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30938 comm="syz.1.8924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2ad1211785 code=0x7ffc0000 [ 762.536010][ T29] audit: type=1326 audit(1018.386:124289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30938 comm="syz.1.8924" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2ad1211785 code=0x7ffc0000 [ 762.682868][T30954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8208 sclass=netlink_route_socket pid=30954 comm=syz.4.8929 [ 762.768853][T30963] sch_tbf: peakrate 7 is lower than or equals to rate 7 ! [ 762.780568][T30963] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 762.804717][T30967] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8934'. [ 762.918285][T30976] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8937'. [ 762.933375][T30976] bridge_slave_1: left allmulticast mode [ 762.939268][T30976] bridge_slave_1: left promiscuous mode [ 762.945143][T30976] bridge0: port 2(bridge_slave_1) entered disabled state [ 762.956186][T30976] bridge_slave_0: left allmulticast mode [ 762.961965][T30976] bridge_slave_0: left promiscuous mode [ 762.967844][T30976] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.075167][T30976] devtmpfs: Unknown parameter 'dirsync' [ 763.284326][T30981] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8938'. [ 763.356545][T30991] vlan2: entered allmulticast mode [ 763.379962][T30991] dummy0: entered allmulticast mode [ 764.435474][T31057] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8962'. [ 764.456366][T31057] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 764.464280][T31057] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 764.479136][T31057] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 764.486593][T31057] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 764.700308][T31060] openvswitch: netlink: Message has 6 unknown bytes. [ 765.104389][T31072] sch_tbf: peakrate 7 is lower than or equals to rate 7 ! [ 765.131364][T31072] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 765.241213][T31083] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8973'. [ 765.264251][T31083] bridge_slave_1: left allmulticast mode [ 765.270092][T31083] bridge_slave_1: left promiscuous mode [ 765.275804][T31083] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.304378][T31083] bridge_slave_0: left allmulticast mode [ 765.310246][T31083] bridge_slave_0: left promiscuous mode [ 765.316084][T31083] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.469001][T31083] devtmpfs: Unknown parameter 'dirsync' [ 765.484842][T31093] siw: device registration error -23 [ 765.503060][T31093] openvswitch: netlink: Message has 6 unknown bytes. [ 765.974069][T31108] wireguard0: entered promiscuous mode [ 765.979991][T31108] wireguard0: entered allmulticast mode [ 766.120918][T31122] wireguard0: entered promiscuous mode [ 766.126806][T31122] wireguard0: entered allmulticast mode [ 766.139816][T31119] netlink: 36 bytes leftover after parsing attributes in process `syz.4.8988'. [ 766.303437][T31131] openvswitch: netlink: Message has 6 unknown bytes. [ 766.316673][T31133] SELinux: policydb version 0 does not match my version range 15-35 [ 766.350093][T31133] SELinux: failed to load policy [ 766.412921][T31139] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8984'. [ 766.438622][T31139] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 766.446060][T31139] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 766.528168][T31139] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 766.535692][T31139] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 766.549914][T31148] SELinux: policydb version 0 does not match my version range 15-35 [ 766.568991][T31148] SELinux: failed to load policy [ 766.758054][T31160] vlan2: entered allmulticast mode [ 766.763399][T31160] dummy0: entered allmulticast mode [ 767.184374][T31187] SELinux: policydb version 0 does not match my version range 15-35 [ 767.201972][T31187] SELinux: failed to load policy [ 767.239142][T31196] netlink: 36 bytes leftover after parsing attributes in process `syz.4.9016'. [ 767.261027][ T29] kauditd_printk_skb: 2396 callbacks suppressed [ 767.261046][ T29] audit: type=1400 audit(1023.256:126686): avc: denied { map_create } for pid=31197 comm="syz.5.9017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 767.286272][ T29] audit: type=1400 audit(1023.256:126687): avc: denied { map_read map_write } for pid=31197 comm="syz.5.9017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 767.377470][ T29] audit: type=1400 audit(1023.306:126688): avc: denied { map_create } for pid=31199 comm="syz.2.9018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 767.396633][ T29] audit: type=1400 audit(1023.306:126689): avc: denied { map_read map_write } for pid=31199 comm="syz.2.9018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 767.400285][T31202] vlan2: entered allmulticast mode [ 767.416424][ T29] audit: type=1400 audit(1023.306:126690): avc: denied { prog_load } for pid=31199 comm="syz.2.9018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 767.440623][ T29] audit: type=1400 audit(1023.316:126691): avc: denied { bpf } for pid=31199 comm="syz.2.9018" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 767.461048][ T29] audit: type=1400 audit(1023.316:126692): avc: denied { perfmon } for pid=31199 comm="syz.2.9018" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 767.482155][ T29] audit: type=1400 audit(1023.316:126693): avc: denied { prog_load } for pid=31199 comm="syz.2.9018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 767.501239][ T29] audit: type=1400 audit(1023.316:126694): avc: denied { prog_load } for pid=31197 comm="syz.5.9017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 767.520490][ T29] audit: type=1400 audit(1023.316:126695): avc: denied { bpf } for pid=31199 comm="syz.2.9018" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 767.695230][T31216] wireguard0: entered promiscuous mode [ 767.700907][T31216] wireguard0: entered allmulticast mode [ 767.745225][T31232] SELinux: policydb version 0 does not match my version range 15-35 [ 767.756517][T31232] SELinux: failed to load policy [ 767.815696][T31238] netlink: 36 bytes leftover after parsing attributes in process `syz.1.9031'. [ 767.859231][T31239] lo speed is unknown, defaulting to 1000 [ 767.992022][T31256] SELinux: policydb version 0 does not match my version range 15-35 [ 768.013647][T31256] SELinux: failed to load policy [ 768.089329][T31260] vlan2: entered allmulticast mode [ 768.107219][T31260] dummy0: entered allmulticast mode [ 768.146692][T31263] openvswitch: netlink: Message has 6 unknown bytes. [ 768.265720][T31270] SELinux: policydb version 0 does not match my version range 15-35 [ 768.290322][T31275] netlink: 24 bytes leftover after parsing attributes in process `syz.1.9042'. [ 768.310666][T31270] SELinux: failed to load policy [ 768.361161][T31277] syz_tun: entered allmulticast mode [ 768.381134][T31277] netlink: 36 bytes leftover after parsing attributes in process `syz.5.9044'. [ 768.734883][T31297] vlan2: entered allmulticast mode [ 768.757757][T31301] netlink: 24 bytes leftover after parsing attributes in process `syz.5.9056'. [ 768.945491][T31290] rdma_rxe: rxe_newlink: failed to add lo [ 769.028993][T31307] SELinux: policydb version 0 does not match my version range 15-35 [ 769.040104][T31307] SELinux: failed to load policy [ 769.174941][T31316] openvswitch: netlink: Message has 6 unknown bytes. [ 769.352920][T29068] block device autoloading is deprecated and will be removed. [ 769.664081][T31346] SELinux: policydb version 0 does not match my version range 15-35 [ 769.675358][T31343] openvswitch: netlink: Message has 6 unknown bytes. [ 769.679622][T31347] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9072'. [ 769.704752][T31346] SELinux: failed to load policy [ 769.755671][T31341] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9066'. [ 769.808707][T31347] devtmpfs: Unknown parameter 'dirsync' [ 770.371013][T31373] rdma_rxe: rxe_newlink: failed to add lo [ 770.406824][T31375] SELinux: policydb version 0 does not match my version range 15-35 [ 770.431979][T31375] SELinux: failed to load policy [ 771.013138][T31395] vlan2: entered allmulticast mode [ 771.018372][T31395] dummy0: entered allmulticast mode [ 771.091346][T31396] lo speed is unknown, defaulting to 1000 [ 771.358489][T31406] wireguard0: entered promiscuous mode [ 771.364024][T31406] wireguard0: entered allmulticast mode [ 771.579425][T31413] SELinux: policydb version 0 does not match my version range 15-35 [ 771.614895][T31413] SELinux: failed to load policy [ 771.673884][T31420] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9090'. [ 772.299873][ T29] kauditd_printk_skb: 1866 callbacks suppressed [ 772.299891][ T29] audit: type=1326 audit(1028.296:128517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31447 comm="syz.5.9104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e5158eec9 code=0x7ffc0000 [ 772.357529][T31444] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9101'. [ 772.381081][T31438] FAULT_INJECTION: forcing a failure. [ 772.381081][T31438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.381175][T31438] CPU: 1 UID: 0 PID: 31438 Comm: syz.1.9099 Not tainted syzkaller #0 PREEMPT(voluntary) [ 772.381255][T31438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 772.381268][T31438] Call Trace: [ 772.381274][T31438] [ 772.381281][T31438] __dump_stack+0x1d/0x30 [ 772.381352][T31438] dump_stack_lvl+0xe8/0x140 [ 772.381375][T31438] dump_stack+0x15/0x1b [ 772.381390][T31438] should_fail_ex+0x265/0x280 [ 772.381413][T31438] should_fail+0xb/0x20 [ 772.381497][T31438] should_fail_usercopy+0x1a/0x20 [ 772.381529][T31438] _copy_from_user+0x1c/0xb0 [ 772.381566][T31438] ___sys_sendmsg+0xc1/0x1d0 [ 772.381604][T31438] __x64_sys_sendmsg+0xd4/0x160 [ 772.381711][T31438] x64_sys_call+0x191e/0x3000 [ 772.381811][T31438] do_syscall_64+0xd2/0x200 [ 772.381840][T31438] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 772.381870][T31438] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 772.381908][T31438] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 772.381985][T31438] RIP: 0033:0x7f2ad11deec9 [ 772.382013][T31438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 772.382037][T31438] RSP: 002b:00007f2acfc1e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 772.382061][T31438] RAX: ffffffffffffffda RBX: 00007f2ad1436090 RCX: 00007f2ad11deec9 [ 772.382074][T31438] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 772.382145][T31438] RBP: 00007f2acfc1e090 R08: 0000000000000000 R09: 0000000000000000 [ 772.382161][T31438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 772.382177][T31438] R13: 00007f2ad1436128 R14: 00007f2ad1436090 R15: 00007ffec51aac48 [ 772.382201][T31438] [ 772.406390][ T29] audit: type=1326 audit(1028.296:128518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31447 comm="syz.5.9104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e5158eec9 code=0x7ffc0000 [ 772.406430][ T29] audit: type=1326 audit(1028.326:128519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31447 comm="syz.5.9104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8e5158eec9 code=0x7ffc0000 [ 772.406463][ T29] audit: type=1400 audit(1028.326:128520): avc: denied { prog_load } for pid=31447 comm="syz.5.9104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 772.406536][ T29] audit: type=1400 audit(1028.326:128521): avc: denied { bpf } for pid=31447 comm="syz.5.9104" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 772.406567][ T29] audit: type=1326 audit(1028.326:128522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31447 comm="syz.5.9104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e5158eec9 code=0x7ffc0000 [ 772.406596][ T29] audit: type=1326 audit(1028.326:128523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31447 comm="syz.5.9104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e5158eec9 code=0x7ffc0000 [ 772.406630][ T29] audit: type=1326 audit(1028.326:128524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31447 comm="syz.5.9104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8e5158eec9 code=0x7ffc0000 [ 772.406716][ T29] audit: type=1326 audit(1028.326:128525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31447 comm="syz.5.9104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e5158eec9 code=0x7ffc0000 [ 772.406751][ T29] audit: type=1326 audit(1028.326:128526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31447 comm="syz.5.9104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e5158eec9 code=0x7ffc0000 [ 772.775252][T31453] vlan2: entered allmulticast mode [ 773.213916][T31469] netlink: 44 bytes leftover after parsing attributes in process `syz.2.9111'. [ 773.677814][T31498] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9121'. [ 773.687769][T31498] bridge_slave_1: left allmulticast mode [ 773.693484][T31498] bridge_slave_1: left promiscuous mode [ 773.699208][T31498] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.708765][T31498] bridge_slave_0: left allmulticast mode [ 773.714530][T31498] bridge_slave_0: left promiscuous mode [ 773.720374][T31498] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.763244][T31504] openvswitch: netlink: Message has 6 unknown bytes. [ 773.815364][T31502] devtmpfs: Unknown parameter 'dirsync' [ 774.300512][T31536] 9pnet_fd: Insufficient options for proto=fd [ 774.363823][T31532] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9132'. [ 774.496427][T31542] netlink: 104 bytes leftover after parsing attributes in process `syz.3.9131'. [ 774.780694][T31559] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9144'. [ 774.973877][T31565] netlink: 24 bytes leftover after parsing attributes in process `syz.1.9146'. [ 775.117979][T29068] block device autoloading is deprecated and will be removed. [ 775.149945][T31575] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9150'. [ 775.174062][T31575] loop1: detected capacity change from 0 to 1024 [ 775.185457][T31575] EXT4-fs error (device loop1): ext4_acquire_dquot:6943: comm syz.1.9150: Failed to acquire dquot type 0 [ 775.196980][T31577] netlink: 44 bytes leftover after parsing attributes in process `syz.4.9151'. [ 775.201131][T31575] EXT4-fs error (device loop1): mb_free_blocks:2017: group 0, inode 13: block 144:freeing already freed block (bit 9); block bitmap corrupt. [ 775.222159][T31575] EXT4-fs error (device loop1): ext4_do_update_inode:5653: inode #13: comm syz.1.9150: corrupted inode contents [ 775.234399][T31575] EXT4-fs error (device loop1): ext4_dirty_inode:6538: inode #13: comm syz.1.9150: mark_inode_dirty error [ 775.246564][T31575] EXT4-fs error (device loop1): ext4_do_update_inode:5653: inode #13: comm syz.1.9150: corrupted inode contents [ 775.261227][T31575] EXT4-fs error (device loop1): __ext4_ext_dirty:206: inode #13: comm syz.1.9150: mark_inode_dirty error [ 775.273173][T31575] EXT4-fs error (device loop1): ext4_do_update_inode:5653: inode #13: comm syz.1.9150: corrupted inode contents [ 775.285737][T31575] EXT4-fs error (device loop1) in ext4_orphan_del:305: Corrupt filesystem [ 775.294567][T31575] EXT4-fs error (device loop1): ext4_do_update_inode:5653: inode #13: comm syz.1.9150: corrupted inode contents [ 775.307081][T31575] EXT4-fs error (device loop1): ext4_truncate:4666: inode #13: comm syz.1.9150: mark_inode_dirty error [ 775.320061][T31575] EXT4-fs error (device loop1) in ext4_process_orphan:347: Corrupt filesystem [ 775.329896][T31582] wireguard0: entered promiscuous mode [ 775.330277][T31575] EXT4-fs (loop1): 1 truncate cleaned up [ 775.335427][T31582] wireguard0: entered allmulticast mode [ 775.342388][T31575] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 775.390283][T31575] devtmpfs: Unknown parameter 'dirsync' [ 775.398117][T31575] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 775.422138][T29068] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 775.591691][T31591] loop1: detected capacity change from 0 to 512 [ 775.607481][T31591] EXT4-fs: Ignoring removed orlov option [ 775.613880][T31591] EXT4-fs (loop1): mounting ext3 file system using the ext4 subsystem [ 775.639911][T31591] EXT4-fs error (device loop1): ext4_iget_extra_inode:5104: inode #15: comm syz.1.9155: corrupted in-inode xattr: e_value size too large [ 775.676096][T31591] EXT4-fs error (device loop1): ext4_orphan_get:1397: comm syz.1.9155: couldn't read orphan inode 15 (err -117) [ 775.693641][T31591] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 775.752286][T31593] IPv4: Oversized IP packet from 127.202.26.0 [ 775.829375][T31612] 9pnet_fd: Insufficient options for proto=fd [ 775.845873][T31613] vlan2: entered allmulticast mode [ 775.876302][T29068] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 776.236900][T31636] SELinux: policydb version 0 does not match my version range 15-35 [ 776.296987][T31636] SELinux: failed to load policy [ 776.786376][T31672] lo speed is unknown, defaulting to 1000 [ 777.278929][T31689] SELinux: policydb version 0 does not match my version range 15-35 [ 777.297820][T31689] SELinux: failed to load policy [ 777.307196][ T29] kauditd_printk_skb: 1818 callbacks suppressed [ 777.307219][ T29] audit: type=1400 audit(1033.296:130343): avc: denied { create } for pid=31690 comm="syz.4.9193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 777.356591][ T29] audit: type=1400 audit(1033.306:130344): avc: denied { write } for pid=31690 comm="syz.4.9193" path="socket:[115927]" dev="sockfs" ino=115927 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 777.381078][ T29] audit: type=1400 audit(1033.306:130345): avc: denied { read write } for pid=29068 comm="syz-executor" name="loop1" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 777.404744][ T29] audit: type=1400 audit(1033.306:130346): avc: denied { open } for pid=29068 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 777.427836][ T29] audit: type=1400 audit(1033.306:130347): avc: denied { ioctl } for pid=29068 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=689 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 777.497190][ T29] audit: type=1400 audit(1033.376:130348): avc: denied { open } for pid=31693 comm="syz.4.9194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 777.516392][ T29] audit: type=1400 audit(1033.376:130349): avc: denied { perfmon } for pid=31693 comm="syz.4.9194" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 777.537187][ T29] audit: type=1400 audit(1033.376:130350): avc: denied { kernel } for pid=31693 comm="syz.4.9194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 777.556458][ T29] audit: type=1400 audit(1033.426:130351): avc: denied { create } for pid=31692 comm="syz.1.9190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 777.575994][ T29] audit: type=1400 audit(1033.426:130352): avc: denied { prog_load } for pid=31692 comm="syz.1.9190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 777.643850][T31704] __nla_validate_parse: 1 callbacks suppressed [ 777.643867][T31704] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9198'. [ 777.846195][T31716] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9203'. [ 778.124051][T31737] SELinux: policydb version 0 does not match my version range 15-35 [ 778.161905][T31737] SELinux: failed to load policy [ 778.312414][T31755] 9pnet_fd: Insufficient options for proto=fd [ 778.556351][T31765] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9221'. [ 778.685135][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9218'. [ 778.811533][T31773] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9222'. [ 778.889674][T31773] devtmpfs: Unknown parameter 'dirsync' [ 779.115726][T31783] SELinux: policydb version 0 does not match my version range 15-35 [ 779.140359][T31783] SELinux: failed to load policy [ 779.274026][T31792] wireguard0: entered promiscuous mode [ 779.279598][T31792] wireguard0: entered allmulticast mode [ 779.432007][T31808] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9237'. [ 779.499446][T31808] devtmpfs: Unknown parameter 'dirsync' [ 779.644677][T31811] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9235'. [ 779.690337][T31822] SELinux: policydb version 0 does not match my version range 15-35 [ 779.698719][T31822] SELinux: failed to load policy [ 779.925288][T31837] lo speed is unknown, defaulting to 1000 [ 779.998134][ T3407] IPVS: starting estimator thread 0... [ 780.005173][T31836] IPVS: ovf: UDP 224.0.0.2:0 - no destination available [ 780.097178][T31843] IPVS: using max 2352 ests per chain, 117600 per kthread [ 780.278067][T31854] openvswitch: netlink: Message has 6 unknown bytes. [ 780.352281][T31863] SELinux: policydb version 0 does not match my version range 15-35 [ 780.397297][T31863] SELinux: failed to load policy [ 780.414907][T31865] netlink: 24 bytes leftover after parsing attributes in process `syz.1.9257'. [ 780.838245][T31888] lo speed is unknown, defaulting to 1000 [ 781.295988][T31890] wireguard0: entered promiscuous mode [ 781.301673][T31890] wireguard0: entered allmulticast mode [ 781.398215][T31899] netlink: 'syz.5.9271': attribute type 12 has an invalid length. [ 781.659716][T31910] rdma_rxe: rxe_newlink: failed to add lo [ 781.856783][T31906] loop1: detected capacity change from 0 to 512 [ 781.886966][T31906] EXT4-fs error (device loop1): ext4_orphan_get:1418: comm syz.1.9274: bad orphan inode 11 [ 781.967487][T31920] SELinux: policydb version 0 does not match my version range 15-35 [ 781.977670][T31906] ext4_test_bit(bit=10, block=4) = 1 [ 781.983115][T31906] is_bad_inode(inode)=0 [ 781.987332][T31906] NEXT_ORPHAN(inode)=2080374784 [ 781.992199][T31906] max_ino=32 [ 781.995430][T31906] i_nlink=0 [ 782.028113][T31920] SELinux: failed to load policy [ 782.063555][T31906] EXT4-fs (loop1): 1 truncate cleaned up [ 782.106999][T31906] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 782.162187][T31906] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 782.328847][ T29] kauditd_printk_skb: 1599 callbacks suppressed [ 782.328866][ T29] audit: type=1326 audit(1038.326:131952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31927 comm="syz.1.9279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ad11deec9 code=0x7ffc0000 [ 782.358625][ T29] audit: type=1326 audit(1038.326:131953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31927 comm="syz.1.9279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ad11deec9 code=0x7ffc0000 [ 782.457206][ T29] audit: type=1326 audit(1038.326:131954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31927 comm="syz.1.9279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2ad11deec9 code=0x7ffc0000 [ 782.481229][ T29] audit: type=1400 audit(1038.326:131955): avc: denied { map_create } for pid=31927 comm="syz.1.9279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 782.500640][ T29] audit: type=1400 audit(1038.326:131956): avc: denied { bpf } for pid=31927 comm="syz.1.9279" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 782.521122][ T29] audit: type=1400 audit(1038.326:131957): avc: denied { map_read map_write } for pid=31927 comm="syz.1.9279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 782.541293][ T29] audit: type=1326 audit(1038.326:131958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31927 comm="syz.1.9279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ad11deec9 code=0x7ffc0000 [ 782.564577][ T29] audit: type=1326 audit(1038.326:131959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31927 comm="syz.1.9279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ad11deec9 code=0x7ffc0000 [ 782.587967][ T29] audit: type=1326 audit(1038.326:131960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31927 comm="syz.1.9279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2ad11deec9 code=0x7ffc0000 [ 782.611184][ T29] audit: type=1326 audit(1038.326:131961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31927 comm="syz.1.9279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2ad11deec9 code=0x7ffc0000 [ 782.939799][T31945] lo speed is unknown, defaulting to 1000 [ 783.113063][T31944] netlink: 36 bytes leftover after parsing attributes in process `syz.1.9287'. [ 783.410335][T31952] wireguard0: entered promiscuous mode [ 783.416121][T31952] wireguard0: entered allmulticast mode [ 784.129949][T31987] 9pnet_fd: Insufficient options for proto=fd [ 784.506078][T32004] lo speed is unknown, defaulting to 1000 [ 785.117305][T32017] netlink: 24 bytes leftover after parsing attributes in process `syz.5.9313'. [ 785.426560][T32033] SELinux: policydb version 0 does not match my version range 15-35 [ 785.452703][T32033] SELinux: failed to load policy [ 785.533288][T32030] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9315'. [ 785.579588][T32044] openvswitch: netlink: Message has 6 unknown bytes. [ 785.703589][T32051] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9326'. [ 785.825610][T32051] devtmpfs: Unknown parameter 'dirsync' [ 785.942628][T32066] SELinux: policydb version 0 does not match my version range 15-35 [ 785.964915][T32066] SELinux: failed to load policy [ 786.076562][T32077] loop1: detected capacity change from 0 to 512 [ 786.096145][T32077] EXT4-fs (loop1): too many log groups per flexible block group [ 786.104060][T32077] EXT4-fs (loop1): failed to initialize mballoc (-12) [ 786.118146][T32077] EXT4-fs (loop1): mount failed [ 786.285000][T32091] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9344'. [ 786.361183][T32098] openvswitch: netlink: Message has 6 unknown bytes. [ 786.412936][T32105] SELinux: policydb version 0 does not match my version range 15-35 [ 786.434936][T32105] SELinux: failed to load policy [ 786.726969][T32132] SELinux: policydb version 0 does not match my version range 15-35 [ 786.735199][T32132] SELinux: failed to load policy [ 786.767413][T32136] SELinux: policydb version 0 does not match my version range 15-35 [ 786.776242][T32136] SELinux: failed to load policy [ 786.782753][T32137] SELinux: policydb version 0 does not match my version range 15-35 [ 786.799332][T32137] SELinux: failed to load policy [ 787.135778][T32163] SELinux: policydb version 0 does not match my version range 15-35 [ 787.148689][T32163] SELinux: failed to load policy [ 787.229186][T32165] SELinux: policydb version 0 does not match my version range 15-35 [ 787.264155][T32165] SELinux: failed to load policy [ 787.337744][ T29] kauditd_printk_skb: 1870 callbacks suppressed [ 787.337785][ T29] audit: type=1400 audit(1043.336:133832): avc: denied { create } for pid=32180 comm="syz.2.9381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 787.372905][T32181] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9381'. [ 787.385937][ T29] audit: type=1326 audit(1043.336:133833): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32176 comm="syz.4.9379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f0f6e22ef57 code=0x7ffc0000 [ 787.409591][ T29] audit: type=1326 audit(1043.336:133834): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32176 comm="syz.4.9379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0f6e22d710 code=0x7ffc0000 [ 787.433741][ T29] audit: type=1326 audit(1043.336:133835): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32176 comm="syz.4.9379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f0f6e22db2a code=0x7ffc0000 [ 787.457294][ T29] audit: type=1326 audit(1043.336:133836): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32176 comm="syz.4.9379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f6e22eec9 code=0x7ffc0000 [ 787.481212][ T29] audit: type=1326 audit(1043.336:133837): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32176 comm="syz.4.9379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f6e22eec9 code=0x7ffc0000 [ 787.485525][T32186] devtmpfs: Unknown parameter 'dirsync' [ 787.504906][ T29] audit: type=1326 audit(1043.336:133838): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32176 comm="syz.4.9379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f0f6e22eec9 code=0x7ffc0000 [ 787.534599][ T29] audit: type=1400 audit(1043.336:133839): avc: denied { write } for pid=32176 comm="syz.4.9379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 787.550741][T32178] audit: audit_backlog=65 > audit_backlog_limit=64 [ 787.554066][ T29] audit: type=1326 audit(1043.336:133840): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32176 comm="syz.4.9379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f6e22eec9 code=0x7ffc0000 [ 787.767652][T32203] SELinux: policydb version 0 does not match my version range 15-35 [ 787.777537][T32203] SELinux: failed to load policy [ 787.856591][T32212] SELinux: policydb version 0 does not match my version range 15-35 [ 787.879407][T32212] SELinux: failed to load policy [ 788.305441][T32255] SELinux: policydb version 0 does not match my version range 15-35 [ 788.333986][T32252] wireguard0: entered promiscuous mode [ 788.339650][T32252] wireguard0: entered allmulticast mode [ 788.646082][T32281] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9424'. [ 788.696598][T32281] devtmpfs: Unknown parameter 'dirsync' [ 788.778670][T32285] block device autoloading is deprecated and will be removed. [ 788.997255][T32299] wireguard0: entered promiscuous mode [ 789.002886][T32299] wireguard0: entered allmulticast mode [ 789.195701][T32322] SELinux: Context A)t'*'ĺkشL&z [ 789.195701][T32322] : is not valid (left unmapped). [ 789.580068][T32351] netlink: 36 bytes leftover after parsing attributes in process `syz.1.9453'. [ 789.623455][T32354] SELinux: policydb version 0 does not match my version range 15-35 [ 789.884850][T32373] openvswitch: netlink: Message has 6 unknown bytes. [ 790.001786][T32375] wireguard0: entered promiscuous mode [ 790.007364][T32375] wireguard0: entered allmulticast mode [ 790.139831][T32387] rdma_rxe: rxe_newlink: failed to add lo [ 790.282423][T32394] FAULT_INJECTION: forcing a failure. [ 790.282423][T32394] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 790.295571][T32394] CPU: 0 UID: 0 PID: 32394 Comm: syz.2.9468 Not tainted syzkaller #0 PREEMPT(voluntary) [ 790.295679][T32394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 790.295691][T32394] Call Trace: [ 790.295699][T32394] [ 790.295709][T32394] __dump_stack+0x1d/0x30 [ 790.295735][T32394] dump_stack_lvl+0xe8/0x140 [ 790.295819][T32394] dump_stack+0x15/0x1b [ 790.295835][T32394] should_fail_ex+0x265/0x280 [ 790.295858][T32394] should_fail+0xb/0x20 [ 790.295879][T32394] should_fail_usercopy+0x1a/0x20 [ 790.295945][T32394] _copy_to_user+0x20/0xa0 [ 790.295992][T32394] simple_read_from_buffer+0xb5/0x130 [ 790.296034][T32394] proc_fail_nth_read+0x10e/0x150 [ 790.296103][T32394] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 790.296180][T32394] vfs_read+0x1a5/0x770 [ 790.296220][T32394] ? __rcu_read_unlock+0x4f/0x70 [ 790.296249][T32394] ? __fget_files+0x184/0x1c0 [ 790.296323][T32394] ? __sys_setsockopt+0x18e/0x200 [ 790.296348][T32394] ksys_read+0xda/0x1a0 [ 790.296460][T32394] __x64_sys_read+0x40/0x50 [ 790.296491][T32394] x64_sys_call+0x27c0/0x3000 [ 790.296512][T32394] do_syscall_64+0xd2/0x200 [ 790.296640][T32394] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 790.296735][T32394] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 790.296794][T32394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 790.296817][T32394] RIP: 0033:0x7f87bdb7d8dc [ 790.296836][T32394] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 790.296860][T32394] RSP: 002b:00007f87bc5df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 790.296884][T32394] RAX: ffffffffffffffda RBX: 00007f87bddd5fa0 RCX: 00007f87bdb7d8dc [ 790.296900][T32394] RDX: 000000000000000f RSI: 00007f87bc5df0a0 RDI: 0000000000000007 [ 790.296967][T32394] RBP: 00007f87bc5df090 R08: 0000000000000000 R09: 0000000000000000 [ 790.296983][T32394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 790.296998][T32394] R13: 00007f87bddd6038 R14: 00007f87bddd5fa0 R15: 00007fffb904b258 [ 790.297022][T32394] [ 790.667728][T32401] SELinux: policydb version 0 does not match my version range 15-35 [ 790.693174][T32401] sel_write_load: 2 callbacks suppressed [ 790.693190][T32401] SELinux: failed to load policy [ 790.856556][T32411] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9475'. [ 791.101914][T32436] netlink: 88 bytes leftover after parsing attributes in process `syz.1.9488'. [ 791.371451][T32453] 9pnet_fd: Insufficient options for proto=fd [ 791.383205][T32455] FAULT_INJECTION: forcing a failure. [ 791.383205][T32455] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 791.396772][T32455] CPU: 1 UID: 0 PID: 32455 Comm: syz.1.9495 Not tainted syzkaller #0 PREEMPT(voluntary) [ 791.396816][T32455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 791.396832][T32455] Call Trace: [ 791.396841][T32455] [ 791.396851][T32455] __dump_stack+0x1d/0x30 [ 791.396875][T32455] dump_stack_lvl+0xe8/0x140 [ 791.396896][T32455] dump_stack+0x15/0x1b [ 791.396953][T32455] should_fail_ex+0x265/0x280 [ 791.396975][T32455] should_fail_alloc_page+0xf2/0x100 [ 791.396995][T32455] __alloc_frozen_pages_noprof+0xff/0x360 [ 791.397089][T32455] alloc_pages_mpol+0xb3/0x250 [ 791.397129][T32455] alloc_pages_noprof+0x90/0x130 [ 791.397162][T32455] __pmd_alloc+0x47/0x470 [ 791.397204][T32455] handle_mm_fault+0x19d4/0x2c20 [ 791.397306][T32455] ? __rcu_read_unlock+0x4f/0x70 [ 791.397337][T32455] do_user_addr_fault+0x3fe/0x1080 [ 791.397362][T32455] exc_page_fault+0x62/0xa0 [ 791.397428][T32455] asm_exc_page_fault+0x26/0x30 [ 791.397448][T32455] RIP: 0010:rep_movs_alternative+0xf/0x90 [ 791.397470][T32455] Code: c4 10 e9 44 f9 01 00 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 83 f9 40 73 44 83 f9 08 73 25 85 c9 74 0f <8a> 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 0d f9 01 00 66 2e [ 791.397488][T32455] RSP: 0018:ffffc9000586fe18 EFLAGS: 00050202 [ 791.397504][T32455] RAX: ffff888102354ca0 RBX: 0000000000000004 RCX: 0000000000000004 [ 791.397582][T32455] RDX: 0000000000000001 RSI: 0000200000000000 RDI: ffffc9000586fe54 [ 791.397598][T32455] RBP: 0000000000000000 R08: 0000000000000590 R09: 0000000000000000 [ 791.397613][T32455] R10: 0001c9000586fe54 R11: 0001c9000586fe57 R12: 0000000000000000 [ 791.397625][T32455] R13: ffff8881198356c0 R14: ffffc9000586fe54 R15: 0000200000000000 [ 791.397692][T32455] _copy_from_user+0x6f/0xb0 [ 791.397727][T32455] do_sock_getsockopt+0xf1/0x240 [ 791.397753][T32455] __x64_sys_getsockopt+0x11e/0x1a0 [ 791.397807][T32455] x64_sys_call+0x2bca/0x3000 [ 791.397835][T32455] do_syscall_64+0xd2/0x200 [ 791.397880][T32455] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 791.397907][T32455] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 791.397945][T32455] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 791.397970][T32455] RIP: 0033:0x7f2ad11deec9 [ 791.397988][T32455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 791.398032][T32455] RSP: 002b:00007f2acfc3f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 791.398058][T32455] RAX: ffffffffffffffda RBX: 00007f2ad1435fa0 RCX: 00007f2ad11deec9 [ 791.398072][T32455] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000003 [ 791.398083][T32455] RBP: 00007f2acfc3f090 R08: 0000200000000000 R09: 0000000000000000 [ 791.398095][T32455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.398110][T32455] R13: 00007f2ad1436038 R14: 00007f2ad1435fa0 R15: 00007ffec51aac48 [ 791.398130][T32455] [ 791.934912][T32466] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9497'. [ 791.985554][T32466] devtmpfs: Unknown parameter 'dirsync' [ 792.352274][ T29] kauditd_printk_skb: 2049 callbacks suppressed [ 792.352291][ T29] audit: type=1400 audit(1048.346:135888): avc: denied { prog_load } for pid=32493 comm="syz.3.9511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 792.377719][ T29] audit: type=1400 audit(1048.346:135889): avc: denied { bpf } for pid=32493 comm="syz.3.9511" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 792.398176][ T29] audit: type=1400 audit(1048.346:135890): avc: denied { perfmon } for pid=32493 comm="syz.3.9511" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 792.418935][ T29] audit: type=1400 audit(1048.346:135891): avc: denied { bpf } for pid=32493 comm="syz.3.9511" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 792.442014][ T29] audit: type=1400 audit(1048.436:135892): avc: denied { prog_load } for pid=32493 comm="syz.3.9511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 792.460911][ T29] audit: type=1400 audit(1048.436:135893): avc: denied { bpf } for pid=32493 comm="syz.3.9511" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 792.481305][ T29] audit: type=1400 audit(1048.436:135894): avc: denied { perfmon } for pid=32493 comm="syz.3.9511" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 792.508027][ T29] audit: type=1326 audit(1048.446:135895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32476 comm="syz.4.9505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f6e22eec9 code=0x7ffc0000 [ 792.531665][ T29] audit: type=1326 audit(1048.446:135896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32476 comm="syz.4.9505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f6e22eec9 code=0x7ffc0000 [ 792.555001][ T29] audit: type=1326 audit(1048.446:135897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32491 comm="syz.2.9510" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87bdb7eec9 code=0x7ffc0000 [ 792.973651][T32510] 9pnet_fd: Insufficient options for proto=fd [ 793.384625][T32518] rdma_rxe: rxe_newlink: failed to add lo [ 793.724223][T32530] openvswitch: netlink: Message has 6 unknown bytes. [ 793.857970][T32537] siw: device registration error -23 [ 793.880654][T32537] openvswitch: netlink: Message has 6 unknown bytes. [ 794.080762][T32547] openvswitch: netlink: Message has 6 unknown bytes. [ 794.289644][T32557] 9pnet_fd: Insufficient options for proto=fd [ 794.776689][T32567] netlink: 36 bytes leftover after parsing attributes in process `syz.5.9537'. [ 795.220256][T32584] wireguard0: entered promiscuous mode [ 795.225921][T32584] wireguard0: entered allmulticast mode [ 795.326726][T32594] lo speed is unknown, defaulting to 1000 [ 795.683434][T32598] openvswitch: netlink: Message has 6 unknown bytes. [ 795.826143][T32600] netlink: 24 bytes leftover after parsing attributes in process `syz.5.9549'. [ 795.896666][T32605] netlink: 72 bytes leftover after parsing attributes in process `syz.5.9552'. [ 796.224868][T32620] netdevsim netdevsim5 netdevsim0: entered allmulticast mode [ 796.235769][T32621] 9pnet_fd: Insufficient options for proto=fd [ 796.260359][T32620] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 796.390811][T32620] program syz.5.9556 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 796.747797][T32632] openvswitch: netlink: Message has 6 unknown bytes. [ 796.949953][T32644] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9565'. [ 796.989372][T32644] devtmpfs: Unknown parameter 'dirsync' [ 797.217301][T32649] lo speed is unknown, defaulting to 1000 [ 797.985889][T32651] lo speed is unknown, defaulting to 1000 [ 798.033305][ T29] kauditd_printk_skb: 1125 callbacks suppressed [ 798.033327][ T29] audit: type=1400 audit(1053.076:137023): avc: denied { execmem } for pid=32645 comm="syz.3.9566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 798.059155][ T29] audit: type=1400 audit(1053.196:137024): avc: denied { prog_load } for pid=32638 comm="syz.1.9563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 798.078093][ T29] audit: type=1400 audit(1053.196:137025): avc: denied { bpf } for pid=32638 comm="syz.1.9563" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 798.098813][ T29] audit: type=1400 audit(1053.196:137026): avc: denied { perfmon } for pid=32638 comm="syz.1.9563" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 798.119470][ T29] audit: type=1400 audit(1053.196:137027): avc: denied { prog_run } for pid=32638 comm="syz.1.9563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 798.138764][ T29] audit: type=1400 audit(1053.576:137028): avc: denied { prog_load } for pid=32645 comm="syz.3.9566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 798.157789][ T29] audit: type=1400 audit(1053.576:137029): avc: denied { bpf } for pid=32645 comm="syz.3.9566" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 798.178323][ T29] audit: type=1400 audit(1053.576:137030): avc: denied { perfmon } for pid=32645 comm="syz.3.9566" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 798.199059][ T29] audit: type=1400 audit(1053.576:137031): avc: denied { prog_run } for pid=32645 comm="syz.3.9566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 798.251032][ T29] audit: type=1400 audit(1054.096:137032): avc: denied { prog_load } for pid=32648 comm="syz.4.9567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 798.921696][T32664] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9569'. [ 799.236645][T32689] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9578'. [ 799.349956][T32698] lo speed is unknown, defaulting to 1000 [ 799.714324][T32716] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9588'. [ 799.904406][T32724] FAULT_INJECTION: forcing a failure. [ 799.904406][T32724] name failslab, interval 1, probability 0, space 0, times 0 [ 799.917360][T32724] CPU: 1 UID: 0 PID: 32724 Comm: syz.3.9591 Not tainted syzkaller #0 PREEMPT(voluntary) [ 799.917473][T32724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 799.917489][T32724] Call Trace: [ 799.917498][T32724] [ 799.917509][T32724] __dump_stack+0x1d/0x30 [ 799.917614][T32724] dump_stack_lvl+0xe8/0x140 [ 799.917713][T32724] dump_stack+0x15/0x1b [ 799.917728][T32724] should_fail_ex+0x265/0x280 [ 799.917758][T32724] should_failslab+0x8c/0xb0 [ 799.917858][T32724] kmem_cache_alloc_noprof+0x50/0x310 [ 799.917887][T32724] ? audit_log_start+0x342/0x720 [ 799.917930][T32724] audit_log_start+0x342/0x720 [ 799.917970][T32724] ? kstrtouint+0x76/0xc0 [ 799.918030][T32724] audit_seccomp+0x48/0x100 [ 799.918058][T32724] ? __seccomp_filter+0x82d/0x1250 [ 799.918108][T32724] __seccomp_filter+0x83e/0x1250 [ 799.918139][T32724] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 799.918217][T32724] ? vfs_write+0x7e8/0x960 [ 799.918257][T32724] ? __rcu_read_unlock+0x4f/0x70 [ 799.918304][T32724] ? __fget_files+0x184/0x1c0 [ 799.918326][T32724] __secure_computing+0x82/0x150 [ 799.918350][T32724] syscall_trace_enter+0xcf/0x1e0 [ 799.918381][T32724] do_syscall_64+0xac/0x200 [ 799.918435][T32724] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 799.918468][T32724] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 799.918499][T32724] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 799.918526][T32724] RIP: 0033:0x7f12f22beec9 [ 799.918621][T32724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 799.918644][T32724] RSP: 002b:00007f12f0d27038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 799.918668][T32724] RAX: ffffffffffffffda RBX: 00007f12f2515fa0 RCX: 00007f12f22beec9 [ 799.918762][T32724] RDX: ffffffffffffffff RSI: 0000000000000001 RDI: ffffffffffffffff [ 799.918777][T32724] RBP: 00007f12f0d27090 R08: 0000000000000000 R09: 0000000000000000 [ 799.918793][T32724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 799.918808][T32724] R13: 00007f12f2516038 R14: 00007f12f2515fa0 R15: 00007fff73b78128 [ 799.918832][T32724] [ 800.373755][T32737] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9597'. [ 800.534787][T32737] devtmpfs: Unknown parameter 'dirsync' [ 800.785419][T32738] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9596'. [ 800.820088][T32757] 9pnet_fd: Insufficient options for proto=fd [ 800.930319][T32760] tipc: Started in network mode [ 800.935377][T32760] tipc: Node identity a26e5b7ca65c, cluster identity 4711 [ 800.942754][T32760] tipc: Enabled bearer , priority 0 [ 800.984234][T32767] tipc: Disabling bearer [ 801.026473][T32764] netlink: 36 bytes leftover after parsing attributes in process `syz.4.9605'. [ 801.187436][ T310] SELinux: policydb version 0 does not match my version range 15-35 [ 801.195569][ T310] SELinux: failed to load policy [ 801.510049][ T316] openvswitch: netlink: Message has 6 unknown bytes. [ 801.924251][ T342] lo speed is unknown, defaulting to 1000 [ 801.960734][ T348] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9624'. [ 801.998488][ T348] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9624'. [ 802.038379][ T348] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9624'. [ 802.216383][ T360] openvswitch: netlink: Message has 6 unknown bytes. [ 802.501839][ T351] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9623'. [ 802.631081][ T379] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 802.646628][ T379] SELinux: failed to load policy [ 803.057369][ T29] kauditd_printk_skb: 1758 callbacks suppressed [ 803.057384][ T29] audit: type=1400 audit(1059.046:138789): avc: denied { map_create } for pid=402 comm="syz.3.9644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 803.082621][ T29] audit: type=1400 audit(1059.056:138790): avc: denied { bpf } for pid=402 comm="syz.3.9644" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 803.195226][ T29] audit: type=1400 audit(1059.096:138791): avc: denied { map_read map_write } for pid=402 comm="syz.3.9644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 803.214914][ T29] audit: type=1400 audit(1059.096:138792): avc: denied { prog_load } for pid=402 comm="syz.3.9644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 803.233683][ T29] audit: type=1400 audit(1059.096:138793): avc: denied { bpf } for pid=402 comm="syz.3.9644" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 803.254134][ T29] audit: type=1400 audit(1059.106:138794): avc: denied { perfmon } for pid=402 comm="syz.3.9644" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 803.274915][ T29] audit: type=1400 audit(1059.106:138795): avc: denied { bpf } for pid=402 comm="syz.3.9644" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 803.295393][ T29] audit: type=1400 audit(1059.106:138796): avc: denied { prog_run } for pid=402 comm="syz.3.9644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 803.314059][ T29] audit: type=1326 audit(1059.166:138797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=404 comm="syz.3.9645" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12f22beec9 code=0x7ffc0000 [ 803.337424][ T29] audit: type=1326 audit(1059.166:138798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=404 comm="syz.3.9645" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f12f22beec9 code=0x7ffc0000 [ 803.462290][ T415] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 803.472213][ T415] SELinux: failed to load policy [ 803.681633][ T424] 9pnet_fd: Insufficient options for proto=fd [ 804.269663][ T446] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 804.279566][ T446] SELinux: failed to load policy [ 804.324423][ T451] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9655'. [ 804.348391][ T452] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9661'. [ 804.443392][ T459] openvswitch: netlink: Message has 6 unknown bytes. [ 804.554236][ T470] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9669'. [ 804.704361][ T480] SELinux: policydb version 0 does not match my version range 15-35 [ 804.719451][ T480] SELinux: failed to load policy [ 804.813389][ T9] hid-generic 0000:0440:2000.0004: unknown main item tag 0x0 [ 804.838450][ T9] hid-generic 0000:0440:2000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 805.012525][ T506] SELinux: policydb string does not match my string SE Linux [ 805.020199][ T506] SELinux: failed to load policy [ 805.333164][ T530] 8021q: adding VLAN 0 to HW filter on device bond1 [ 805.383114][ T526] 8021q: adding VLAN 0 to HW filter on device bond2 [ 805.455600][ T540] SELinux: policydb string does not match my string SE Linux [ 805.456769][ T529] __nla_validate_parse: 3 callbacks suppressed [ 805.456852][ T529] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9693'. [ 805.473550][ T540] SELinux: failed to load policy [ 805.612129][ T547] openvswitch: netlink: Message has 6 unknown bytes. [ 805.618199][ T553] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9700'. [ 805.675329][ T553] devtmpfs: Unknown parameter 'dirsync' [ 805.774446][ T563] netlink: 24 bytes leftover after parsing attributes in process `syz.4.9705'. [ 806.018019][ T584] openvswitch: netlink: Message has 6 unknown bytes. [ 806.041592][ T587] FAULT_INJECTION: forcing a failure. [ 806.041592][ T587] name failslab, interval 1, probability 0, space 0, times 0 [ 806.052739][ T581] lo: entered allmulticast mode [ 806.054408][ T587] CPU: 0 UID: 0 PID: 587 Comm: syz.1.9716 Not tainted syzkaller #0 PREEMPT(voluntary) [ 806.054445][ T587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 806.054503][ T587] Call Trace: [ 806.054511][ T587] [ 806.054521][ T587] __dump_stack+0x1d/0x30 [ 806.054588][ T587] dump_stack_lvl+0xe8/0x140 [ 806.054615][ T587] dump_stack+0x15/0x1b [ 806.054638][ T587] should_fail_ex+0x265/0x280 [ 806.054669][ T587] ? cap_convert_nscap+0x284/0x340 [ 806.054715][ T587] should_failslab+0x8c/0xb0 [ 806.054743][ T587] __kmalloc_cache_noprof+0x4c/0x320 [ 806.054779][ T587] cap_convert_nscap+0x284/0x340 [ 806.054864][ T587] vfs_setxattr+0xd7/0x270 [ 806.054909][ T587] filename_setxattr+0x1ad/0x400 [ 806.054960][ T587] path_setxattrat+0x2c9/0x310 [ 806.055090][ T587] __x64_sys_lsetxattr+0x71/0x90 [ 806.055116][ T587] x64_sys_call+0x287b/0x3000 [ 806.055148][ T587] do_syscall_64+0xd2/0x200 [ 806.055202][ T587] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 806.055238][ T587] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 806.055277][ T587] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 806.055367][ T587] RIP: 0033:0x7f2ad11deec9 [ 806.055388][ T587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 806.055488][ T587] RSP: 002b:00007f2acfc3f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 806.055513][ T587] RAX: ffffffffffffffda RBX: 00007f2ad1435fa0 RCX: 00007f2ad11deec9 [ 806.055530][ T587] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000080 [ 806.055547][ T587] RBP: 00007f2acfc3f090 R08: 0000000000000000 R09: 0000000000000000 [ 806.055621][ T587] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000001 [ 806.055639][ T587] R13: 00007f2ad1436038 R14: 00007f2ad1435fa0 R15: 00007ffec51aac48 [ 806.055738][ T587] [ 806.381078][ T595] lo speed is unknown, defaulting to 1000 [ 806.573778][ T581] netlink: 36 bytes leftover after parsing attributes in process `syz.2.9714'. [ 806.755038][ T600] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 807.027157][ T600] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 807.164976][ T600] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 807.192741][ T612] FAULT_INJECTION: forcing a failure. [ 807.192741][ T612] name failslab, interval 1, probability 0, space 0, times 0 [ 807.205464][ T612] CPU: 1 UID: 0 PID: 612 Comm: syz.5.9723 Not tainted syzkaller #0 PREEMPT(voluntary) [ 807.205495][ T612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 807.205511][ T612] Call Trace: [ 807.205519][ T612] [ 807.205529][ T612] __dump_stack+0x1d/0x30 [ 807.205555][ T612] dump_stack_lvl+0xe8/0x140 [ 807.205573][ T612] dump_stack+0x15/0x1b [ 807.205588][ T612] should_fail_ex+0x265/0x280 [ 807.205610][ T612] should_failslab+0x8c/0xb0 [ 807.205635][ T612] kmem_cache_alloc_noprof+0x50/0x310 [ 807.205664][ T612] ? vm_area_alloc+0x2c/0xb0 [ 807.205695][ T612] vm_area_alloc+0x2c/0xb0 [ 807.205723][ T612] mmap_region+0xaa2/0x1630 [ 807.205771][ T612] do_mmap+0x9b3/0xbe0 [ 807.205801][ T612] vm_mmap_pgoff+0x17a/0x2e0 [ 807.205830][ T612] ksys_mmap_pgoff+0xc2/0x310 [ 807.205862][ T612] ? __x64_sys_mmap+0x49/0x70 [ 807.205891][ T612] x64_sys_call+0x14a3/0x3000 [ 807.205917][ T612] do_syscall_64+0xd2/0x200 [ 807.205948][ T612] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 807.205973][ T612] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 807.206002][ T612] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 807.206028][ T612] RIP: 0033:0x7f8e5158ef03 [ 807.206047][ T612] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 807.206067][ T612] RSP: 002b:00007f8e4fff6e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 807.206090][ T612] RAX: ffffffffffffffda RBX: 00000000000007f2 RCX: 00007f8e5158ef03 [ 807.206106][ T612] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 807.206120][ T612] RBP: 0000200000001802 R08: 00000000ffffffff R09: 0000000000000000 [ 807.206135][ T612] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 [ 807.206150][ T612] R13: 00007f8e4fff6ef0 R14: 00007f8e4fff6eb0 R15: 0000200000000d00 [ 807.206168][ T612] [ 807.446813][ T600] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 807.447220][ C1] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 807.554935][T13658] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 807.611009][T13658] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 807.641255][T13658] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 807.662963][T13658] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 807.944971][ T640] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9733'. [ 807.972006][ T621] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9729'. [ 807.979160][ T640] devtmpfs: Unknown parameter 'dirsync' [ 808.067179][ T29] kauditd_printk_skb: 1528 callbacks suppressed [ 808.067199][ T29] audit: type=1326 audit(1064.056:140327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=645 comm="syz.4.9734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f0f6e22eec9 code=0x7ffc0000 [ 808.067261][ T29] audit: type=1400 audit(1064.056:140328): avc: denied { setopt } for pid=648 comm="+}[@" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 808.067288][ T29] audit: type=1400 audit(1064.056:140329): avc: denied { write } for pid=648 comm="+}[@" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 808.076273][ T29] audit: type=1400 audit(1064.066:140330): avc: denied { open } for pid=651 comm="syz.1.9738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 808.076301][ T29] audit: type=1400 audit(1064.066:140331): avc: denied { perfmon } for pid=651 comm="syz.1.9738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 808.076323][ T29] audit: type=1400 audit(1064.066:140332): avc: denied { kernel } for pid=651 comm="syz.1.9738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 808.077071][ T29] audit: type=1400 audit(1064.066:140333): avc: denied { perfmon } for pid=651 comm="syz.1.9738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 808.078508][ T29] audit: type=1400 audit(1064.076:140334): avc: denied { map_create } for pid=651 comm="syz.1.9738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 808.083410][ T29] audit: type=1400 audit(1064.076:140335): avc: denied { map_read map_write } for pid=651 comm="syz.1.9738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 808.085053][ T29] audit: type=1400 audit(1064.076:140336): avc: denied { prog_load } for pid=651 comm="syz.1.9738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 808.095369][ T653] SELinux: policydb version 0 does not match my version range 15-35 [ 808.095409][ T653] SELinux: failed to load policy [ 808.302302][ T663] openvswitch: netlink: Message has 6 unknown bytes. [ 809.016695][ T680] rdma_rxe: rxe_newlink: failed to add lo [ 809.311118][ T702] wireguard0: entered promiscuous mode [ 809.316714][ T702] wireguard0: entered allmulticast mode [ 809.582688][ T725] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9764'. [ 809.646228][ T724] wireguard0: entered promiscuous mode [ 809.651915][ T724] wireguard0: entered allmulticast mode [ 809.840824][ T731] rdma_rxe: rxe_newlink: failed to add lo [ 809.900390][ T738] wireguard0: entered promiscuous mode [ 809.906129][ T738] wireguard0: entered allmulticast mode [ 810.014117][ T755] openvswitch: netlink: Message has 6 unknown bytes. [ 810.091869][ T757] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9776'. [ 810.123860][ T760] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9778'. [ 810.125383][ T761] netlink: 28 bytes leftover after parsing attributes in process `syz.1.9777'. [ 810.193741][ T757] devtmpfs: Unknown parameter 'dirsync' [ 810.361302][ T776] SELinux: policydb string SE Linu does not match my string SE Linux [ 810.385219][ T776] SELinux: failed to load policy [ 810.455925][ T781] 9pnet_fd: Insufficient options for proto=fd [ 810.494168][ T779] wireguard0: entered promiscuous mode [ 810.499970][ T779] wireguard0: entered allmulticast mode [ 810.622040][ T774] rdma_rxe: rxe_newlink: failed to add lo [ 810.860877][ T805] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9793'. [ 811.025934][ T807] devtmpfs: Unknown parameter 'dirsync' [ 811.283236][ T824] FAULT_INJECTION: forcing a failure. [ 811.283236][ T824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 811.296871][ T824] CPU: 1 UID: 0 PID: 824 Comm: syz.1.9799 Not tainted syzkaller #0 PREEMPT(voluntary) [ 811.296907][ T824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 811.296924][ T824] Call Trace: [ 811.296933][ T824] [ 811.296943][ T824] __dump_stack+0x1d/0x30 [ 811.297000][ T824] dump_stack_lvl+0xe8/0x140 [ 811.297025][ T824] dump_stack+0x15/0x1b [ 811.297123][ T824] should_fail_ex+0x265/0x280 [ 811.297150][ T824] should_fail+0xb/0x20 [ 811.297218][ T824] should_fail_usercopy+0x1a/0x20 [ 811.297320][ T824] _copy_from_user+0x1c/0xb0 [ 811.297495][ T824] ___sys_sendmsg+0xc1/0x1d0 [ 811.297556][ T824] __x64_sys_sendmsg+0xd4/0x160 [ 811.297591][ T824] x64_sys_call+0x191e/0x3000 [ 811.297612][ T824] do_syscall_64+0xd2/0x200 [ 811.297714][ T824] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 811.297741][ T824] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 811.297768][ T824] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 811.297821][ T824] RIP: 0033:0x7f2ad11deec9 [ 811.297839][ T824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 811.297862][ T824] RSP: 002b:00007f2acfc1e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 811.297887][ T824] RAX: ffffffffffffffda RBX: 00007f2ad1436090 RCX: 00007f2ad11deec9 [ 811.297947][ T824] RDX: 0000000000000000 RSI: 00002000000010c0 RDI: 0000000000000005 [ 811.297963][ T824] RBP: 00007f2acfc1e090 R08: 0000000000000000 R09: 0000000000000000 [ 811.297979][ T824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 811.297994][ T824] R13: 00007f2ad1436128 R14: 00007f2ad1436090 R15: 00007ffec51aac48 [ 811.298016][ T824] [ 811.730761][ T837] openvswitch: netlink: Message has 6 unknown bytes. [ 811.751111][ T841] SELinux: policydb string SE Linu does not match my string SE Linux [ 811.751467][ T841] SELinux: failed to load policy [ 811.931569][ T850] netlink: 36 bytes leftover after parsing attributes in process `syz.2.9811'. [ 811.985623][ T852] SELinux: policydb version 0 does not match my version range 15-35 [ 812.002598][ T852] SELinux: failed to load policy [ 812.788497][ T904] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9835'. [ 812.845500][ T894] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9832'. [ 812.851456][ T904] devtmpfs: Unknown parameter 'dirsync' [ 812.984905][ T922] SELinux: policydb version 0 does not match my version range 15-35 [ 812.993542][ T922] SELinux: failed to load policy [ 813.027938][ T916] wireguard0: entered promiscuous mode [ 813.033514][ T916] wireguard0: entered allmulticast mode [ 813.077722][ T29] kauditd_printk_skb: 1790 callbacks suppressed [ 813.077737][ T29] audit: type=1400 audit(1069.076:142127): avc: denied { map_create } for pid=926 comm="syz.1.9844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 813.091332][ T927] lo speed is unknown, defaulting to 1000 [ 813.119998][ T929] netlink: 36 bytes leftover after parsing attributes in process `syz.1.9844'. [ 813.136398][ T29] audit: type=1400 audit(1069.076:142128): avc: denied { bpf } for pid=926 comm="syz.1.9844" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 813.156795][ T29] audit: type=1400 audit(1069.076:142129): avc: denied { map_read map_write } for pid=926 comm="syz.1.9844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 813.176320][ T29] audit: type=1400 audit(1069.076:142130): avc: denied { prog_load } for pid=926 comm="syz.1.9844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 813.195084][ T29] audit: type=1400 audit(1069.076:142131): avc: denied { bpf } for pid=926 comm="syz.1.9844" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 813.215372][ T29] audit: type=1400 audit(1069.076:142132): avc: denied { perfmon } for pid=926 comm="syz.1.9844" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 813.236140][ T29] audit: type=1400 audit(1069.076:142133): avc: denied { prog_run } for pid=926 comm="syz.1.9844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 813.255804][ T29] audit: type=1400 audit(1069.076:142134): avc: denied { create } for pid=926 comm="syz.1.9844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 813.274967][ T29] audit: type=1400 audit(1069.076:142135): avc: denied { write } for pid=926 comm="syz.1.9844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 813.294093][ T29] audit: type=1400 audit(1069.106:142136): avc: denied { setopt } for pid=926 comm="syz.1.9844" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 813.389071][ T940] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9848'. [ 813.456227][ T940] devtmpfs: Unknown parameter 'dirsync' [ 813.561158][ T943] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9846'. [ 813.644044][ T957] openvswitch: netlink: Message has 6 unknown bytes. [ 813.695079][ T960] SELinux: policydb version 0 does not match my version range 15-35 [ 813.726892][ T960] SELinux: failed to load policy [ 813.899688][ T974] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9862'. [ 813.960376][ T974] devtmpfs: Unknown parameter 'dirsync' [ 814.125235][ T987] lo speed is unknown, defaulting to 1000 [ 814.345811][ T1000] lo speed is unknown, defaulting to 1000 [ 814.441236][ T1009] netlink: 88 bytes leftover after parsing attributes in process `syz.3.9876'. [ 814.617628][ T1014] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9877'. [ 814.692839][ T1014] devtmpfs: Unknown parameter 'dirsync' [ 814.698695][ T1018] devtmpfs: Unknown parameter 'dirsync' [ 815.966751][ T1079] __nla_validate_parse: 3 callbacks suppressed [ 815.966770][ T1079] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9902'. [ 816.161608][ T1090] lo speed is unknown, defaulting to 1000 [ 816.790100][ T1107] openvswitch: netlink: Message has 6 unknown bytes. [ 817.231235][ T1134] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9922'. [ 817.279404][ T1136] SELinux: policydb version 0 does not match my version range 15-35 [ 817.290178][ T1136] SELinux: failed to load policy [ 817.304051][ T1134] devtmpfs: Unknown parameter 'dirsync' [ 817.428127][ T1140] lo: entered allmulticast mode [ 817.444885][ T1140] netlink: 36 bytes leftover after parsing attributes in process `syz.3.9924'. [ 817.448580][ T1141] lo speed is unknown, defaulting to 1000 [ 817.715012][ T1038] syz.1.9888 (1038) used greatest stack depth: 7144 bytes left [ 817.776769][ T1152] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9928'. [ 817.821234][ T1152] devtmpfs: Unknown parameter 'dirsync' [ 818.050575][ T1163] wireguard0: entered promiscuous mode [ 818.056201][ T1163] wireguard0: entered allmulticast mode [ 818.090122][ T29] kauditd_printk_skb: 1352 callbacks suppressed [ 818.090193][ T29] audit: type=1326 audit(1074.086:143489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1167 comm="syz.2.9936" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87bdb7eec9 code=0x7ffc0000 [ 818.205332][ T29] audit: type=1326 audit(1074.116:143490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1167 comm="syz.2.9936" exe="/root/syz-executor" sig=0 arch=c000003e syscall=243 compat=0 ip=0x7f87bdb7eec9 code=0x7ffc0000 [ 818.228506][ T29] audit: type=1326 audit(1074.116:143491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1167 comm="syz.2.9936" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f87bdb7eec9 code=0x7ffc0000 [ 818.251688][ T29] audit: type=1400 audit(1074.136:143492): avc: denied { create } for pid=1166 comm="syz.1.9935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 818.270965][ T29] audit: type=1400 audit(1074.136:143493): avc: denied { write } for pid=1166 comm="syz.1.9935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 818.290220][ T29] audit: type=1400 audit(1074.136:143494): avc: denied { create } for pid=1166 comm="syz.1.9935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 818.309930][ T29] audit: type=1400 audit(1074.146:143495): avc: denied { write } for pid=1166 comm="syz.1.9935" path="socket:[121651]" dev="sockfs" ino=121651 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 818.333524][ T29] audit: type=1400 audit(1074.176:143496): avc: denied { read } for pid=1170 comm="syz.2.9937" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 818.356540][ T29] audit: type=1400 audit(1074.176:143497): avc: denied { open } for pid=1170 comm="syz.2.9937" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 818.380073][ T29] audit: type=1400 audit(1074.176:143498): avc: denied { ioctl } for pid=1170 comm="syz.2.9937" path="/dev/nvram" dev="devtmpfs" ino=98 ioctlcmd=0x54cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 818.800012][ T1193] openvswitch: netlink: Message has 6 unknown bytes. [ 818.821543][ T1196] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9941'. [ 818.923770][ T1201] netlink: 'syz.5.9946': attribute type 1 has an invalid length. [ 819.417288][ T1215] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(7) [ 819.423987][ T1215] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 819.431626][ T1215] vhci_hcd vhci_hcd.0: Device attached [ 819.456893][ T1225] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9954'. [ 819.546423][ T1225] devtmpfs: Unknown parameter 'dirsync' [ 819.553860][ T1229] openvswitch: netlink: Message has 6 unknown bytes. [ 819.996785][ T1173] syz.1.9939 (1173) used greatest stack depth: 6392 bytes left [ 820.011170][ T1241] openvswitch: netlink: Message has 6 unknown bytes. [ 820.071018][ T1226] vhci_hcd: connection closed [ 820.072512][T13658] vhci_hcd: stop threads [ 820.081626][T13658] vhci_hcd: release socket [ 820.086155][T13658] vhci_hcd: disconnect device [ 820.143605][ T1235] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9958'. [ 820.320256][ T1259] openvswitch: netlink: Message has 6 unknown bytes. [ 820.744874][ T1300] openvswitch: netlink: Message has 6 unknown bytes. [ 820.871977][ T1309] netlink: 12 bytes leftover after parsing attributes in process `syz.5.9981'. [ 820.954934][ T1319] netlink: 'syz.4.9987': attribute type 1 has an invalid length. [ 821.000975][ T1317] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=1317 comm=syz.2.9988 [ 821.013622][ T1317] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=1317 comm=syz.2.9988 [ 821.399610][ T1332] openvswitch: netlink: Message has 6 unknown bytes. [ 821.627780][ T1344] lo speed is unknown, defaulting to 1000 [ 821.685220][ T1349] lo speed is unknown, defaulting to 1000 [ 822.333868][ T1380] netlink: 'syz.4.10014': attribute type 21 has an invalid length. [ 822.333896][ T1380] netlink: 128 bytes leftover after parsing attributes in process `syz.4.10014'. [ 822.333948][ T1380] netlink: 'syz.4.10014': attribute type 5 has an invalid length. [ 822.333968][ T1380] netlink: 3 bytes leftover after parsing attributes in process `syz.4.10014'. [ 822.445583][ T1382] lo speed is unknown, defaulting to 1000 [ 822.734000][ T1378] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10013'. [ 822.827760][ T1403] netlink: 36 bytes leftover after parsing attributes in process `syz.5.10021'. [ 822.923539][ T1406] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10022'. [ 823.000404][ T1414] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10023'. [ 823.056891][ T1405] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10019'. [ 823.070134][ T1406] devtmpfs: Unknown parameter 'dirsync' [ 823.110239][ T29] kauditd_printk_skb: 1630 callbacks suppressed [ 823.110258][ T29] audit: type=1400 audit(1079.106:145129): avc: denied { prog_load } for pid=1410 comm="syz.4.10023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 823.135643][ T29] audit: type=1400 audit(1079.106:145130): avc: denied { bpf } for pid=1410 comm="syz.4.10023" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 823.162872][ T29] audit: type=1400 audit(1079.156:145131): avc: denied { map_create } for pid=1410 comm="syz.4.10023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 823.186963][ T29] audit: type=1400 audit(1079.156:145132): avc: denied { map_read map_write } for pid=1410 comm="syz.4.10023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 823.207078][ T29] audit: type=1400 audit(1079.176:145133): avc: denied { prog_load } for pid=1410 comm="syz.4.10023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 823.226333][ T29] audit: type=1400 audit(1079.176:145134): avc: denied { bpf } for pid=1410 comm="syz.4.10023" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 823.258088][ T29] audit: type=1400 audit(1079.176:145135): avc: denied { perfmon } for pid=1410 comm="syz.4.10023" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 823.280999][ T1414] devtmpfs: Unknown parameter 'dirsync' [ 823.319167][ T29] audit: type=1400 audit(1079.256:145136): avc: denied { prog_load } for pid=1410 comm="syz.4.10023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 823.338040][ T29] audit: type=1400 audit(1079.256:145137): avc: denied { bpf } for pid=1410 comm="syz.4.10023" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 823.358539][ T29] audit: type=1400 audit(1079.256:145138): avc: denied { perfmon } for pid=1410 comm="syz.4.10023" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 823.459659][ T1433] netlink: 'syz.2.10031': attribute type 1 has an invalid length. [ 823.493025][ T1428] wireguard0: entered promiscuous mode [ 823.493043][ T1428] wireguard0: entered allmulticast mode [ 823.604020][ T1434] lo speed is unknown, defaulting to 1000 [ 823.650742][ T1432] lo speed is unknown, defaulting to 1000 [ 824.172759][ T1465] wireguard0: entered promiscuous mode [ 824.178503][ T1465] wireguard0: entered allmulticast mode [ 824.512656][ T1488] netlink: 88 bytes leftover after parsing attributes in process `syz.2.10054'. [ 824.611505][ T1494] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10055'. [ 824.709855][ T1494] devtmpfs: Unknown parameter 'dirsync' [ 824.720383][ T1498] lo speed is unknown, defaulting to 1000 [ 824.993613][ T1518] 9pnet_fd: Insufficient options for proto=fd [ 825.168268][ T1529] netlink: 88 bytes leftover after parsing attributes in process `syz.5.10069'. [ 826.680434][ T1579] lo speed is unknown, defaulting to 1000 [ 827.837747][ T1611] 9pnet_fd: Insufficient options for proto=fd [ 827.921556][ T1619] __nla_validate_parse: 1 callbacks suppressed [ 827.921576][ T1619] netlink: 88 bytes leftover after parsing attributes in process `syz.2.10103'. [ 828.094715][ T1621] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10101'. [ 828.143906][ T29] kauditd_printk_skb: 1294 callbacks suppressed [ 828.143921][ T29] audit: type=1400 audit(1084.126:146433): avc: denied { sys_module } for pid=1616 comm="syz.1.10101" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 828.171246][ T29] audit: type=1400 audit(1084.136:146434): avc: denied { module_request } for pid=1616 comm="syz.1.10101" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 828.304826][ T29] audit: type=1400 audit(1084.296:146435): avc: denied { create } for pid=1633 comm="syz.2.10106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 828.380730][ T29] audit: type=1400 audit(1084.326:146436): avc: denied { map_create } for pid=1633 comm="syz.2.10106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 828.399883][ T29] audit: type=1400 audit(1084.326:146437): avc: denied { map_read map_write } for pid=1633 comm="syz.2.10106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 828.419500][ T29] audit: type=1400 audit(1084.336:146438): avc: denied { prog_load } for pid=1633 comm="syz.2.10106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 828.438348][ T29] audit: type=1400 audit(1084.336:146439): avc: denied { bpf } for pid=1633 comm="syz.2.10106" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 828.458932][ T29] audit: type=1400 audit(1084.336:146440): avc: denied { perfmon } for pid=1633 comm="syz.2.10106" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 828.479978][ T29] audit: type=1400 audit(1084.336:146441): avc: denied { prog_run } for pid=1633 comm="syz.2.10106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 828.499419][ T29] audit: type=1400 audit(1084.346:146442): avc: denied { write } for pid=1633 comm="syz.2.10106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 828.616590][ T1646] SELinux: policydb string SE Linu does not match my string SE Linux [ 828.647500][ T1646] SELinux: failed to load policy [ 829.112606][ T1680] siw: device registration error -23 [ 829.162875][ T1687] openvswitch: netlink: Message has 6 unknown bytes. [ 829.859071][ T1715] openvswitch: netlink: Message has 6 unknown bytes. [ 829.999969][ T1725] netlink: 'syz.1.10141': attribute type 1 has an invalid length. [ 830.133352][ T1739] SELinux: policydb string SE L does not match my string SE Linux [ 830.159475][ T1739] SELinux: failed to load policy [ 830.174456][ T1735] netlink: 36 bytes leftover after parsing attributes in process `syz.3.10146'. [ 830.328713][ T1750] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10136'. [ 830.435431][ T1756] openvswitch: netlink: Message has 6 unknown bytes. [ 830.461514][ T1760] netlink: 72 bytes leftover after parsing attributes in process `syz.3.10153'. [ 831.090908][ T1788] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10165'. [ 831.176685][ T1806] netlink: 72 bytes leftover after parsing attributes in process `syz.5.10169'. [ 832.002590][ T1838] ref_ctr_offset mismatch. inode: 0x5f1 offset: 0x0 ref_ctr_offset(old): 0x82 ref_ctr_offset(new): 0x0 [ 832.016409][ T1838] SELinux: policydb version 0 does not match my version range 15-35 [ 832.025057][ T1838] SELinux: failed to load policy [ 832.325287][ T1854] netlink: 36 bytes leftover after parsing attributes in process `syz.4.10187'. [ 832.564339][ T1871] netlink: 28 bytes leftover after parsing attributes in process `syz.3.10194'. [ 832.597427][ T1875] netlink: 'syz.4.10196': attribute type 1 has an invalid length. [ 832.901750][ T1895] SELinux: policydb version 0 does not match my version range 15-35 [ 832.922484][ T1895] SELinux: failed to load policy [ 833.188195][ T29] kauditd_printk_skb: 1698 callbacks suppressed [ 833.188210][ T29] audit: type=1400 audit(1089.176:148141): avc: denied { create } for pid=1908 comm="syz.3.10210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 833.215458][ T29] audit: type=1400 audit(1089.186:148142): avc: denied { prog_load } for pid=1908 comm="syz.3.10210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 833.234332][ T29] audit: type=1400 audit(1089.186:148143): avc: denied { bpf } for pid=1908 comm="syz.3.10210" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 833.254637][ T29] audit: type=1400 audit(1089.186:148144): avc: denied { perfmon } for pid=1908 comm="syz.3.10210" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 833.278254][ T1909] netlink: 'syz.3.10210': attribute type 1 has an invalid length. [ 833.312358][ T29] audit: type=1400 audit(1089.276:148145): avc: denied { write } for pid=1908 comm="syz.3.10210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 833.332839][ T29] audit: type=1400 audit(1089.306:148146): avc: denied { create } for pid=1910 comm="syz.1.10211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 833.353480][ T29] audit: type=1400 audit(1089.306:148147): avc: denied { write } for pid=1910 comm="syz.1.10211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 833.373915][ T29] audit: type=1400 audit(1089.306:148148): avc: denied { map_create } for pid=1910 comm="syz.1.10211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 833.393285][ T29] audit: type=1400 audit(1089.306:148149): avc: denied { perfmon } for pid=1910 comm="syz.1.10211" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 833.414027][ T29] audit: type=1400 audit(1089.306:148150): avc: denied { map_read map_write } for pid=1910 comm="syz.1.10211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 833.493873][ T1914] netlink: 28 bytes leftover after parsing attributes in process `syz.2.10209'. [ 833.533875][ T1920] openvswitch: netlink: Message has 6 unknown bytes. [ 833.592004][ T1926] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10214'. [ 833.751452][ T1926] devtmpfs: Unknown parameter 'dirsync' [ 834.817701][ T1968] wireguard0: entered promiscuous mode [ 834.823301][ T1968] wireguard0: entered allmulticast mode [ 834.968539][ T1977] netlink: 68 bytes leftover after parsing attributes in process `syz.4.10232'. [ 835.376833][ T2000] openvswitch: netlink: Message has 6 unknown bytes. [ 835.409703][ T2004] lo speed is unknown, defaulting to 1000 [ 835.444532][ T2003] lo speed is unknown, defaulting to 1000 [ 835.731398][ T2012] netlink: 68 bytes leftover after parsing attributes in process `syz.1.10246'. [ 835.770796][ T1976] ================================================================== [ 835.778933][ T1976] BUG: KCSAN: data-race in __bpf_get_stackid / bcmp [ 835.785540][ T1976] [ 835.787875][ T1976] write to 0xffff888118a1c1b8 of 8 bytes by task 1978 on cpu 0: [ 835.795607][ T1976] __bpf_get_stackid+0x5ba/0x800 [ 835.800582][ T1976] bpf_get_stackid+0xe9/0x120 [ 835.805301][ T1976] bpf_get_stackid_raw_tp+0xf6/0x120 [ 835.810668][ T1976] bpf_prog_ff69ba342f4eb966+0x2a/0x32 [ 835.816328][ T1976] bpf_trace_run4+0x114/0x1d0 [ 835.821050][ T1976] __alloc_frozen_pages_noprof+0x32d/0x360 [ 835.826905][ T1976] alloc_pages_mpol+0xb3/0x250 [ 835.831703][ T1976] folio_alloc_mpol_noprof+0x39/0x80 [ 835.837035][ T1976] shmem_get_folio_gfp+0x3cf/0xd60 [ 835.842183][ T1976] shmem_write_begin+0xa8/0x190 [ 835.847258][ T1976] generic_perform_write+0x181/0x490 [ 835.852580][ T1976] shmem_file_write_iter+0xc5/0xf0 [ 835.857824][ T1976] vfs_write+0x527/0x960 [ 835.862105][ T1976] ksys_write+0xda/0x1a0 [ 835.866473][ T1976] __x64_sys_write+0x40/0x50 [ 835.871101][ T1976] x64_sys_call+0x2802/0x3000 [ 835.875885][ T1976] do_syscall_64+0xd2/0x200 [ 835.880481][ T1976] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 835.886578][ T1976] [ 835.889104][ T1976] read to 0xffff888118a1c1b8 of 8 bytes by task 1976 on cpu 1: [ 835.896803][ T1976] bcmp+0x23/0x90 [ 835.900548][ T1976] __bpf_get_stackid+0x65a/0x800 [ 835.905522][ T1976] bpf_get_stackid+0xe9/0x120 [ 835.910484][ T1976] bpf_get_stackid_raw_tp+0xf6/0x120 [ 835.916110][ T1976] bpf_prog_ff69ba342f4eb966+0x2a/0x32 [ 835.921707][ T1976] bpf_trace_run4+0x114/0x1d0 [ 835.926507][ T1976] __alloc_frozen_pages_noprof+0x32d/0x360 [ 835.932389][ T1976] alloc_pages_mpol+0xb3/0x250 [ 835.937184][ T1976] alloc_pages_noprof+0x90/0x130 [ 835.942325][ T1976] __vmalloc_node_range_noprof+0x6f2/0xe00 [ 835.948147][ T1976] __kvmalloc_node_noprof+0x30f/0x4e0 [ 835.953532][ T1976] ip_set_alloc+0x1f/0x30 [ 835.957966][ T1976] hash_netiface_create+0x282/0x740 [ 835.963174][ T1976] ip_set_create+0x3c9/0x960 [ 835.967789][ T1976] nfnetlink_rcv_msg+0x4c6/0x590 [ 835.972834][ T1976] netlink_rcv_skb+0x123/0x220 [ 835.977608][ T1976] nfnetlink_rcv+0x16b/0x1690 [ 835.982317][ T1976] netlink_unicast+0x5bd/0x690 [ 835.987184][ T1976] netlink_sendmsg+0x58b/0x6b0 [ 835.991958][ T1976] __sock_sendmsg+0x142/0x180 [ 835.996655][ T1976] ____sys_sendmsg+0x31e/0x4e0 [ 836.001431][ T1976] ___sys_sendmsg+0x17b/0x1d0 [ 836.006213][ T1976] __x64_sys_sendmsg+0xd4/0x160 [ 836.011074][ T1976] x64_sys_call+0x191e/0x3000 [ 836.015769][ T1976] do_syscall_64+0xd2/0x200 [ 836.020294][ T1976] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 836.026200][ T1976] [ 836.028525][ T1976] value changed: 0x000000000018eec9 -> 0x00007f87bdb7d97f [ 836.035632][ T1976] [ 836.037963][ T1976] Reported by Kernel Concurrency Sanitizer on: [ 836.044206][ T1976] CPU: 1 UID: 0 PID: 1976 Comm: syz.2.10233 Not tainted syzkaller #0 PREEMPT(voluntary) [ 836.054028][ T1976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 836.064299][ T1976] ==================================================================